SlideShare a Scribd company logo
CAPT Christopher Page, USN
Deputy Director, Assured Command & Control Division
OPNAV N2/N6F1
Unclassified
20140507
2UNCLASSIFIED
Information Dominance
3
“Operational advantage gained from fully
integrating information functions, capabilities
and resources to optimize decision making
and maximize warfighting effects.”
Accomplished by 3 core capabilities:
 Assuring C2
 Maintaining Battlespace Awareness
 Integrating Fires
Delivering Warfighting Effects!
UNCLASSIFIED
4
Satellites and Tactical Datalinks
Correlate, decide, disseminate in all environments
Electromagnetic
Spectrum
C3 PlatformsTools
Afloat and Ashore Networks
Unclassified
 Warfighter’s Assured C2 Perspective
– Data Availability
– Data Integrity
– Data Confidentiality
 Adversary’s Perspective
– The above present exploitable attack vectors
 Must identify attack vectors, map materiel solutions and develop
appropriate policy and Tactics, Techniques, and Procedures (TTP)
 Must be addressed in a comprehensive, end-to-end architecture
– Individually addressing Availability, Integrity and/or Confidentiality
will not “Assure C2”
5
Agile policy underpins a comprehensive end to end architecture
 Assured communications architecture despite the full range of
adversary actions, environment impacts, and EM Spectrum dynamics
 There is no Silver Bullet
– Asymmetric Space and Cyber threats require an architectural response
– Includes: Transport, Networks, Policy, Applications
 New Concept of Operations (CONOPS) and TTP
– Fleet will fight with significantly less network access
 Joint, Interagency, and Coalition interoperability are paramount
 Austere budget environment demands better decision-making, greater
agility, stronger partnerships with service providers
6
Our greatest capabilities can become our greatest vulnerabilities
 Bolster Nuclear Command, Control, and Communications (NC3)
capabilities for Navy and the Nation
 Implement Joint Information Environment (JIE) and Intelligence
Community Information Technology Enterprise (IC ITE)
 Execute named Cyber Remediation campaign across Navy’s end-to-
end Information Dominance Enterprise Architecture (IDEA)
 Finalize Technology Transition Agreement (TTA) for integrating
Naval Tactical Cloud (NTC) into Agile Core Services (ACS)
 Mature Assured C2 Integrated Readiness Assessment (IRA) and IT
Baseline Assessment Memorandum (BAM)
 Manage Assured C2 Programs of Record across the ashore, afloat,
and aloft segments of the IDEA
7
CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE
 Consolidate multiple afloat networks:
– Provide secure, reliable common hosting for multiple C4I applications
– Provide integrated voice, video, data and system management
– Single, scalable IT platform that will enable Assured C2
8
Today:
Tactical Data Link (TDL)
EM Spectrum Awareness
Tomorrow:
9
Navy Marine
Corps Intranet Continuity of Service Contract
Next Generation
Enterprise Network
OCONUS Navy Enterprise Network
JIE = Joint Information Environment
Navy
Information
Environment
Sensitive Compartmented Information Networks
IC ITE = Intel Community IT Enterprise
CANES
10
NGEN, CANES, DCC are keys to success -- aligned to JIE
Next Generation Enterprise
Network (NGEN)
Data Center Consolidation (DCC)
Consolidated Afloat
Networks and Enterprise
Services (CANES)
 Ensure commander’s ability to command assigned forces in any
environment
 Assured EM spectrum access in high-threat scenarios to
transport, share, store, protect and disseminate critical data
 “Operationalization” of the EM spectrum and cyberspace into a
warfighting domain
Enable use of the EM spectrum as maneuver space.
11
Assured
C2
Battlespace
Awareness
Integrated
Fires
Assured EM Spectrum - Pathway to Navy Information Dominance
 Assured C2 sets conditions for Navy commanders to maintain the IT-
enabled ability to exercise C2 authorities across the sea, land, air, space,
and cyberspace domains in heavily contested or denied operating
conditions.
 Navy must continue to clearly define and manage capability-based Assured
C2 requirements and resources, and align those requirements and
resources with JIE/IC ITE through the IDEA
 The primary beneficiaries of the effort to deliver Assured C2 capabilities are
the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM
subordinate commanders who execute Navy’s warfighting mission in all
domains.
12
Assuring C2 for Information Dominance

More Related Content

PPTX
Flying ad hoc network
PDF
An Overview of security issues in Mobile Ad hoc Networks
PDF
Disaster Recovery and Humanitarian Networks
PDF
Am03402220229
PDF
Agile Cloud Conference 2 Introduction - John Brennan
PDF
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
PDF
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
PDF
Army PEO EIS Cloud Architecture
Flying ad hoc network
An Overview of security issues in Mobile Ad hoc Networks
Disaster Recovery and Humanitarian Networks
Am03402220229
Agile Cloud Conference 2 Introduction - John Brennan
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
Army PEO EIS Cloud Architecture

