Defence science and technology 3rd pmo leadership summit feb 2017

Preview:

Citation preview

1

Defeating the Threat Before it Arrives Building Cyber Resilience Conference 18-19 August 2015

Investing in and Assuring the Value of Science and Technology for Safeguarding Australia

3rd PMO Leadership Summit, Melbourne 22 Feb 2017

Dr Mike Davies

Chief, S&T Program

2

Structure

Who we are

What is expected of us and why

Our aim

S&T Capabilities and their Application

Our approach – P3M

Your thoughts

3

National leader in safeguarding Australia by delivering valued scientific advice and innovative technology solutions for Defence and national security

Purpose and Roles

4

At A Glance

5

Program Management Context: Clear expectations

2015 First Principles Review Creating One Defence recommendation Defence Science and Technology Organisation “clearly articulate its value proposition”.

2016 Defence White Paper: the alignment of defence strategy, capability and resources is fundamental. The White Paper policy includes growth in external partnerships to “develop innovative technologies and deliver essential capabilities”.

6

Clear expectations

2015 Australian National Audit Office’s (ANAO) Managing Science and Technology Work for Defence: “DSTG has yet to fully embed a more strategic approach to the way it administers its science and technology work”.

7

Our aim

Transform the Defence S&T portfolio, program and project management to:

– Increase the strategic alignment, transparency, accountability and contestability of S&T investment decisions; and

– Maximise the impact that Defence Science & Technology provides to Australia’s defence and national security through ongoing and efficient assurance of its value

The Defence S&T

Program Office’s

MISSION, conducted

with our DST and

broader Defence

colleagues, is to:

Assure that DST is continually achieving its

value proposition

8

Maritime National

Security and ISR

Land Cyber and Electronic Warfare

Aerospace Weapons and

Combat Systems

Specialist knowledge, skills and experience that support major defence capabilities across seven research domains

Maritime National

Security and ISR

Land National

Security and ISR

Aerospace Cyber and Electronic Warfare

Major Science and Technology Capabilities

Joint and Operations Analysis

9

10

11

S&T Capabilities Application/Delivery

What S&T capabilities do we need?

What balanced investment is needed to

raise, train and sustain them?

What prioritisation do we place on their

development?

What are the Defence S&T priorities?

What balanced investment is needed in

- support to Land, Maritime, Aerospace,

Joint and Intelligence client domains?

- Short, medium, long term research?

What prioritisation do we place?

12

Our approach

A P3M approach

Aligned with the broader Defence department

Drawing from best practice

Supported by ongoing academic research

13

• Land • Maritime • Aerospace • Joint • Intelligence

Strategic Research Initiatives

S&T Capability Development

Driven by Strategies Considered through

business cases

14

Investment Logic Maps Hypothetical example

Trustworthy ICT

15

Investment Logic Maps Hypothetical example

Trustworthy ICT How? Why?

16

Investment options Investment options

Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding

Strategic Response (Interventions)

Focus Area No.

Activity Description FTE 17/18

$K 17/18

Activity Description FTE 17/18

$ 17/18

Activity Description FTE 17/18

$ 17/18

1. Long term R&D Research into developing trustworthy systems

FA1 In-Government depth in a select area

In-Government depth in a select area

In-Government depth in a select area

2. Shape ICT Supply Policy FA1

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

3. Develop hardware protection prototypes

FA2 Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

4. Awareness Demonstrations on Cyber Hardware Risks

FA3 Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

5. Research to better qualify mainstream security threats

FA1 Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

6. Engagement with Industry/Academia/Govt. Partners

FA2 Deep partnership in a select area, shape and foster the rest

Deep partnership in a select area, shape and foster the rest

Deeper partnerships in multiple focus areas from TRL 0 to 9

7. Publish Research to raise awareness of hardware cyber security threats

FA1 Nil Not Done

Not Done Moderate ability to publish in select areas

High ability to publish in multiple areas

Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option

1.05x

Hypothetical example

17

Investment options Investment options

Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding

Strategic Response (Interventions)

Focus Area No.

Activity Description FTE 17/18

$K 17/18

Activity Description FTE 17/18

$ 17/18

Activity Description FTE 17/18

$ 17/18

1. Long term R&D Research into developing trustworthy systems

FA1 In-Government depth in a select area

In-Government depth in a select area

In-Government depth in a select area

2. Shape ICT Supply Policy FA1

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

3. Develop hardware protection prototypes

FA2 Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

4. Awareness Demonstrations on Cyber Hardware Risks

FA3 Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

5. Research to better qualify mainstream security threats

FA1 Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

6. Engagement with Industry/Academia/Govt. Partners

FA2 Deep partnership in a select area, shape and foster the rest

Deep partnership in a select area, shape and foster the rest

Deeper partnerships in multiple focus areas from TRL 0 to 9

7. Publish Research to raise awareness of hardware cyber security threats

FA1 Nil Not Done

Not Done Moderate ability to publish in select areas

High ability to publish in multiple areas

Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option

1.05x

Hypothetical example

Reduce Base Grow

18

Focus for the future

Complete first pass through the Defence S&T Portfolio

Value Assurance / Benefits Management

Cultural change

Contribute to best practice

Recommended