The Wayback Machine - https://web.archive.org/web/20120510072701/https://cloudcomputing.sys-con.com/node/1994299

Welcome!

Cloud Expo Authors: David Deans, Jeremy Geelan, Liz McMillan, Janakiram MSV, Cloud Ventures

Related Topics: Cloud Expo, Web 2.0, Security, GovIT

Cloud Expo: Article

Cloud Expo New York Speaker Profile: Jill T. Singer – NRO

Jill Tummler Singer – CIO at the National Reconnaissance Office

With Cloud Expo 2012 New York (10th Cloud Expo) now under six weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...

We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they written and/or said about the Cloud that is transforming the world of Enterprise IT, side by side with the exploding use of enterprise Big Data – processed in the Cloud – to drive value for businesses...?


CLOUD EXPO SPEAKER NAME: Jill Tummler Singer

TWITTER: n/a

COMPANY: National Reconnaissance Office (www.nro.gov)

10TH CLOUD EXPO SESSION TITLE: Looking for the Right Answers in the Clouds

SESSION DESCRIPTION: http://cloudcomputingexpo.com/event/session/1618

BRIEF BIOGRAPHY: Jill Tummler Singer is CIO for the National Reconnaissance Office (NRO), which as part of the 16-member Intelligence Community plays a primary role in achieving information superiority for the U.S. Government and Armed Forces.

A DoD agency, the NRO is staffed by DoD and CIA personnel. It is funded through the National Reconnaissance Program, part of the National Foreign Intelligence Program. Prior to joining the NRO, Singer was Deputy Chief Information Officer at the Central Intelligence Agency (CIA), where she was responsible for ensuring CIA had the information, technology, and infrastructure necessary to effectively execute its missions. Prior to her appointment as Deputy CIO, she served as the Director of the Diplomatic Telecommunications Service (DTS), United States Department of State, and was responsible for global network services to US foreign missions.

She has served in several senior leadership positions within the Federal Government. She was the head of Systems Engineering, Architecture, and Planning for CIA's global infrastructure organization. She served as the Director of Architecture and Implementation for the Intelligence Community CIO and pioneered the technology and management concepts that are the basis for multi-agency secure collaboration. She also served within CIA's Directorate of Science and Technology.

BLOG: Jill's most recent articles can be see here jillsinger.ulitzer.com/


RECENT CLOUD COMPUTING QUOTE:

"The NRO Cloud strategy won’t be too different from how other Federal agencies adopt Cloud Computing.

Most agencies processing classified information are focused on private clouds versus public clouds for security and information management/assurance reasons. Over time, though, I believe federal community clouds will emerge, as will private hybrid clouds, which allow agencies to maintain a private space as well as take advantage of federal community clouds.

The NRO Cloud will be implemented in four phases over the course of 6 years. It’s a complex migration necessarily paced to meet federal budget processes, existing acquisition commitments, and mission service imperatives."


[from "Is Cloud Computing for Real?"]

More Stories By Jeremy Geelan

Jeremy Geelan is President & COO of Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences both in North America and overseas. He is executive producer and presenter of Cloud Expo's "Power Panels" on SYS-CON.TV.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Cloud Expo Breaking News
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they w...
With BigDataExpo 2012 New York (www.BigDataExpo.net), co-located with 10th Cloud Expo, now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, w...
For many of the same reasons that Software-as-a-Service is catching on with enterprise buyers, delivering web services on top of Infrastructure-as-a-Service architectures is appealing to the SaaS developers. Operational agility, lower CapEx, and a broad array of tools and services are on tap that make both public and private IaaS clouds a great platform to build on. But how do you do this securely, especially in the public cloud where you have no access to the network or hypervisor your servers ...
While cloud-based communications include a complex web of ports and protocols, typically 85 percent of the traffic flowing in and out of an organization through the cloud is email and web, including identity services. Taking more of your business and business processes to the cloud begins with knowing your data and ensuring that your existing IT security controls on these major traffic channels extend well into cloud models. In his session at the 10th International Cloud Expo, Ramon Peypoch VP...
It’s easy to lose your head in the clouds. While virtualization has provided a way to satiate the need for on-demand solutions, it is easy to lose sight of the appropriate architecture when being allured to the sky. In his session at the 10th International Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will go back to the basics and take a practical approach to solution building: how to structure your application to take advantage of hybrid environments and provide the...
The move to cloud-based applications has undeniably delivered tremendous benefits. However, the associated distribution creates various challenges from the quality perspective: End-to-end tests need to pass through multiple dependent systems, which are commonly unavailable, evolving, or difficult-to-access for testing. Accessing such systems often involves transaction and bandwidth fees. Teams need to test and tune the system under test against a realistic and broad range of performance and ...
For years, IT departments have organized their processes, employees, and business relationships around owning and operating the core IT assets in an enterprise. The current wave of cloud services can have a powerful effect on enterprise IT, with the potential for significant cost savings and operational efficiencies. To achieve these benefits, IT departments will have to integrate new ways of thinking about how IT resources are delivered. In his general session at the 10th International Cloud ...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they w...
In spite of the great strides the cloud industry has made in addressing security and integration concerns, large enterprises (e.g., banks, insurance companies, health care firms) continue to be reluctant to adopt the cloud for mission-critical applications. Further, resistance to cloud adoption is now at least as much an issue of misaligned incentives and fear of the unknown as it is about legitimate technology concerns. Breaking the impasse on mission-critical apps often can't be done directl...
Information Security and Risk has become a top concern of IT organizations and consumers alike. Concern about inadequate Info Security remains the #1 obstacle to greater adoption of Cloud Computing, according to Intel’s research. The rapid growth of Mobile and IP-connected Embedded devices, Cloud Computing, Social Networks, and “Consumerization of IT” is being met with, and in some cases contributing to, an escalating number and complexity of Cyber-threats. Tenants of the cloud need the ability ...