Dave Bryan - Security Innovation Network
Download
Report
Transcript Dave Bryan - Security Innovation Network
Dave Bryan
President, ManTech International Corporation
Defense Systems Group
ManTech Overview for ITSEF
March 18, 2009
Dave Bryan
Corporate Executive Vice President
Why ManTech is Here
• To build a bridge with Silicon Valley and other
innovators
• To brand ManTech as a leading player in
cybersecurity/IA
• To establish partnerships with selected small
businesses
Topics
•
•
•
•
Overview of ManTech International Corporation
Cybersecurity Threat
Government Investment in Cybersecurity
ManTech’s Cybersecurity Program
…and how we can work together
ManTech at a Glance
• National Security Focus
– Critical technology and services support for the DoD, Intelligence and
Homeland Security missions
– Positioned at the heart of Cybersecurity, Global Logistics, Counterterrorism
and protection of the homeland
– Culture based on mission support, high quality, trust, integrity and ethics
• Background & History
– Founded in 1968, George Pedersen - Co-Founder, CEO & Chairman
– IPO February 2002 – NASDAQ: MANT
– Strong history of organic growth and focused acquisitions
• Our People
– 8,000 Technology Professionals
• Over 75% of total employee base hold security clearances
• 42% of total employee base cleared at Top Secret or above
• Our Locations
–
–
–
–
Headquartered in Fairfax, VA
Approximately 300 locations worldwide (40 countries, 42 states)
Office in Charleston, SC (Aviation Business Park)
SCI Cleared Facilities
6
Recognized Success
•
•
•
•
•
•
•
•
A Top 100 IT Company—BusinessWeek magazine,
2008
Named a BusinessWeek.com, Top 75
Fastest Growing Tech Company in 2007
Selected as a G.I. Jobs magazine, Top 10 Military
Friendly Employer in 2006 and 2007
IntelligenceCareers.com—Employer of Choice
Chosen by Business 2.0 magazine as one its TOP 100
Fastest Growing Technology Companies in 2006 and
2007
A Deloitte & Touche, Top 50, Fastest Growing Virginia
Technology Company in 2007
Named a Top 100 Small Cap Technology company by
Red Herring Magazine in 2005
Time names ManTech’s A-Space one of Top 50
inventions of 2008
ManTech’s Acquisition Success
• Since our IPO in early 2002, MANT has successfully acquired and integrated
companies which continue to fuel growth across the enterprise
Capabilities Added/Markets Addressed
($ in millions)
$1,871
ETG
SRS Tech
$500
• Sec & Tech.
Engineering
Customer Set
• Class. DoD
2002
• Intel Analysis
• Intel Ops
Customer Set
• Intel
• Classified DoD
2004
2005/2006
2007
ACS Defense
CTX & IDS
Aegis
• IT
• Network Ops.
Customer Set
• NATO
• Air Force
• C4ISR
• SE&I
• Mission
Support
Customer Set
• DHS
• DARPA
• NRO/NGA
• MDA
• IT
• Info. Sharing
Customer Set
• Intel
• Class. DoD
2003
Gray Hawk &
GRS
McDonald
Bradley
• IT
• Info. Sharing
• SOA
Customer Set
• DIA
• DHS
2007
• Computer
Forensics
• SIGINT
• COMINT
Customer Set
• DoD
• Intel
EWA
Fed
Svcs2008
8
Our Growth Strategy – New Five-Year Plan
• 2009 – 2012 – next goal is to reach $3B in revenue
– Organic Growth of 10-15% per year
•
•
•
•
Protect the base
Continued market penetration
Leverage discriminators
Expand into new Government markets/priorities
– Selective strategic acquisitions
M&A
Growth
Organic
Growth
$1.871B
Organic
Market Growth Drivers
• Continued long term threat
Organic
Growth •
10-15%•
Comprehensive National Cyber Initiative (CNCI)
Protection of the Homeland
18%
• Intelligence collection & information sharing
Growth
$1.448B
$500M16%
2002
2007
• Continued Government outsourcing trend
2008E
2009 - 2012
9
Leverage
Global Presence:
Anytime- Anywhere
ManTech OCONUS
Facility Locations
Germany
Augsburg
Bad Aibling
Bitburg
Darmstadt
Frankfurt
Friedrichsfelde
Heidelberg
Kaiserslautern
Turkey
Spain
Lisbon
Portugal
Rota
Feltham, United Kingdom
Harrogate, United Kingdom
Brussels, Belgium
Mons, Belgium
Stockholm, Sweden
Moscow, Russia
Tuzla, Bosnia
Ankara
Incirlik
Izmir
Camp Bondsteel,
Yugoslavia
Koln
Mannheim
Mannheim-Baden
Wurtenber
Sechenheim
Stuttgart
Weisbaden Bierstadt
Wuerzburg
Bishkek, Kyrgyzstan
Manas, Kyrgyzstan
Beijing, China
Korea
Lisbon, Portugal
(South)
Inchon
Pyong Taek
Seoul
Uijongbu
Nassau, Bahamas
Guantanomo, Cuba
Kingston, Jamaica
Belize City, Belize
Mexico City, Mexico
Port-au-Prince, Haiti
Santo Domingo,
Dominican Republic
Japan
Kanagawa-Ken
Okinawa
