18
1 Defeating the Threat Before it Arrives Building Cyber Resilience Conference 18-19 August 2015 Investing in and Assuring the Value of Science and Technology for Safeguarding Australia 3 rd PMO Leadership Summit, Melbourne 22 Feb 2017 Dr Mike Davies Chief, S&T Program

Defence science and technology 3rd pmo leadership summit feb 2017

Embed Size (px)

Citation preview

Page 1: Defence science and technology   3rd pmo leadership summit feb 2017

1

Defeating the Threat Before it Arrives Building Cyber Resilience Conference 18-19 August 2015

Investing in and Assuring the Value of Science and Technology for Safeguarding Australia

3rd PMO Leadership Summit, Melbourne 22 Feb 2017

Dr Mike Davies

Chief, S&T Program

Page 2: Defence science and technology   3rd pmo leadership summit feb 2017

2

Structure

Who we are

What is expected of us and why

Our aim

S&T Capabilities and their Application

Our approach – P3M

Your thoughts

Page 3: Defence science and technology   3rd pmo leadership summit feb 2017

3

National leader in safeguarding Australia by delivering valued scientific advice and innovative technology solutions for Defence and national security

Purpose and Roles

Page 4: Defence science and technology   3rd pmo leadership summit feb 2017

4

At A Glance

Page 5: Defence science and technology   3rd pmo leadership summit feb 2017

5

Program Management Context: Clear expectations

2015 First Principles Review Creating One Defence recommendation Defence Science and Technology Organisation “clearly articulate its value proposition”.

2016 Defence White Paper: the alignment of defence strategy, capability and resources is fundamental. The White Paper policy includes growth in external partnerships to “develop innovative technologies and deliver essential capabilities”.

Page 6: Defence science and technology   3rd pmo leadership summit feb 2017

6

Clear expectations

2015 Australian National Audit Office’s (ANAO) Managing Science and Technology Work for Defence: “DSTG has yet to fully embed a more strategic approach to the way it administers its science and technology work”.

Page 7: Defence science and technology   3rd pmo leadership summit feb 2017

7

Our aim

Transform the Defence S&T portfolio, program and project management to:

– Increase the strategic alignment, transparency, accountability and contestability of S&T investment decisions; and

– Maximise the impact that Defence Science & Technology provides to Australia’s defence and national security through ongoing and efficient assurance of its value

The Defence S&T

Program Office’s

MISSION, conducted

with our DST and

broader Defence

colleagues, is to:

Assure that DST is continually achieving its

value proposition

Page 8: Defence science and technology   3rd pmo leadership summit feb 2017

8

Maritime National

Security and ISR

Land Cyber and Electronic Warfare

Aerospace Weapons and

Combat Systems

Specialist knowledge, skills and experience that support major defence capabilities across seven research domains

Maritime National

Security and ISR

Land National

Security and ISR

Aerospace Cyber and Electronic Warfare

Major Science and Technology Capabilities

Joint and Operations Analysis

Page 9: Defence science and technology   3rd pmo leadership summit feb 2017

9

Page 10: Defence science and technology   3rd pmo leadership summit feb 2017

10

Page 11: Defence science and technology   3rd pmo leadership summit feb 2017

11

S&T Capabilities Application/Delivery

What S&T capabilities do we need?

What balanced investment is needed to

raise, train and sustain them?

What prioritisation do we place on their

development?

What are the Defence S&T priorities?

What balanced investment is needed in

- support to Land, Maritime, Aerospace,

Joint and Intelligence client domains?

- Short, medium, long term research?

What prioritisation do we place?

Page 12: Defence science and technology   3rd pmo leadership summit feb 2017

12

Our approach

A P3M approach

Aligned with the broader Defence department

Drawing from best practice

Supported by ongoing academic research

Page 13: Defence science and technology   3rd pmo leadership summit feb 2017

13

• Land • Maritime • Aerospace • Joint • Intelligence

Strategic Research Initiatives

S&T Capability Development

Driven by Strategies Considered through

business cases

Page 14: Defence science and technology   3rd pmo leadership summit feb 2017

14

Investment Logic Maps Hypothetical example

Trustworthy ICT

Page 15: Defence science and technology   3rd pmo leadership summit feb 2017

15

Investment Logic Maps Hypothetical example

Trustworthy ICT How? Why?

Page 16: Defence science and technology   3rd pmo leadership summit feb 2017

16

Investment options Investment options

Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding

Strategic Response (Interventions)

Focus Area No.

Activity Description FTE 17/18

$K 17/18

Activity Description FTE 17/18

$ 17/18

Activity Description FTE 17/18

$ 17/18

1. Long term R&D Research into developing trustworthy systems

FA1 In-Government depth in a select area

In-Government depth in a select area

In-Government depth in a select area

2. Shape ICT Supply Policy FA1

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

3. Develop hardware protection prototypes

FA2 Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

4. Awareness Demonstrations on Cyber Hardware Risks

FA3 Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

5. Research to better qualify mainstream security threats

FA1 Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

6. Engagement with Industry/Academia/Govt. Partners

FA2 Deep partnership in a select area, shape and foster the rest

Deep partnership in a select area, shape and foster the rest

Deeper partnerships in multiple focus areas from TRL 0 to 9

7. Publish Research to raise awareness of hardware cyber security threats

FA1 Nil Not Done

Not Done Moderate ability to publish in select areas

High ability to publish in multiple areas

Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option

1.05x

Hypothetical example

Page 17: Defence science and technology   3rd pmo leadership summit feb 2017

17

Investment options Investment options

Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding

Strategic Response (Interventions)

Focus Area No.

Activity Description FTE 17/18

$K 17/18

Activity Description FTE 17/18

$ 17/18

Activity Description FTE 17/18

$ 17/18

1. Long term R&D Research into developing trustworthy systems

FA1 In-Government depth in a select area

In-Government depth in a select area

In-Government depth in a select area

2. Shape ICT Supply Policy FA1

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

Advise Government and Defence based on expertise specific to National Security Challenges

3. Develop hardware protection prototypes

FA2 Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

Some in-house and contracted prototype development in select areas

4. Awareness Demonstrations on Cyber Hardware Risks

FA3 Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

Demonstrations of advanced hardware threats (existing demos)

5. Research to better qualify mainstream security threats

FA1 Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

Contact research to gauge whats appearing mainstream with some QA

6. Engagement with Industry/Academia/Govt. Partners

FA2 Deep partnership in a select area, shape and foster the rest

Deep partnership in a select area, shape and foster the rest

Deeper partnerships in multiple focus areas from TRL 0 to 9

7. Publish Research to raise awareness of hardware cyber security threats

FA1 Nil Not Done

Not Done Moderate ability to publish in select areas

High ability to publish in multiple areas

Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option

1.05x

Hypothetical example

Reduce Base Grow

Page 18: Defence science and technology   3rd pmo leadership summit feb 2017

18

Focus for the future

Complete first pass through the Defence S&T Portfolio

Value Assurance / Benefits Management

Cultural change

Contribute to best practice