Enterprise Capabilities Descriptions
|
|
- Cornelia Taylor
- 8 years ago
- Views:
Transcription
1 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC CONSULTING 22 CYBER ASSURANCE 23 CYBER ENGINEERING AND INTEGRATION 24 FULL SEPCTRUM CYBERSPACE OPERATIONS 25 CYBER TRAINING AND EXERCISES 3 MISSION ASSURANCE 31 INDEPENDENT VERIFICATION & VALIDATION 32 MISSION PROTECTION 33 QUALITY & SAFETY MANAGEMENT 34 TEST & EVALUATION 4 ENTERPRISE GOVERNANCE 41 ACQUISITION MANAGEMENT 42 COST ESTIMATING AND ANALYSIS 43 ENTERPRISE MANAGEMENT 44 FINANCIAL MANAGEMENT 45 POLICY ANALYSIS AND DECISION SUPPORT 46 PORTFOLIO ANALYSIS 47 STRATEGIC PLANNING & BUSINESS TRANSFORMATION 5 INTELLIGENCE SURVEILLANCE & RECONNAISSANCE 51 SURVEILLANCE AND RECONNAISSANCE 52 INTELLIGENCE 61 LARGE SCALE NETWORK ENGINEERING 62 MOBILE APPLICATIONS DEVELOPMENT 63 MOBILE/WIRELESS RF COMMUNICATIONS SYSTEMS 64 SPECIAL COMMUNICATIONS 65 SECURE MESSAGING 66 TELECOMMUNICATIONS ENGINEERING 7 INTELLIGENCE ANALYSIS & OPERATIONS SUPPORT 71 INTELLIGENCE OPERATIONS 72 INTELLIGENCE ANALYSIS, TARGETING, RESEARCH AND REPORTING 73 SCIENCE & TECHNICAL OPERATIONS, SUPPORT AND REPORTING 74 OPERATIONS SUPPORT 75 INTELLIGENCE TRAINING 8 INFORMATION TECHNOLOGY & DATA ANALYTICS 81 CLOUD COMPUTING 82 DATA ANALYTICS 83 INFORMATION SHARING 84 NETWORK ARCHITECTING 85 SOFTWARE DEVELOPMENT 9 SCIENCE AND ENGINEERING 91 ACOUSTICS 92 ASTRONOMY/ASTROPHYSICS 93 ADVANCED MODELING AND SIMULATION 94 CHEMISTRY/BIOLOGY 95 COMPUTER SCIENCE 96 CRYTOGRAPHY SCIENCE 97 ELECTOMAGNETIC ENGINEERING AND ANALYSIS 98 ENVIRONMENT SCIENCE 99 GEOLOGY 2011 TASC, Inc
2 910 HEALTH SCIENCE 911 HUMAN FACTORS ENGINEERING 912 INDEPENDENT TECHNICAL ASSESSMENT/TECHNOLOGY EVALUATION 913 LASER 914 MATERIAL SCIENCE 915 MATHEMATICS 916 METEOROLOGY 917 NANOTECHNOLOGY 918 NUCLEAR 919 PHYSICS 920 ROBOTICS 2011 TASC, Inc
3 1 Systems Engineering & Integration Capabilities to organize, apply, and deliver engineering knowledge, skills and abilities coupled with disciplined processes and tools for the definition, development, and deployment of systems 11 Lifecycle Systems Engineering Capabilities to apply an Integrated TASC approach for performing the Systems Engineering (SE) function across the program lifecycle SE is the sub-discipline of SE&I concerned with (1) the translation of user needs into architectures, requirements, analysis, standards, and other technical artifacts required to successfully design and build a system as well as (2) conduct of technical studies required for analysis of alternatives (AoA) to ensure optimized solutions that will achieve mission success 12 Lifecycle Systems Integration Capabilities to apply an Integrated TASC approach for performing the Systems Integration (SI) function across the program lifecycle SI is the sub-discipline of SE&I concerned with bringing together component elements into one homogenous system while ensuring that these elements function together properly as a whole in the target environment Lifecycle Integration includes systems integration, verification, validation, transition to operations, and configuration management 13 Mission Integration Capabilities to provide Systems Engineering and Integration planning and analysis, enterprise management, and program protection for a broad range of Intelligence, Defense and Civil missions to ensure user and mission needs are satisfied 14 Disciplines There are a broad range of engineering disciplines that are critical to SE&I that TASC routinely provides to our customers including: Systems, IT, Electrical, Mechanical, Structural, Software, Aerospace, Test & Evaluation, Logistics, Enterprise, and Process engineering 15 Domains Full Lifecycle Systems Engineering and Integration for a broad range of domains in the Intelligence, Defense, and Civil arenas to include C4ISR, ground, air, and space systems, and IT systems 2 Cyber Capabilities related to Cyber Security operations including Consulting, Assurance, Engineering and Integration, Full Spectrum Operatinos and Trainig 21 Cyber Strategic Consulting Subject Matter Expert support in strategy, policy, budgeting and program support 2011 TASC, Inc
4 22 Cyber Assurance Capabilities and services to test enterprise or system cybersecurity through vulnerability and penetration testing, and through these assessment provide recommendations to protect, detect and respond to cyber threats, such as intrusion detection & firewalls, host-based security, data loss prevention, compliance management, identity management and biometrics, access controls, and mission assurance/continuity of operations 23 Cyber Engineering & Integration Cyber engineering and integration support through a range of development methods (eg, SAGE, Agile/Rapid development) to produce solutions for meeting defend, attack and exploit requirements -- including software/hardware assurance and attack/exploitation capability, tool development (Defense/Attack/Exploitation), cyber effects planning and design, technical intelligence engineering, test & evaluation and certification and accreditation 24 Full Spectrum Cyber Operations Full spectrum cyber operational support (Defense/Attack/Exploitation) to operations centers (Computer Emergency Response Teams, Security Operations Centers, Cyber Intelligence Fusion Centers) in targeting, analytics, decision support, multi-intelligence fusion, network discovery and mapping, situational awareness, visualization, modeling and simulation, and mission reliability and assurance 25 Cyber Training and Exercises Capabilities in cyber education, training, and awareness through cyber attack/defend/exploit exercises, cyber ranges