AUSA: The Army is trying to create a unified cloud surroundings as a key piece of its new Army Digital Transformation Strategy (ADTS) aimed toward centralizing its huge numbers of laptop programs, information requirements, cloud capabilities and cybersecurity procedures. And to that finish, the service is also looking for to develop its use of non-traditional acquisition authorities, prime officers defined right this moment.
The technique represents “a shift in terms of us starting to do things more at an enterprise, centralized level,” Raj Iyer, the Army’s chief info officer (CIO), instructed reporters within the margin of the annual Association of the United States Army (AUSA) commerce present. “The Army in the past has always executed traditional IT in a very decentralized way — we let every command do their own thing. And that’s all led to a lot of silos of excellence over the years. Now, if you look at the requirements for multi-domain operations, that model doesn’t work anymore.”
RELATED: ‘Global By Nature’: Generals Say Unified Network Is ‘Operational Imperative’
The CIO workplace’s press to unify its “enterprise and tactical clouds” — and speed up migration of knowledge to that new cloud structure in a standardized means — thus is a significant focus of the ADTS.
“For cloud migration, it’s key that the office of CIO establishes the standards to do that migration,” confused Brig. Gen. Matt Easley through the press roundtable. “We can’t allow every program office to go out and move to a cloud environment of their own their own design. We have to tell them the data standards we want them to use, the architecture standards, the cybersecurity standards on how we want them connected, and how to fuse that data to make that data usable and visible to the rest of the force.”
The service sees its multi-pronged $15 billion digital modernization effort as a prime precedence, the officers stated, as a result of it underpins the Army’s capability to plug and play into DoD’s Joint All Domain Command and Control (JADC2) technique. Markowitz stated the service has been working carefully with the Joint Staff’s J6 directorate for Command, Control, Communications, & Computers/Cyber, Lt. Gen. Dennis Crall. In specific, this includes utilizing contingency operations, such because the Afghanistan evacuation, and workout routines, together with Project Convergence, designed to determine easy methods to share Army info and information with the Combatant Commands, he stated.
RELATED: DISA Head: DoD Working To Modernize ICAM, C2, Data Use
“We’re trying to experiment in real time with ongoing operations or exercises, kind of building a data foundation for a Combatant Command level, and for the Army’s interest we really want to make sure that data structure of how information flows is common across all Combatant Commands,” he stated.
Mixing ‘Colors Of Money’
Iyer stated that the ADTS additionally represents a shift in how the service works to encourage innovation and herald trade companions, he stated, together with altering its acquisition strategy.
While the Army, like all of the providers, faces challenges as a result of useful resource constraints, together with his $15 billion annual finances, Iyer stated, “money is not the problem” in implementing the digital transformation. It does imply having to divest its a number of particular person information facilities to take a position as a substitute in creating “one cloud.” An even bigger concern is determining easy methods to reform how the Army approaches budgeting.
Iyer stated he has been speaking with congressional staffers about how the Army can have extra flexibility within the Planning, Programming, Budgeting and Execution (PPBE) course of, and in the way it funds digitization and cybersecurity throughout “colors of money” — that's, separate finances pots for analysis and improvement, procurement and operations and upkeep.
“We are absolutely in favor of some reform, especially when it comes to how we budget for digital, and then cyber quite frankly, because our cyber threats are changing and evolving all the time. The way the PPBE process works is that you plan for something five years in advance, and then you program for it, and then you wait and five years later you get the money to execute. But we know how fast technology changes, we know how fast the the threats in the cyberspace are changing. And so, it’s a question about the flexibility the process to be able to do things.”
And whereas Congress has given the Defense Department extra capability to make use of non-traditional acquisition instruments, reminiscent of Broad Agency Announcements and Other Transaction Authorities, the Army to date has been a bit cautious on the way it utilized them to software program improvement, digitization and cybersecurity, David Markowitz, the service’s chief information officer, stated through the roundtable.
“I’m not sure we’ve used the pilot authorities to the extent folks in Congress wanted us to. We’re a little slower than the Air Force, they’re a little more aggressive on these,” he stated.
That’s partially as a result of service leaders are nonetheless struggling a bit to grasp precisely what's going on internally with investments.
“We have to do the internal work. Let’s be honest, we have difficulty seeing across the large scope of the Army how money is being spent in the digital area, and particularly on cyber security,” he added.