Yokosuka
St. Croix, Virgin Islands
St. Thomas, Virgin Islands
JTF Bravo, Honduras
Tegucigalpa, Honduras
Bridgetown, Barbados
Caracas, Venezuela
Comalapa, El Salvador
San Savador, El Salvador
Agana Heights, Guam,
Guam
Managua, Nicaragua
Aruba, Netherlands Antilles
Curacao, Netherlands Antilles
San Jose, Costa Rica
Camp Arijan, Kuwait
Balboa, Panama
Panama City, Panama
Lima, Peru
Afghanistan
Colombia
Bagram
Jalabad AF
Kabul
Kandahar
Apiay
Barranquilla
Bogota
Villavicencio
Aguadilla, Puerto Rico
Roosevelt Roads, Puerto Rico
Bangkok, Thailand
Karshi Khanabad,
Uzbekistan
ORGUN-E AF
Salermo
Sharona AF
Ecuador
Brazil
Guayaquil
Manta
Quito
Santiago, Chile
Asuncion, Paraguay
Buenos Aires, Argentina
Iraq
Souda Bay, Crete,
Greece
Brasilia
Buenos Aires
Sao Paulo
Bolivia
Chimore
Cochabamba
La Paz
Santa Cruz
Trinidad
Ar Ramadi
Baghdad
Balad
Mosul
Ramadi
Tikrit
Italy
Agnano Naples
Camp Darby, Livorno
Coltano
Livorno
Longare
Mt. Corma
Poggio Renatico
Sigonella
Vicenza
2
A Threat to the
Nation Is
EVERYONE’S WAR
•
Cyberattacks have increased more than 40 percent in the last two years
•
Increased instances of unauthorized intrusions and introduction of malicious
code on federal computer networks
•
On 8 January 2008, President Bush signed the National Security Presidential
Directive 54/Homeland Security Presidential Directive 23 (contents are
classified) authorizes Intelligence Community (IC) agencies to provide
comprehensive Computer Network Operations (CNO) to support all Federal
Agencies in the protection of government (and private sector critical
infrastructure) computer systems.
•
Response to serious threats from state and non-state actors and provides a
structure to deter and respond to cyber threats.
•
“Cyber Pearl Harbor” has already occurred and protecting our cyber
infrastructure will be The Problem of the next decade.
•
Office of the Director of National Intelligence (ODNI) has the lead along
with several Federal agencies focusing on the “initiatives” and “enablers”
The Government
Investment Is There:
“Follow the Money”
• New Administration plans continue to
make cybersecurity a top priority
– President’s 2010 Budget includes $355 million for
cybersecurity efforts
– Homeland Security’s Comprehensive National
Cybersecurity Initiative (CNCI) includes additional
$17 billion
– Five year traditional IS market forecast is $41 billion
Source: INPUT Federal Information Security Market Forecast 2008-2013
ManTech’s
Cybersecurity
Program
A Diverse Set of Customers in Cyber Security
ManTech provides direct support to the members of IC and Multiple
Government Agencies
• Title 10 Customers
• Title 50 Customers
• Defense Intelligence Agency (DIA)
- DAC-5, Cyber Defense Office
- Joint Intelligence Task Force for Combating
Terrorism (JITF-CT)
• Department of Defense – Military Services
• DHS National Cyber Security Division (NCSD)
• FBI ESOC
• DoJ Security Operations Center
• U.S. Senate and House of Representatives
• National Media Exploitation Center (NMEC)
Cyber Defense – Information Assurance
• Policy and Planning Support
• Secure Systems and Software Design
Techniques
• Continuity of Operations Planning
• Certification and Accreditation/Compliance
Verification
• User Awareness and Training
• Vulnerability Assessments/Penetration
Testing
• Insider Threat Detection methodologies
• Intrusion Detection/Prevention Monitoring
• Event Correlation and Analysis
• Incident Response and Emergency
Management
We fully support all aspects of the
Information Assurance Lifecycle
Cyber Forensics Operations
• Full Scope Digital and Media Forensic Analysis
• Response and Recovery Operations
• Advanced Data Hiding
• Vulnerability Analysis/Reverse Engineering
• Tool & Technique Training
• Signature Development & Analysis
• Application Analysis
• Tool & Technique Validation
• Forensic Architectures
Cyber Intrusion Operations/Threat Analysis
• Computer Network Operations/Tech Ops
Support
• Multi-tasked Intrusion & Penetration Tests
• Network Enumeration
• Operations Security (OPSEC) & Deception
Support
• Cyber Profiling
• Network Threat Simulations/Adversarial
Tradecraft Emulation
Network and Security Ops Center Training Center
• Security Operations
- Remote Intrusion Monitoring and Incident
Response
- Collaboration with Cyber Centers/Customer
SOC operations
- Cyber CONOPS to integrate with DIBCI