Viewers also liked (13)

PPTX
The Five Essential Truths of the Application Economy
PPTX
IT Certifications that Pay Well - And Why to Consider CloudMASTER
PDF
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
PPTX
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
PDF
Infographic - The True Cost of Downtime
PPTX
Lean Security
PDF
Deep Organisational Transformation a model for a higher Agility
PDF
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
PDF
Summit 2014 Keynote
PPTX
The Journey to DevSecOps
PPTX
DevOps and Continuous Delivery reference architectures for Docker
PDF
Grafana is not enough: DIY user interfaces for Prometheus
PDF
NAVFAC Conference Briefing
The Five Essential Truths of the Application Economy
IT Certifications that Pay Well - And Why to Consider CloudMASTER
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
Infographic - The True Cost of Downtime
Lean Security
Deep Organisational Transformation a model for a higher Agility
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Summit 2014 Keynote
The Journey to DevSecOps
DevOps and Continuous Delivery reference architectures for Docker
Grafana is not enough: DIY user interfaces for Prometheus
NAVFAC Conference Briefing
Ad

Similar to @AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page (20)

PDF
USN Cyberspace Concept and Priorities 6
PDF
SPAWAR Book
PPT
Computer and control Information reconaicen warfare presentation
PDF
10. Pengantar NCW.pdf
PDF
Lt. General (Retired) Deptula Presentation at International Conference on Air...
PDF
Robert Carey, Principal Deputy CIO, DOD Insight session
PPT
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
PPTX
Cyber Operations in Smart Megacities: TechNet Augusta 2015
PPTX
Sentinel Week 8 H4D Stanford 2016
PPT
Perimeter Defense in a World Without Walls
PPT
network centric battlefield operations, network centric battlefield operation...
PPTX
Sentinel Week 5 H4D Stanford 2016
PDF
SMi Group's Network Centric Warfare 2018 conference
PPT
Session Three: Defence Authority for C4ISR
PPT
View Slides
PDF
PDF
Rhumb lines information dominance 2 oct 09
PPTX
18th Airborne Big Data Analytics Tech Brief_June 2 2015
DOCX
N2 DISL Resume
PPT
SSTRM - StrategicReviewGroup.ca - Comtois C4I Montreal March 2010
USN Cyberspace Concept and Priorities 6
SPAWAR Book
Computer and control Information reconaicen warfare presentation
10. Pengantar NCW.pdf
Lt. General (Retired) Deptula Presentation at International Conference on Air...
Robert Carey, Principal Deputy CIO, DOD Insight session
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Sentinel Week 8 H4D Stanford 2016
Perimeter Defense in a World Without Walls
network centric battlefield operations, network centric battlefield operation...
Sentinel Week 5 H4D Stanford 2016
SMi Group's Network Centric Warfare 2018 conference
Session Three: Defence Authority for C4ISR
View Slides
Rhumb lines information dominance 2 oct 09
18th Airborne Big Data Analytics Tech Brief_June 2 2015
N2 DISL Resume
SSTRM - StrategicReviewGroup.ca - Comtois C4I Montreal March 2010
Ad

More from GovCloud Network (20)

PDF
IaaS Price performance-benchmark
PDF
Cloud computing training what's right for me
PDF
ViON Corporation: Surviving IT Change
PDF
Staying Safe in Cyberspace
PDF
Vets 360 Services - Military Dedication - Corporate Success
PDF
GovCloud Network LLC Overview - June 25, 2014
PDF
DoD Business Capability Lifecycle (BCL) Guide (Draft)
PPTX
GovCloud Network Overview Presentation
PPTX
PM ISE Information Interoperability Presentation -agile sourcing brief
PDF
Intrusion Detection on Public IaaS - Kevin L. Jackson
PDF
A Framework for Cloud Computing Adoption in South African Government
PDF
NCOIC GCC OWS-10 presentation 10 7 2013
PDF
Tech gate kevin l jackson - 09-21-2013
PDF
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
PDF
Government cloud deployment lessons learned final (4 4 2013)
PDF
Cloud computing-made-easy
PDF
Implementing big data in the cloud v2.5 3 4 2013
PPTX
Kevin jackson cloud service brokerage for datacenter service providers for we...
PDF
Texas Dept of Information Resources Agency Strategic Plan
PDF
Gravitant Whitepaper Cloud for Federal Govt
IaaS Price performance-benchmark
Cloud computing training what's right for me
ViON Corporation: Surviving IT Change
Staying Safe in Cyberspace
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network LLC Overview - June 25, 2014
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network Overview Presentation
PM ISE Information Interoperability Presentation -agile sourcing brief
Intrusion Detection on Public IaaS - Kevin L. Jackson
A Framework for Cloud Computing Adoption in South African Government
NCOIC GCC OWS-10 presentation 10 7 2013
Tech gate kevin l jackson - 09-21-2013
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Government cloud deployment lessons learned final (4 4 2013)
Cloud computing-made-easy
Implementing big data in the cloud v2.5 3 4 2013
Kevin jackson cloud service brokerage for datacenter service providers for we...
Texas Dept of Information Resources Agency Strategic Plan
Gravitant Whitepaper Cloud for Federal Govt

