tony scott - landing the plane
TRANSCRIPT
![Page 1: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/1.jpg)
Landing the Plane: Invest. Deliver. Protect.
Tony ScottU.S. Chief Information Officer
June 17, 2015
1
![Page 2: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/2.jpg)
Driving Value in Federal IT Investments
Protecting Federal IT Assets and Information
Delivering World-‐class
Digital Services
Federal IT Objectives
2
People
![Page 3: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/3.jpg)
Federal IT Strategy
3
![Page 4: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/4.jpg)
4
![Page 5: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/5.jpg)
4* Compound Annual Growth RateData source: Agency FY 2016 IT budgets
Efficiencies achieved through improved IT management7.1% CAGR*
FY2001 - FY2009
$125.7
$86.3
$0
$20
$40
$60
$80
$100
$120
$140
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
$Billio
ns
Total for Major Agencies Budget Projected at 2001-2009 Growth Rate
Drive Value in IT InvestmentsFY 2016 Budget of $86.3B
1.5% CAGR*FY2009 - FY2016
![Page 6: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/6.jpg)
Analytics and Oversight
6
Enhance transparency and improve oversight of Federal IT through the use of data analytics, portfolio reviews and technical assistance, and
optimize the use of IT infrastructure across the Government.
PortfolioStat – Establish quarterly PortfolioStat reviews
Cross-‐OMB Analytics – Continue to integrate PortfolioStat with other management stats
Optimize Infrastructure – Continue to drive Federal Data Center Consolidation (FDDCI)
IT Transparency – Publish revised Federal IT Dashboard
![Page 7: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/7.jpg)
Deliver World Class Digital Services
7
Transforming the way government works for citizens and businesses by dramatically improving each
agency’s most important digital services.
![Page 8: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/8.jpg)
https://playbook.cio.gov
8
![Page 9: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/9.jpg)
Digital Service Plays
9
![Page 10: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/10.jpg)
Protect Federal Assets & Information
10
The E-‐Gov Cyber Unit will focus resources on strengthening Federal cybersecurity through targeted oversight and policy issuance.
E-‐Gov Cyber NSC NIST DHS
![Page 11: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/11.jpg)
Vision & Mission• Vision: Reduce the number of cyber incidents in which sensitive Government information is compromised
• Mission: Strengthen Federal cybersecurity through:1) Data-driven, risk-based oversight of agency and
government-wide cybersecurity programs;2) Issuance and implementation of Federal policies consistent
with emerging technologies and evolving cyber threats; 3) Oversight of the Government-wide response to major
cyber incidents and vulnerabilities to ensure appropriate mitigation measures are effectively implemented; and
4) Engagement with key stakeholders to modernize relevant cybersecurity statutes.
11
![Page 12: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/12.jpg)
Industry Considerations
• Build PIV capability into products by default• The ability to use PIV credentials with network
authentication products • Use of PIV digital signature capability with email and digital
transaction products• Use of PIV authentication, digital signature and encryption
in all cloud services offerings• Use of PIV credentials, to include derived credentials, in
mobile devices • Get PIV enabled products on the GSA Approved
Products List (APL) and build use of PIV PKI authentication into all physical access systems
12
![Page 13: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/13.jpg)
Develop the Next Generation
13
![Page 14: Tony Scott - Landing the Plane](https://reader030.vdocument.in/reader030/viewer/2022032619/55bee5dabb61eb266b8b482e/html5/thumbnails/14.jpg)
14