AFCEA TechNet Europe 2016 Dutch MoD Overhauling IT

AFCEA TechNet Europe 2016 Dutch MoD Overhauling IT

Posted by MILITARY TECHNOLOGY

Speaking to the opening session of TechNet Europe 2016 on board the SS ROTTERDAM this morning, Rear-Adm. Maarten Tossings, the Principal Director of Organisation and Chief Information Officer of the Netherlands Ministry of Defence, stressed the pervasive nature of the IT conundrum for his command.

“Since 2014 we have been overhauling our processes and seeking a better way of achieving our objectives,” he said. “If you visit Dutch forces serving in Mali today, the first thing you will see on getting off the plane is people using SAP [enterprise software] to manage logistics – and everybody here knows how important logistics are to any complex operation. It should never be forgotten that sometimes we have to operate in quite a Spartan environment.”

Reconstituting the IT capabilities of an entire armed force is a challenging prospect, to say the least. Tossings and his command distinguish between ‘white IT’ – the infrastructure required to conduct and manage all the business of a government department – and ‘green IT’ – the capabilities required to conduct information warfare and counter hostile cyber intent. The former can, to a degree, be outsourced. The latter requires levels of security and specialisation that make it imperative uniformed personnel guide and implement the change process.

Nevertheless, Tossings’ vision is to bring about a single infrastructure that will gracefully and efficiently address both sets of requirements. The overarching theme of the Dutch approach, in his words, is “to harness innovation and government-industry partnering to the maximum possible degree,” – a sentiment echoed by every other speaker in the keynote session opening the conference.

Organised by AFCEA Europe and attracting over 200 delegates from across Europe and North America, TechNet Europe 2016 is examining the issue of “Changing the Game in Security – Key Role for C4ISR.” The conference runs 3-5 October.


要查看或添加评论,请登录

Ad Koolen的更多文章

  • HSM Survival Guide

    HSM Survival Guide

    Welkom bij de HSM Survival Guide! Hier heb je de flexibiliteit om te kiezen uit een breed scala aan online materialen…

  • De impact op PKI-certificaten (Public Key Infrastructure) in paspoorten door het verdwijnen van FIPS 140-2

    De impact op PKI-certificaten (Public Key Infrastructure) in paspoorten door het verdwijnen van FIPS 140-2

    De impact op PKI-certificaten (Public Key Infrastructure) in paspoorten door het verdwijnen van FIPS 140-2 kan…

    5 条评论
  • Copy of Utimaco LAN Crypt File en Folder Encryptie

    Copy of Utimaco LAN Crypt File en Folder Encryptie

    VS-NfD-portfolio voor file- en volledige encryptie. Utimaco heeft goedkeuring gekregen van het Duitse Federal Office…

  • Tina Stewart aangesteld als Chief Marketing Officer @ Utimaco

    Tina Stewart aangesteld als Chief Marketing Officer @ Utimaco

    Utimaco, een vooraanstaande wereldwijde aanbieder van IT-beveiligingsoplossingen, heeft bekendgemaakt dat Tina Stewart…

  • Compumatica biedt nieuwe UTIMACO HSM platform u.trust Anchor

    Compumatica biedt nieuwe UTIMACO HSM platform u.trust Anchor

    We starten 2024 met de introductie van de nieuwe lijn Hardware Security Modules, kortweg HSM's genoemd. Zoals in…

  • Vanaf nu ook in Nederland !

    Vanaf nu ook in Nederland !

    SecurityServer bundelt 30 jaar ervaring in cryptografie en Hardware Security Module (HSM)-technologie in een uniek…

  • Europese digitale identiteit: EU Council en Parlement bereiken voorlopig akkoord over eID / Digital Wallet.

    Europese digitale identiteit: EU Council en Parlement bereiken voorlopig akkoord over eID / Digital Wallet.

    Om een vertrouwde en veilige digitale identiteit voor alle Europeanen te garanderen, hebben het voorzitterschap van de…

    2 条评论
  • Keymanagement

    Keymanagement

    Keymanagement regels voor bedrijven Je encryptiesleutels zijn de sleutels tot je kasteel. Dus bescherm ze met je leven!…

    1 条评论
  • Enterprise Secure Key Management

    Enterprise Secure Key Management

    This article introduces the Utimaco Enterprise Secure Key Management system (ESKM). It explains how the ESKM server can…

    2 条评论
  • NIST 4de ronde

    NIST 4de ronde

    Announcement After careful consideration during the 3rd Round of the NIST PQC Standardization Process, NIST has…

    6 条评论

社区洞察

其他会员也浏览了