requirements
- 2n+1 redundancy for environmental and
power
- Tier III Classification (UpTime Institute)
• Training Center
- Classified Training Center
- CNA/CND/OPSEC/Forensic and other
specialized training capabilities
- Expanding to build internal pipeline for
Reverse Engineers, Kernel Developers,
Advanced Forensics and Threat Analytics
- Program to support Government workforce
development
• Personnel
- Subject Matter Experts in all
disciplines
- SOA Security Expertise
- DoD 8570.1 Certifications
- Industry/Government
Accreditations
Hardware Exploitation/Supply Chain Assurance
• Recon Ops Support
• Hardware Exploitation
• Network Devices/Personal Computers
• PDA
• Cell Phones
• Other Mobile Devices
• Hardware Assessments/Deep Dive
Inspections
• Supply Chain Logistics Management
Opportunity Space
• Hard for firms without key contract vehicles and strong
past-performance qualifications to compete for much of
the work as a prime contractor
• Work will largely come as task orders under existing
indefinite-delivery, indefinite-quantity contracts or as
add-on work to existing awards when they are recompeted
• Funding under the national cybersecurity initiative should
result in continued strong growth during the next few
years.
Source: Washington Technology, Feb. 2, 2009
•
Defense contractors, government agencies and the military all have a
stake in safeguarding their networks from attack
•
Federal cybersecurity chiefs recently listed basic steps to help defend
against attacks:
-Inventory of authorized hardware and software
-Secure configurations of hardware and software
-Network boundary defenses
-Maintain and analyze security audit logs
-Monitor and control dormant accounts
-Control wireless devices
-Create an incident-response capability
-Create secure backups to help recover lost or altered data
… but defending against and defeating cyberattacks will require new
technologies and new approaches for assuring the supply chain and
maintaining real-time protection of IT systems.
Source: Federal Times, February 23, 2009
Some specifics for supply chain assurance • Federal government’s increasing emphasis on protecting the
Nation’s critical infrastructure from the growing threat of
malicious products/components
• Resultant need for conformance testing and certification of
the integrity of the hardware supply chain
• Development of standards and associated test procedures for
hardware conformance testing
• Providing testing services to the government, product
manufacturers, and other entities which use the products
(e.g. IT/telecommunications services providers and system
integrators)
• Supply chain management
Partnering with
ManTech
R&D Partnerships
ManTech’s applied R&D provides opportunities for teaming
IP & Local Solutions
•Active Defense
•Cyber Forensics
•CNE/CNA Operations
•Supply Chain
New Products/
Strategic Programs
Focused R&D
Products/
Solutions
Operations
•NetWitness
•Baseline Tool Kit
•Sentris
•Document Detective
•Hardware Exploitation Lab
New Capabilities
Execution
New/Existing
Customers
Market Expansion/New Markets
We have developed numerous Cybersecurity solutions that directly
support Cybersecurity Operations
Teammates – Process for Teaming
Identify Sources Through :
•
ITSEF and other small business associations
•
Technical conferences and trade shows
•
Academic Institutions
•
Small Business Administration
•
Government Agencies SBIR Programs
•
Cooperative Research and Development Agreements (CRADA)
•
DOD’s Central Contractor Registration (CCR) system, Dynamic Small
Business Search (formerly known as PRO-NET)
Teammates – Process for Teaming
Selection Based On:
•
Leading edge technologies
•
Innovation
•
Competitive advantage
•
Maturity of product
•
Commitment to containing costs
•
Technical competence
•
Production capabilities
Executive Points of Contact
•
•
•
Dave Bryan, Corporate Executive Vice President
ManTech International Corporation
•
Sam Russ, Senior Vice President and CTO,
ManTech Defense Systems Group
[email protected]
– [email protected]
•
(703) 814-8367
Mike Kushin, Senior Vice President and CTO,
ManTech International Corporation
– [email protected]
•
(703) 981-8393
(703) 218-8293
Dan Hall, Vice President, Corporate Cyber Security,
ManTech International Corporation
– [email protected]
(703) 218-8268
Questions?