operations, cyber mission preparation and our Cyber Warrior 3 Mission Assurance Capabilities to apply engineering level assurance processes over the lifecycle of a program to identify and mitigate deficiencies that could affect mission success using disciplined application of general system engineering, quality, performance measurement & analysis, and process management to achieve mission success 31 Independent Verification & Validation Capability to independently identify and / or remove defects to ensure a system complies with its stated requirements while meeting the user needs 32 Mission Protection Capabilities to augment the Lifecycle Security portfolio of processes designed to address the unique and sensitive requirements of Special Access Programs (SAP) which often require linkage of Intelligence Support to Operations (ISO) and exquisite management of External Interfaces and Transactions (EI&T) 2011 TASC, Inc
5 33 Quality and Safety Management Capabilities to apply standardized approaches for evaluating the processes, products, services of an organization through audits of the implementation of the processes and the work products of the process against documented standards, processes, and procedures 34 Test & Evaluation Capabilities to achieve formal verification of a system s ability to meet stated requirements 4 Enterprise Governance Capabilities through which the sound application of judgment is optimally applied in managing resources to meet enterprise objectives 41 Acquisition Management Capabilities to manage the efforts of all personnel responsible for an acquisition assuring coordinated and integrated actions, and comprehensive planning to meet acquisition needs in a timely manner and at a reasonable cost Also includes the sub-disciplines of Earned Value Management and Schedule Analysis 42 Cost Estimating and Analysis Capability to create comprehensive, auditable, and unbiased estimates of the cost of a system or element including development of realistic and defensible budget profiles over time for programs and systems 43 Enterprise Management Capabilities to facilitate the identification and communication of enterprise objectives, the definition and allocation of authorities and responsibilities, and management of resources and training to effectively realize anticipated benefits All governance levels are linked together to ensure that each organizational action is ultimately aligned with organizational strategy 44 Financial Management Capabilities to manage the financial resources of an organization including the sub-disciplines of Planning Programming Budgeting and Execution, Audit Preparation, Internal Controls, and Accounting Operations 45 Policy Analysis and Decision Support Capabilities to provide support to government decision makers concerning development of policy options, analysis of trades among policy alternatives and support for decisions at senior government levels 46 Portfolio Analysis Capabilities to centrally manage a collection of projects and/or programs in a coordinated way to achieve specific strategic organization goals and objectives 2011 TASC, Inc
6 47 Strategic Planning and Business Transformation Capabilities to shape and focus enterprise/organizational priorities through the development and documentation of strategic goals, objectives, values, and expected outcomes, while incorporating internal and external influences These capabilities also support the development and implementation of specific investment management programs and initiatives to deliver critical capabilities designed to improve business, enterprise, and mission operations Business Transformation capabilities serve human capital, resource, and business process managers through process reengineering and performance management activities to achieve more efficient, effective, and successful business and mission operations 5 Intelligence, Surveillance & Reconnaissance Capabilities to design, develop, integrate and operate sensors, assets, processing, exploitation, and dissemination systems in direct support of current and future operations 51 Surveillance and Reconnaissance Capabilities to design ISR sensor systems and packages for manned and unmanned aerial systems, national systems and maritime systems Sensors, phenomenology, models and awareness systems comprise the key capability elements 52 Intelligence Capabilities to design, develop, and integrate systems and tools that are used to exploit different portions of intelligence domains such as HUMINT, SIGINT, MASINT, GEOINT, etc, including fusion and attrition 6 Communications Systems Capabilities related to the engineering and integration of communications systems that employ electromagnetic and/or optical transmissions of signals across both wired and wireless systems in terrestrial, air, and space environments including any associated protection/encryption requirements 61 Large Scale Network Engineering Capability to engineer large scale computer networks to support large mission system or enterprise data and computing needs 62 Mobile Applications Development Capabilities to develop robust software applications for mobile platforms that commonly use wireless communication technologies in ad-hoc networks 2011 TASC, Inc
