Title: TRANSFORMING THE NATIONAL DEFENSE TEAM CREATING AN INFORMATION ADVANTAGE FOR OUR PEOPLE AND MISSION
1TRANSFORMING THENATIONAL DEFENSE TEAMCREATING
AN INFORMATION ADVANTAGE FOR OUR PEOPLE AND
MISSION PARTNERS
DAVID M. WENNERGRENDeputy Assistant Secretary of
Defense for Information Management,Integration,
and Technology and DoD Deputy Chief Information
Officer (703) 695-0871david.wennergren_at_osd.mil
2THE WORLD HAS CHANGED
3(No Transcript)
4THE FUTURE OFCOMMAND AND CONTROL
- The term Command and Control has become a
significant impediment to progress . a term that
has become unalterably frozen in time. - In the Information Age, the future focuses on
threeconcepts - Focus Provides the context and defines the
purposesof the endeavor - Convergence The goal-seeking process that
guidesactions and effects. - Agility The critical capability that
organizationsneed to meet the challenges of
complexity and uncertainty - Moving the practice of command and control away
fromclassic C2 in the direction of edge
organizations movingpower to the edge is an
argument deemed risky by some. - There is more risk inherent in continuing
business as usual than there is in aggressively
developing and testing new (edge-like) approaches.
The power of Net-Centric Operations is the
result of achieving shared awareness and being
able to act on this improved shared awareness by
self-synchronization involving all levels. -
David S. Alberts
5CURRENT INFORMATIONSHARING CHALLENGES
NET-CENTRIC DATASTRATEGY TENETS
IMPLEMENTATION APPROACHES
Advertise Information Holdings (Tag Data)
VISIBLE
Web Enable Sources Remove Impediments Need to
Share
ACCESSIBLE
Communitiesof Interest (COIs) Shared
Vocabularies
UNDERSTANDABLE
6AN ANALOGYTHE BALANCING ACT
A constant battle between two opposing views of
the network
7NEW MODEL RAISING THE BAR
To deliver the net-centric future,we must be
extremely successful at both!
8A VISION FOR THE FUTURE IDENTITY... ATTRIBUTES
DATA
9INFORMATION ASSURANCE CHARTING THE COURSEFOR THE
FUTURE
10THE MOBILE WORKERNOMADIC COMPUTING
Can you just say No? It may seem that the
simplest answer is to enforcea policy that
forbids wireless access, but this strategy is
doomed to fail.
DEPLOYING SAFE WIRLESS LANS GARTNER RESEARCH, 5
JULY 2001
11 ITS A WEB 2.0 WORLD
12SECOND LIFE
- 3-D virtual world entirely built and owned byits
residents - Over 8 million registered accounts
- 2008 Presidential Candidate virtual campaign
headquarters (Edwards) - IBM developed office space and holds hundredsof
accounts - Starwood Hotels tested new aloft design
- Reuters and other news agencies have set up
virtual bureaus - Sweden opened virtual embassy in May 2007
13NET-GENERATION WORKFORCE
Net-Geners exploit new technologies and
social Networking for workplace productivity.
14DEMOGRAPHIC REALITIES Generational Distribution
for Major DoD IT Series (2210, 1550, 855, 854,
391)
AVERAGE RETIREMENT AGE
NET-GEN 10
GEN X 22
BABY BOOM 64
PRE-BABY BOOM 4
REGULAR RETIREMENT CRITERIA Age 50 with 20 years
of creditable service or any age with 25 years of
creditable service.
15OUR WORKFORCEIS OUR FUTURE
In a Web 2.0 world, what opportunities will we
offer to the net generation workforce? will we
be an employer of choice? and will we give
them an environment that fuels the fire of their
creativity and innovation?
16DOD IM/IT STRATEGIC PLAN
- GOALS
- NET-CENTRIC TRANSFORMATION
- Accelerate DoDs net-centric transformation to
facilitate effective and efficient warfighting,
intelligence and business processes and other
national security activities. - INFORMATION AS A STRATEGIC ASSET
- Use information sharing to enable effective and
agile decision making through visible,
accessible, understandable and trusted data and
services when and where needed. - INTEROPERABLE INFRASTRUCTURE
- Ensure robust and reliable world-wide
connectivity and infrastructure within DoD and
with external mission partners.
- ASSURED INFORMATION ACCESS
- Protect and defend DoD systems, networks and
information to maximize mission assurance. - RETURN ON INVESTMENT
- Institutionalize IT Portfolio Management (PfM)
and Enterprise Architecture (EA) to maximize the
contribution of IT investments to national
security and defense outcomes. - IT WORKFORCE DEVELOPMENT
- Maintain an agile IT workforce with the skills to
build, extend, exploit and defend a net-centric
Defense information enterprise.
- Future View
- Net-Centricity
- Decentralized Control
- Enterprise Services
- Shared Data
- Autonomous Agent
- Enterprise Architecture
- Web 2.0
- Current View
- Stove-Pipe Information
- Centralized Control
- Unique Software Solutions
- Data Not Shared
- Inefficiency
3
4
5
6
GOALS 1
2
JOURNEY OF TRANSFORMATION
17THE POWER OF INFORMATION ACCESS. SHARE.
COLLABORATE.
LEAD THE DOD ENTERPRISE TO ACHIEVE AN INFORMATION
ADVANTAGE FOR OUR PEOPLEAND MISSION PARTNERS.
DAVID M. WENNERGREN Deputy Assistant Secretary
of Defense for Information Management, Integration
, and Technology DoD Deputy Chief Information
Officer (703) 695-0871 david.wennergren_at_osd.mil