Lieutenant General Steven Boutelle, US Army (Ret) is Vice President of Cisco’s Global Security and Defense that advises government and commercial customers on business practices and technology solutions.
Before joining Cisco, Boutelle served as the Chief Information Officer of the U.S. Army, responsible for the Army’s worldwide use of information technology. He introduced converged voice, data, and video to the Army, building an enhanced network infrastructure to serve 1.9 million users. He established the Army Knowledge Online portal and the Defense Knowledge Online portal to provide streamlined access to content for 6 million defense users. Through an IT portfolio management program, he reduced the costs of IT systems and applications by half.
Boutelle is a recognized leader, technology evangelist, and mentor. A consistent record of adopting new technologies and streamlining processes to improve productivity and enhance collaboration marks his career in the U.S. Army. He led the U.S. Federal Government in implementing “Secure Network Logon,” with 98 percent of 1.2 million Army users adopting Common Access Cards. He also led compliance with U.S. Office of Management Budget Criteria and President’s Management Agenda, with 100 percent compliance for two years. As an active US Army Officer, he served in various assignments, including the 1st Battalion, 4th Infantry, and the 2nd Battalion, 41st Field Artillery, 3d Infantry Division, the 8th Signal Battalion, 8th Infantry Division, 1st Signal Brigade, Korea, 1st Signal Group, and the Joint Staff of the Chairman of the Joint Chiefs of Staff.
As a teacher and mentor, Boutelle expanded the Army’s education program to incorporate the latest Internet and convergence technologies. He has personally instructed and mentored more than 350 admirals, generals, and senior civilians in networks, communications, web technologies, and information assurance.
Boutelle was named a “Top 100 CIO” by Federal Computer Week in 2006, received the “North American Leadership Award” by Armed Forces Communication and Electronics Association — Rocky Mountains in 2006, and was named “US Department of Defense Executive of the Year” by Government Computer News in 2005.
Previously, Boutelle has served on several boards, including the Defense Science Board (DSB) Task Force for Interoperability and the National Science Center. He was an Outside Director of Finmeccanica DRS from 2009-2012. Currently, Boutelle serves on the boards of both PacStar and ThreatMetrix. He is the Outside Director and Chairman of the Board of Systematic US, a Danish held Company. He is a member of Business Executives for National Security (BENS), The National Academies, Board on Army Science and Technology, The Defense Science Board for Satellite and Tactical Communications.
Boutelle holds a Bachelor of Arts degree in business from the University of Puget Sound, Tacoma, Washington, and Masters in business administration from Marymount University in Arlington, Virginia. He received Doctorate of Law (Hon) from the University of Puget Sound. He is also a graduate of the Army’s Senior Service College and the US Department of Defense System Management College.
Cloud, Privacy and Data Sovereignty
Like corporations, government organizations are increasingly moving to the cloud in the quest for agility, reduced costs, and improved cyber security. Currently, the US Department of Defense (DOD) is using a combination of pure commercial clouds (for things like website hosting), hybrid clouds (to host more sensitive unclassified data) and on-premise clouds (for highly sensitive or classified data) operated by DOD itself. However, the cloud brings new and evolving challenges that do not have simple solutions. For example, data sovereignty and privacy protection have arisen as particularly challenging issues in both a technical and regulatory sense.
Additionally, Security has to be re-thought in cloud environments because the architectures are dynamic. Done right, though, security and compliance can be strengthened in cloud deployments. For example, the cloud's elastic compute features improve the speed at which cybersecurity audits can be carried out. With elastic compute, virtual private clouds spin up rapidly when systems come under pressure, so there is no longer any of that impact from systems filling up and unable to do work.
As cloud adoption accelerates, it is critical to choose trusted vendors with a deep portfolio of security solutions; network, data center & cloud security expertise; and an extensive partner ecosystem to enable a policy-based approach to cloud security management across on-premise/private, public and hybrid clouds.