Carey: DOD’s mobile strategy highpoints

2012_07_IMG_10091 DOD Deputy Chief Information Officer Rob Carey (Photo: David Stegon/Fedscoop)

Department of Defense Deputy Chief Information Officer Rob Carey further outlined the department’s mobile strategy during AFCEA DC’s Defense & Security Mobile Technologies Symposium on Friday.

Carey said the concept of working anyone on any device has shaped how the department is moving ahead in the mobile space as military needs the ability to access information wherever they are.


“We’re not chained to our desks anymore,” he said. “I don’t care where our people are doing work.”

The department released a mobile strategy on June 15 that identifies information technology goals.

Carey highlighted some of the key points of the strategy in his presentation that include:

1. Develop enterprise mobility requirements

  • Guides product development and evaluation process
  • Develop enterprise architecture for mobile devices

2. Dynamic process for adapting mobile applications

  • Facilitate rapid development on innovative solutions
  • Application lifecycle management
  • Keep pace with industry
  • Consider new cyber threat environment

3. Develop mobile policy and standards

  • Ensure the secure adoption and proper piloting and use of mobile devices
  • Created BYD and GFE device use policy
  • Create mobile device management and mobile application management policy
  • Share emerging standards by participating in wireless networking standards-related bodies
  • Choices, but a limited number of choices
  • DoD CMD way ahead aligned with Digital federal strategy

4. Evolve spectrum management

  • Provide spectrum efficiency policies
  • Partner with the academic community and industry to develop new technologies to maximize the use of available spectrum
  • Develop mechanisms to rapidly transition technology into programs of record

5. Establish a wireless security architecture

  • Create an overall identity based defense-in-depth strategy
  • Enable the central management of mobile devices, applications and network connections
  • Employ PKI security, access, and identification controls at the network, device and application levels
  • Publish security reference guides for mobile device implementation

6. Establish a mobility solution delivery lifecycle

  • Establish a customizable process with checkpoints at critical phases to ensure quality, security and timely delivery
  • Establish a mobile device lifecycle management service
  • Establish a common mobile application development framework
  • Provide an enterprise mobile application environment
  • Education and train mobile device users

7. Develop mobility risk analysis methodology

  • Establish a repeatable process to assess, articulate and mitigate systemic risk of an enterprise mobility solution

8. Institute a mobility solution certification process

  • Develop a streamlined and efficient mobile solution certification and accreditation process

Latest Podcasts