SlideShare une entreprise Scribd logo
1  sur  17
ISE Enterprise Architecture and Common Standards Program
IRTPA Section 1016: Creating the ISE 01/10/11 UNCLASSIFIED President George W. Bush on signing the Intelligence Reform and Terrorist Prevention Act 17 December 2004 ,[object Object],[object Object],[object Object],[object Object],[object Object],* The  Implementing Recommendations of the 9/11 Commission Act of 2007,  enacted in August of this year, included amendments to section 1016 .   The new law expands the scope of the ISE to explicitly include homeland security and terrorism-related weapons of mass destruction information.
National Strategy for Information Sharing 01/10/11 UNCLASSIFIED ,[object Object],[object Object]
Elements of National Strategy for Information Sharing 01/10/11 UNCLASSIFIED ,[object Object],[object Object],[object Object],The  Strategy  will help ensure those responsible for combating terrorism and protecting our local communities have access to the timely and accurate information they need by:
ISE Implementation Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.ise.gov
Who is the ISE? ,[object Object],[object Object],[object Object],01/10/11 UNCLASSIFIED Intel Law Enforcement Foreign Affairs Homeland Security Defense Operators Command & Control Analysts Investigators Collectors Responders Federal State, Local, Tribal Foreign Partners Private Sector Terrorism Info (Terrorism, Homeland Security, and WMD and Law Enforcement as it relates to Terrorism)
Why ISE Architecture and Common Standards Program? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],01/10/11 UNCLASSIFIED
ISE Enterprise Architecture Framework, Version 1.0 ,[object Object],[object Object],[object Object],[object Object],01/10/11 UNCLASSIFIED
ISE EAF – Architect’s & Implementer’s Views
Impact of an EAF for the ISE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Users Users Applications Applications Databases Databases Information Sharing Environment ISE Space ISE Space Core Services Discovery IA Security Mediation Messaging Enterprise Management Collaboration User Assistance Storage Application ISE Portal Service Registration ISE Documentation ISE Status Service Discovery User Assistance Search Tools Portal Hosting Admin Alerts
ISE EAF: Application and Services 01/10/11 UNCLASSIFIED 01/10/11 UNCLASSIFIED ,[object Object],[object Object],[object Object]
FEA-ISE Profile, Version 1.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],01/10/11 UNCLASSIFIED
Using the ISE EAF and FEA-ISE Profile 01/10/11 UNCLASSIFIED FEA-ISE Profile ISE Core Component Specs Department/Agency X System X System I ISE Core Dept/ Agency X EA System X Architecture ISE Enterprise Architecture Framework System I Architecture FTF Catalog ,[object Object],[object Object],[object Object],[object Object],[object Object],Agency Capital Planning & Investment Control (CPIC) Process >> Exhibits 53 & 300 Version 1.0 (December 2006)
ISE Standards Objective ,[object Object],[object Object],[object Object],[object Object],01/10/11 UNCLASSIFIED
Taxonomy of the CTISS 01/10/11 UNCLASSIFIED Functional standards:   Rules, conditions, guidelines, and characteristics  of data, mission products, and detailed operational activity supporting ISE  business process areas.  Technical standards:   Specific technical methodologies and practices  to design and implement information sharing capability into ISE systems. CTISS Program Issuance
Common Terrorism Information Sharing Standards 01/10/11 UNCLASSIFIED ,[object Object],[object Object]
QUESTIONS? Ken Clark Office of the PM-ISE 202-331-4071 [email_address]

Contenu connexe

Tendances (6)

Information Assurance And Security - Chapter 3 - Lesson 3
Information Assurance And Security - Chapter 3 - Lesson 3Information Assurance And Security - Chapter 3 - Lesson 3
Information Assurance And Security - Chapter 3 - Lesson 3
 
Hannes astok digital_security_2012
Hannes astok digital_security_2012Hannes astok digital_security_2012
Hannes astok digital_security_2012
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...Data sharing for development: a case of Infrastructural development in Uganda...
Data sharing for development: a case of Infrastructural development in Uganda...
 
Jonathan Aleck, Associate Director of Aviation Safety, CASA
Jonathan Aleck, Associate Director of Aviation Safety, CASAJonathan Aleck, Associate Director of Aviation Safety, CASA
Jonathan Aleck, Associate Director of Aviation Safety, CASA
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 

En vedette

En vedette (7)

Enterprise Software Development Patterns
Enterprise Software Development PatternsEnterprise Software Development Patterns
Enterprise Software Development Patterns
 
JavaOne’12 Session 3992 - Software Modularity: Paradoxes, Principles, and Arc...
JavaOne’12 Session 3992 - Software Modularity: Paradoxes, Principles, and Arc...JavaOne’12 Session 3992 - Software Modularity: Paradoxes, Principles, and Arc...
JavaOne’12 Session 3992 - Software Modularity: Paradoxes, Principles, and Arc...
 
