SlideShare une entreprise Scribd logo
1  sur  8
Presenter’s Name June 17, 2003
Mobile Security Project
Mobile Security Solutions Reference Architecture Part B
Federal Network Resilience
1
Presenter’s Name June 17, 20032
Background
 Presidential directive for a comprehensive Digital Government
Strategy (DGS)
 Mobile Security Reference Architecture (MSRA) - Part A
 Mobile security baseline controls
 Mobile Computing Decision Framework (MCDF)
 Released to agencies in May 2013
2
Presenter’s Name June 17, 20033
Part B Objectives
 Develop a Mobile Security Solutions Reference
Architecture – Part B for Federal Civilian Executive
Branch Departments and Agencies.
 Derive from use case based solutions that will
allow agencies to incorporate security and privacy
into their networks
 Take into account differing agency mission types.
3
Presenter’s Name June 17, 2003
4
Department/Agency Only Workshop
4
 Department/Agency Problem Challenge Workshop – July 16
 Location: Software Engineering Institute, 4401 Wilson Blvd.,
Arlington, VA
 Engage D/As and discuss current implementation maturity levels,
solutions and struggles with their mobile implementations.
 Develop use case based scenarios to be presented at the Vendor
Problem Challenge Workshop.
Presenter’s Name June 17, 2003
5
Vendor Only Workshop
5
 Vendor Problem Challenge Workshop – July 25
 Location: NRECA Conference Facility, 4301 Wilson Blvd.,
Arlington, VA
 Registration is required
 Limited to 80 participants
 Present and discuss with vendors the use case based
scenarios developed from the D/A Problem Challenge
Workshop.
 Encourage vendors to provide solid and viable solutions for
D/As regarding mobile security issues.
Presenter’s Name June 17, 2003
6
Contact Information
6
Marilyn Rose
Marilyn.rose@hq.dhs.gov
Yonas Ogbaselassie
Yonas.ogbaselassie@hq.dhs.gov
Presenter’s Name June 17, 2003
7
Registration Information
7
Location: NRECA Conference Facility, 4301 Wilson Blvd.,
Arlington, VA
Registration site:
http://www.sei.cmu.edu/events/msra-workshop-form.cfm
8

Contenu connexe

En vedette

Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architectureVishal Sharma
 
SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0Sunil Babu
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adoptChris Haddad
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT WSO2
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBSukumar Nayak
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 

En vedette (17)

Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architecture
 
SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adopt
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DB
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 

Similaire à Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Tim Harvey
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
 
Software Bill of Materials
Software Bill of MaterialsSoftware Bill of Materials
Software Bill of MaterialsPetar Radanliev
 
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9jakreile
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Fred Kautz
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
cyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt contentcyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt contentKrayKarthik
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)tntsa1972
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsShekhar Vimalendu
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017David Sweigert
 
nps49-101310-50 (1)
nps49-101310-50 (1)nps49-101310-50 (1)
nps49-101310-50 (1)foosaner
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 

Similaire à Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013 (20)

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 
I018145157
I018145157I018145157
I018145157
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
Software Bill of Materials
Software Bill of MaterialsSoftware Bill of Materials
Software Bill of Materials
 
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
cyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt contentcyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt content
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
 
nps49-101310-50 (1)
nps49-101310-50 (1)nps49-101310-50 (1)
nps49-101310-50 (1)
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 

Plus de Tim Harvey

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Tim Harvey
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Tim Harvey
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitTim Harvey
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Tim Harvey
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Tim Harvey
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Tim Harvey
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Tim Harvey
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationTim Harvey
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureTim Harvey
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 

Plus de Tim Harvey (12)

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013

  • 1. Presenter’s Name June 17, 2003 Mobile Security Project Mobile Security Solutions Reference Architecture Part B Federal Network Resilience 1
  • 2. Presenter’s Name June 17, 20032 Background  Presidential directive for a comprehensive Digital Government Strategy (DGS)  Mobile Security Reference Architecture (MSRA) - Part A  Mobile security baseline controls  Mobile Computing Decision Framework (MCDF)  Released to agencies in May 2013 2
  • 3. Presenter’s Name June 17, 20033 Part B Objectives  Develop a Mobile Security Solutions Reference Architecture – Part B for Federal Civilian Executive Branch Departments and Agencies.  Derive from use case based solutions that will allow agencies to incorporate security and privacy into their networks  Take into account differing agency mission types. 3
  • 4. Presenter’s Name June 17, 2003 4 Department/Agency Only Workshop 4  Department/Agency Problem Challenge Workshop – July 16  Location: Software Engineering Institute, 4401 Wilson Blvd., Arlington, VA  Engage D/As and discuss current implementation maturity levels, solutions and struggles with their mobile implementations.  Develop use case based scenarios to be presented at the Vendor Problem Challenge Workshop.
  • 5. Presenter’s Name June 17, 2003 5 Vendor Only Workshop 5  Vendor Problem Challenge Workshop – July 25  Location: NRECA Conference Facility, 4301 Wilson Blvd., Arlington, VA  Registration is required  Limited to 80 participants  Present and discuss with vendors the use case based scenarios developed from the D/A Problem Challenge Workshop.  Encourage vendors to provide solid and viable solutions for D/As regarding mobile security issues.
  • 6. Presenter’s Name June 17, 2003 6 Contact Information 6 Marilyn Rose Marilyn.rose@hq.dhs.gov Yonas Ogbaselassie Yonas.ogbaselassie@hq.dhs.gov
  • 7. Presenter’s Name June 17, 2003 7 Registration Information 7 Location: NRECA Conference Facility, 4301 Wilson Blvd., Arlington, VA Registration site: http://www.sei.cmu.edu/events/msra-workshop-form.cfm
  • 8. 8