Defence science and technology 3rd pmo leadership summit feb 2017
-
Upload
mike-davies -
Category
Leadership & Management
-
view
72 -
download
2
Transcript of Defence science and technology 3rd pmo leadership summit feb 2017
1
Defeating the Threat Before it Arrives Building Cyber Resilience Conference 18-19 August 2015
Investing in and Assuring the Value of Science and Technology for Safeguarding Australia
3rd PMO Leadership Summit, Melbourne 22 Feb 2017
Dr Mike Davies
Chief, S&T Program
2
Structure
Who we are
What is expected of us and why
Our aim
S&T Capabilities and their Application
Our approach – P3M
Your thoughts
3
National leader in safeguarding Australia by delivering valued scientific advice and innovative technology solutions for Defence and national security
Purpose and Roles
4
At A Glance
5
Program Management Context: Clear expectations
2015 First Principles Review Creating One Defence recommendation Defence Science and Technology Organisation “clearly articulate its value proposition”.
2016 Defence White Paper: the alignment of defence strategy, capability and resources is fundamental. The White Paper policy includes growth in external partnerships to “develop innovative technologies and deliver essential capabilities”.
6
Clear expectations
2015 Australian National Audit Office’s (ANAO) Managing Science and Technology Work for Defence: “DSTG has yet to fully embed a more strategic approach to the way it administers its science and technology work”.
7
Our aim
Transform the Defence S&T portfolio, program and project management to:
– Increase the strategic alignment, transparency, accountability and contestability of S&T investment decisions; and
– Maximise the impact that Defence Science & Technology provides to Australia’s defence and national security through ongoing and efficient assurance of its value
The Defence S&T
Program Office’s
MISSION, conducted
with our DST and
broader Defence
colleagues, is to:
Assure that DST is continually achieving its
value proposition
8
Maritime National
Security and ISR
Land Cyber and Electronic Warfare
Aerospace Weapons and
Combat Systems
Specialist knowledge, skills and experience that support major defence capabilities across seven research domains
Maritime National
Security and ISR
Land National
Security and ISR
Aerospace Cyber and Electronic Warfare
Major Science and Technology Capabilities
Joint and Operations Analysis
9
10
11
S&T Capabilities Application/Delivery
What S&T capabilities do we need?
What balanced investment is needed to
raise, train and sustain them?
What prioritisation do we place on their
development?
What are the Defence S&T priorities?
What balanced investment is needed in
- support to Land, Maritime, Aerospace,
Joint and Intelligence client domains?
- Short, medium, long term research?
What prioritisation do we place?
12
Our approach
A P3M approach
Aligned with the broader Defence department
Drawing from best practice
Supported by ongoing academic research
13
• Land • Maritime • Aerospace • Joint • Intelligence
Strategic Research Initiatives
S&T Capability Development
Driven by Strategies Considered through
business cases
14
Investment Logic Maps Hypothetical example
Trustworthy ICT
15
Investment Logic Maps Hypothetical example
Trustworthy ICT How? Why?
16
Investment options Investment options
Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding
Strategic Response (Interventions)
Focus Area No.
Activity Description FTE 17/18
$K 17/18
Activity Description FTE 17/18
$ 17/18
Activity Description FTE 17/18
$ 17/18
1. Long term R&D Research into developing trustworthy systems
FA1 In-Government depth in a select area
In-Government depth in a select area
In-Government depth in a select area
2. Shape ICT Supply Policy FA1
Advise Government and Defence based on expertise specific to National Security Challenges
Advise Government and Defence based on expertise specific to National Security Challenges
Advise Government and Defence based on expertise specific to National Security Challenges
3. Develop hardware protection prototypes
FA2 Some in-house and contracted prototype development in select areas
Some in-house and contracted prototype development in select areas
Some in-house and contracted prototype development in select areas
4. Awareness Demonstrations on Cyber Hardware Risks
FA3 Demonstrations of advanced hardware threats (existing demos)
Demonstrations of advanced hardware threats (existing demos)
Demonstrations of advanced hardware threats (existing demos)
5. Research to better qualify mainstream security threats
FA1 Contact research to gauge whats appearing mainstream with some QA
Contact research to gauge whats appearing mainstream with some QA
Contact research to gauge whats appearing mainstream with some QA
6. Engagement with Industry/Academia/Govt. Partners
FA2 Deep partnership in a select area, shape and foster the rest
Deep partnership in a select area, shape and foster the rest
Deeper partnerships in multiple focus areas from TRL 0 to 9
7. Publish Research to raise awareness of hardware cyber security threats
FA1 Nil Not Done
Not Done Moderate ability to publish in select areas
High ability to publish in multiple areas
Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option
1.05x
Hypothetical example
17
Investment options Investment options
Option 1 - 5% Reduction Option 2 - Base Case Option Option 3 - Growth 5% increase Funding
Strategic Response (Interventions)
Focus Area No.
Activity Description FTE 17/18
$K 17/18
Activity Description FTE 17/18
$ 17/18
Activity Description FTE 17/18
$ 17/18
1. Long term R&D Research into developing trustworthy systems
FA1 In-Government depth in a select area
In-Government depth in a select area
In-Government depth in a select area
2. Shape ICT Supply Policy FA1
Advise Government and Defence based on expertise specific to National Security Challenges
Advise Government and Defence based on expertise specific to National Security Challenges
Advise Government and Defence based on expertise specific to National Security Challenges
3. Develop hardware protection prototypes
FA2 Some in-house and contracted prototype development in select areas
Some in-house and contracted prototype development in select areas
Some in-house and contracted prototype development in select areas
4. Awareness Demonstrations on Cyber Hardware Risks
FA3 Demonstrations of advanced hardware threats (existing demos)
Demonstrations of advanced hardware threats (existing demos)
Demonstrations of advanced hardware threats (existing demos)
5. Research to better qualify mainstream security threats
FA1 Contact research to gauge whats appearing mainstream with some QA
Contact research to gauge whats appearing mainstream with some QA
Contact research to gauge whats appearing mainstream with some QA
6. Engagement with Industry/Academia/Govt. Partners
FA2 Deep partnership in a select area, shape and foster the rest
Deep partnership in a select area, shape and foster the rest
Deeper partnerships in multiple focus areas from TRL 0 to 9
7. Publish Research to raise awareness of hardware cyber security threats
FA1 Nil Not Done
Not Done Moderate ability to publish in select areas
High ability to publish in multiple areas
Options Minimal Resourcing Option 0.95x Base Case Option x Maximum Resourcing Option
1.05x
Hypothetical example
Reduce Base Grow
18
Focus for the future
Complete first pass through the Defence S&T Portfolio
Value Assurance / Benefits Management
Cultural change
Contribute to best practice
…