recommended reading

DISA could take on bigger IT role at Defense

Defense Secretary Robert Gates has carved out what appears to be a key -- if still not fully defined -- role for the Defense Information Systems Agency in his ambitious plan to consolidate the management of the Defense Department's information technology management and infrastructure, said analysts who closely follow federal information technology policy.

Gates announced on Monday sweeping reforms in how the Pentagon will conduct business in an effort to save $100 billion during the next five years. The changes include eliminating the policymaking Office of the Assistant Secretary of Defense Networks and Information Integration, but appear to strengthen the role of the chief information officer, some analysts said.

In a Pentagon press briefing on Monday Gates said a decentralized IT infrastructure at Defense deprived the department of economies of scale. He directed the department to consolidate its IT assets to achieve "savings in acquisition, sustainment and manpower costs."

"This action will allow the increased use by the department of common functions and improve our ability to defend Defense networks against growing cyber threats," Gates said.

Defense requested $36.5 billion in fiscal 2011 for IT, a 6.4 percent increase from its fiscal 2010 budget of $34.3 billion.

To oversee IT, Gates said he plans to stand up a stronger Office of the Chief Information Officer, "and under its umbrella, responsibility for daily operations will be assigned to the Defense Information Systems Agency."

"A refashioned Defense Information Systems Agency will perform the department's CIO function," noted a Pentagon press release issued on Monday.

In a briefing after Gates' press conference, Christine Fox, director of Defense Cost Assessment and Program Evaluation, made it clear the Pentagon plans to merge its CIO function with DISA. In slides from the her presentation, Fox said Defense plans to move the CIO to DISA and combine command-and-control functions from the Joint Chiefs of Staff; Joint Forces Command, which is slated for dissolution; and ASD/NII into the new CIO/DISA organization.

Under the leadership of its director, Army Lt. Gen. Carroll Pollett, DISA is well-positioned to take on a larger role in management of Defense-wide IT systems, said John Weiler, executive director of the Interoperabilty Clearinghouse, a nonprofit group in Alexandria, Va., that focuses on development of federal enterprise information systems.

John Garing, a consultant with Suss Consulting who retired as DISA's chief information officer earlier this year, said the agency has a proven track record in consolidating assets, reducing the number of data centers it operates from 50 to about 14. DISA also has experience in cloud computing projects and could develop a virtual cloud to serve all Defense. He also said the Pentagon needs to further clarify and define the roles of DISA and the CIO.

Warren Suss, head of the consulting firm, said he believed Gates has "broadly expanded DISA's operational role. . . . This is a huge change for DISA."

John Grimes, the last person to hold the Defense CIO position, having retired in April 2009, said he was still figuring out the new Defense IT policy, which Gates only broadly outlined.

Defense needs a policy leader to manage spectrum negotiations during the next several months, Grimes said. Defense is trying to protect encroachment on its vital radio frequencies by the Federal Communications Commission, which has proposed allocating spectrum that Defense uses for space systems and infantry radios to commercial carriers.

Grimes said he believed the Pentagon did not conduct a thorough analysis of the consequences of shutting down ASD/NII, which he said could serve as an independent check on IT acquisitions that Gates said the central Defense acquisition, technology and logistics organization will handle.

Phil Bond, president and chief executive officer of TechAmerica, a technology industry trade group in Washington, said eliminating ASD/NII and the command-and-control functions now performed by the Joint Staff will result in a weaker, not stronger, Defense CIO.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.