Service Oriented Architecture In Automotive
Service Oriented Architecture In AutomotiveService Oriented Architecture In Automotive
Service Oriented Architecture In Automotive
 
Enterprise Architecture - Ohio's IT Optimization
Enterprise Architecture - Ohio's IT OptimizationEnterprise Architecture - Ohio's IT Optimization
Enterprise Architecture - Ohio's IT Optimization
 
Enterprise Architecture Primer
Enterprise Architecture PrimerEnterprise Architecture Primer
Enterprise Architecture Primer
 
Ea As Strategy Ver1 1
Ea As Strategy Ver1 1Ea As Strategy Ver1 1
Ea As Strategy Ver1 1
 
Enterprise Architecture & IT standards
Enterprise Architecture &  IT standardsEnterprise Architecture &  IT standards
Enterprise Architecture & IT standards
 

Similaire à Ise enterprise architecture and common standards program

20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
Walter Richard Sweeney
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
alfred4lewis58146
 
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
Running head IT SECURITY POLICYIT SECURITY POLICY              .docxRunning head IT SECURITY POLICYIT SECURITY POLICY              .docx
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
charisellington63520
 

Similaire à Ise enterprise architecture and common standards program (20)

Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...
 
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Europe rules – making the fair data economy flourish
Europe rules – making the fair data economy flourishEurope rules – making the fair data economy flourish
Europe rules – making the fair data economy flourish
 
IT Security EBK2008 Summary
IT Security EBK2008 SummaryIT Security EBK2008 Summary
IT Security EBK2008 Summary
 
The UK Location Programme
The UK Location ProgrammeThe UK Location Programme
The UK Location Programme
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
 
S1P2-Annie-Sokol-V2.ppt
S1P2-Annie-Sokol-V2.pptS1P2-Annie-Sokol-V2.ppt
S1P2-Annie-Sokol-V2.ppt
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
Running head IT SECURITY POLICYIT SECURITY POLICY              .docxRunning head IT SECURITY POLICYIT SECURITY POLICY              .docx
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
The INSPIRE Directive - A Quick Overview
The INSPIRE Directive - A Quick OverviewThe INSPIRE Directive - A Quick Overview
The INSPIRE Directive - A Quick Overview
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 

Plus de Kaye Beach

North america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibttaNorth america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibtta
Kaye Beach
 
Nlets implementation of xml candle aamva
Nlets implementation of xml candle aamvaNlets implementation of xml candle aamva
Nlets implementation of xml candle aamva
Kaye Beach
 
Ky fusion center
Ky fusion centerKy fusion center
Ky fusion center
Kaye Beach
 
Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02
Kaye Beach
 
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Kaye Beach
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
Kaye Beach
 
Sensor nets the business of surveillance
Sensor nets the business of surveillanceSensor nets the business of surveillance
Sensor nets the business of surveillance
Kaye Beach
 
New sensor technologies mems wireless texas
New sensor technologies  mems wireless texasNew sensor technologies  mems wireless texas
New sensor technologies mems wireless texas
Kaye Beach
 
Nist piv data model testing
Nist piv data model testingNist piv data model testing
Nist piv data model testing
Kaye Beach
 
GISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis CeneterGISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis Ceneter
Kaye Beach
 
State CIO health it 2010
State CIO health it 2010State CIO health it 2010
State CIO health it 2010
Kaye Beach
 
Robotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelsteinRobotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelstein
Kaye Beach
 
NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007
Kaye Beach
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
Kaye Beach
 
IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...
Kaye Beach
 
Darpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day AnnouncementDarpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day Announcement
Kaye Beach
 
Controlled unclassified information
Controlled unclassified informationControlled unclassified information
Controlled unclassified information
Kaye Beach
 
CUI briefing II
CUI briefing IICUI briefing II
CUI briefing II
Kaye Beach
 
Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004
Kaye Beach
 

Plus de Kaye Beach (20)

North america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibttaNorth america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibtta
 
Nlets implementation of xml candle aamva
Nlets implementation of xml candle aamvaNlets implementation of xml candle aamva
Nlets implementation of xml candle aamva
 
N dex
N dex N dex
N dex
 
Ky fusion center
Ky fusion centerKy fusion center
Ky fusion center
 
Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02
 
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
 
Sensor nets the business of surveillance
Sensor nets the business of surveillanceSensor nets the business of surveillance
Sensor nets the business of surveillance
 
New sensor technologies mems wireless texas
New sensor technologies  mems wireless texasNew sensor technologies  mems wireless texas
New sensor technologies mems wireless texas
 
Nist piv data model testing
Nist piv data model testingNist piv data model testing
Nist piv data model testing
 
GISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis CeneterGISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis Ceneter
 
State CIO health it 2010
State CIO health it 2010State CIO health it 2010
State CIO health it 2010
 
Robotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelsteinRobotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelstein
 
NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
 
IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...
 
Darpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day AnnouncementDarpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day Announcement
 
Controlled unclassified information
Controlled unclassified informationControlled unclassified information
Controlled unclassified information
 
CUI briefing II
CUI briefing IICUI briefing II
CUI briefing II
 
Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004
 

Ise enterprise architecture and common standards program

  • 1. ISE Enterprise Architecture and Common Standards Program
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. ISE EAF – Architect’s & Implementer’s Views
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Taxonomy of the CTISS 01/10/11 UNCLASSIFIED Functional standards: Rules, conditions, guidelines, and characteristics of data, mission products, and detailed operational activity supporting ISE business process areas. Technical standards: Specific technical methodologies and practices to design and implement information sharing capability into ISE systems. CTISS Program Issuance
  • 16.
  • 17. QUESTIONS? Ken Clark Office of the PM-ISE 202-331-4071 [email_address]