Monday, June 6, 2009

Secure Cloud Computing on Federal News Radio

Last week the Trezza Media Group, Flyzik Group and Federal News Radio combined to produce an outstanding Federal Executive Forum on Secure Cloud Computing. Moderated by Jim Flyzik, panelist included:
  • Henry Sienkiewcz-Technical Program Director, Computer Services, Defense Information Systems Agency 
  • Mr. Ronald Bechtold-Army Architecture Integration Center, at Headquarters, Department of the Army, Chief Information Office/G6 
  • Curt Aubley-Technology Officer CTO Operations & Next Generation Solutions, Lockheed Martin Information Systems & Global Services
  • Dale Wickizer-Chief Technology Officer-Public Sector, NetApp, Inc.
  • Aileen Black- Vice President of Public Sector, VMware Inc.
Key points I gleaned from the discussion include:
  • Cloud Computing has provided an inflection point in government information technology that is changing the paradigm for delivering services
  • The biggest challenge to adopting cloud computing is in re-educating the workplace. 
  • The reduction is cost and increase in efficiency have proven to be key to the success of cloud computing
  • DISA has shown that a STIG’ed or Non-STIG’ed, Windows or LAMPs, test and evaluation  environment can be provisioned in the DoD in 24 hours. Unfortunately, 23 of those hours involves moving the money.
  • A new DISA project, DISA Extended Edge Presence (DEEP), has been launched in order to quickly deliver applications and content to “dis-enfranchised” DoD users
  • Cloud computing allows for end-to-end infrastructure visibility, providing an ability to fight through a cyber attack.
  • DISA is developing a host-tenant model for applications and application certifications.  Using this model, tenant application in “DISA decks” will inherit the infrastructure certification. Using this model, the application developer will only be responsible for accrediting the application stack.

Video and audio of the entire discussion is available online at:
Follow me on
Follow me at


Phone number*
Your Message

Latest posts


2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...


My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...


What’s New in Puppet 5?

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration man...


5 Reasons Why Ansible is the Best CM Tool Out There?

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT org...


Machine learning APIs for Google Cloud Platform

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP i...


What Is The Most Important Part of Architecture?

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the desi...


Cloud migration best practice Part 4: Executing the migration

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifyin...


Cloud Migration Best Practice Part 3: Application Portfolio Analysis

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If y...


Why Use Immutable Storage?

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the wo...


CLOUD ACT: What Does That Mean for Your Cloud Storage

When Congress names a law after you, it’s getting serious.  That is where we are now with cloud computing.  The Clari...