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
GamePlan Trading System Review: Professional Trader's Honest Take
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page

  • 1. CAPT Christopher Page, USN Deputy Director, Assured Command & Control Division OPNAV N2/N6F1 Unclassified 20140507
  • 3. Information Dominance 3 “Operational advantage gained from fully integrating information functions, capabilities and resources to optimize decision making and maximize warfighting effects.” Accomplished by 3 core capabilities:  Assuring C2  Maintaining Battlespace Awareness  Integrating Fires Delivering Warfighting Effects! UNCLASSIFIED
  • 4. 4 Satellites and Tactical Datalinks Correlate, decide, disseminate in all environments Electromagnetic Spectrum C3 PlatformsTools Afloat and Ashore Networks Unclassified
  • 5.  Warfighter’s Assured C2 Perspective – Data Availability – Data Integrity – Data Confidentiality  Adversary’s Perspective – The above present exploitable attack vectors  Must identify attack vectors, map materiel solutions and develop appropriate policy and Tactics, Techniques, and Procedures (TTP)  Must be addressed in a comprehensive, end-to-end architecture – Individually addressing Availability, Integrity and/or Confidentiality will not “Assure C2” 5 Agile policy underpins a comprehensive end to end architecture
  • 6.  Assured communications architecture despite the full range of adversary actions, environment impacts, and EM Spectrum dynamics  There is no Silver Bullet – Asymmetric Space and Cyber threats require an architectural response – Includes: Transport, Networks, Policy, Applications  New Concept of Operations (CONOPS) and TTP – Fleet will fight with significantly less network access  Joint, Interagency, and Coalition interoperability are paramount  Austere budget environment demands better decision-making, greater agility, stronger partnerships with service providers 6 Our greatest capabilities can become our greatest vulnerabilities
  • 7.  Bolster Nuclear Command, Control, and Communications (NC3) capabilities for Navy and the Nation  Implement Joint Information Environment (JIE) and Intelligence Community Information Technology Enterprise (IC ITE)  Execute named Cyber Remediation campaign across Navy’s end-to- end Information Dominance Enterprise Architecture (IDEA)  Finalize Technology Transition Agreement (TTA) for integrating Naval Tactical Cloud (NTC) into Agile Core Services (ACS)  Mature Assured C2 Integrated Readiness Assessment (IRA) and IT Baseline Assessment Memorandum (BAM)  Manage Assured C2 Programs of Record across the ashore, afloat, and aloft segments of the IDEA 7
  • 8. CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE  Consolidate multiple afloat networks: – Provide secure, reliable common hosting for multiple C4I applications – Provide integrated voice, video, data and system management – Single, scalable IT platform that will enable Assured C2 8 Today: Tactical Data Link (TDL) EM Spectrum Awareness Tomorrow:
  • 9. 9 Navy Marine Corps Intranet Continuity of Service Contract Next Generation Enterprise Network OCONUS Navy Enterprise Network JIE = Joint Information Environment Navy Information Environment Sensitive Compartmented Information Networks IC ITE = Intel Community IT Enterprise
  • 10. CANES 10 NGEN, CANES, DCC are keys to success -- aligned to JIE Next Generation Enterprise Network (NGEN) Data Center Consolidation (DCC) Consolidated Afloat Networks and Enterprise Services (CANES)
  • 11.  Ensure commander’s ability to command assigned forces in any environment  Assured EM spectrum access in high-threat scenarios to transport, share, store, protect and disseminate critical data  “Operationalization” of the EM spectrum and cyberspace into a warfighting domain Enable use of the EM spectrum as maneuver space. 11 Assured C2 Battlespace Awareness Integrated Fires Assured EM Spectrum - Pathway to Navy Information Dominance
  • 12.  Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.  Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA  The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains. 12 Assuring C2 for Information Dominance