7 63 Mobile / Wireless RF communications systems Capabilities related to engineering communication systems based on mobile hardware platforms, using wireless RF technologies, ad-hoc networks and similar capabilities to produce robust, secure, and agile communications systems 64 Special Communications Capabilities to engineer communications systems with low probability of detection / low probability of interception or other unique characteristics associated with secure mission communications 65 Secure Messaging Capabilities to engineer systems dedicated to mission secure messaging in operational environments 66 Telecommunications Engineering Capabilities to engineer systems designed for general telephony, multi-media, computer, and computer network systems 7 Intelligence Analysis, Operations Support and Reporting Capabilities associated with Intelligence analysis, analytics and tradecraft and the support of Intelligence Operations including reporting 71 Intelligence Operations Capabilities to support intelligence operational activities, field operations, watch center support, training support and similar functions 72 Intelligence Analysis, Research, Analysis and Reporting Capabilities to develop, conduct, modify or extend tools and methods that support Intelligence research and analysis The development of intelligence tradecraft techniques and methods Capabilities to support intelligence research and analysis in support the various INTs (eg SIGINT, GEOINT, HUMINT, MASINT, OSINT, All Source, etc) 73 Scientific & Technical Operations, Support and Reporting Capabilities to develop, conduct, modify or extend scientifically and/or technically-based collection tools and systems to support and conduct intelligence operations; including intelligence collection operations incorporating various S&T-related -INTs, such as SIGINT, FISINT), COMINT, GEOINT, MASINT and reporting 74 Operations Support Capabilities that assist a wide range of operational systems and programs operate at peak efficiency and effectiveness This support includes: program and financial management, systems development, hardware/software engineering, test engineering, security, logistics, and field station operations 2011 TASC, Inc
8 75 Intelligence Training The capability to provide customers with the acquisition of knowledge, skills and competencies as a result of teaching key skills related to current intelligence analysis, intelligence operations, engineering, and breakout technology areas Operations training, Cyber Warrior and Cost estimating are just a few of the training capability areas supported In addition to the basic training, courses are presented to maintain, upgrade and update skills 8 Information Technology/Data Analytics Capabilities to apply advanced technologies to the processing and manipulation of digital information 81 Cloud Computing Capabilities to implement cloud computing strategies for IT operations Areas defined by NIST cloud computing definition 82 Data Analytics Capabilities to manage manipulate and analyze very large data sets to support analysis, operations or decision making 83 Information Sharing Capabilities to support government programs to securely share information across program and agency boundaries to increase operational effectiveness while maintaining adequate controls and protections for the information 84 Network Architecting Capabilities to design and implement data networks through the correct application of processes, tools, and IT technologies 85 Software Development Capabilities to architect design and develop software applications and tools to support TASC business models 9 Science and Engineering 91 Acoustics Capability to apply the science of acoustics to our customer s misisons 92 Astronomy/Astrophysics Capability in the science of astronomy and astrophysics to support customer missions 93 Advanced Modeling and Simulation Capability to apply the scientific discipline and tools of advanced modeling and simulation to support decision making or solve specific problems 94 Chemistry/Biology Capability to apply the scientific discipline and tools of chemistry and biology to our customer s missions 95 Computer Science Capability to apply fundamental computer science techniques to our customers missions 96 Cryptography Science Capability to apply fundamental mathematical techniques and algorithms in the field of cryptography to support our customers missions 2011 TASC, Inc
9 97 Electromagnetic Engineering and Analysis Capability to apply fundamental electric engineering principles to solve problems in the field of electromagnetics 98 Environmental Science Capability to apply fundamental scientific principles and knowledge to solving problems relating to natural environments 99 Geology Capability to apply fundamental principles and knowledge in the field of geology 910 Health Science Capability to apply the scientific discipline and tools of health sciences including diagnostics, health IT, physiology, and disease tracking 911 Human Factors Capability to apply the scientific discipline and tools of human factors engineering to provide assessments or solve specific problems 912 Independent Technical Assessment / Technology Evaluation Capability to assess the technical design, operation or implementation of a complex system Capability to evaluate technology and its potential to meet customer requirements 913 Laser Capability to apply the scientific discipline and tools of laser sciences to provide assessments or solve specific problems 914 Materials Science Capability to apply the scientific discipline and tools to the field of material science 915 Mathematics Capability to apply mathematic concepts to a variety of problems 916 Meteorology Capability to apply the scientific discipline and tools of meteorology to provide assessments or solve specific problems 917 Nanotechnology Capability to apply fundamental principles and knowledge in the domain of nanotechnology as applied to our customers missions 918 Nuclear Capability to apply the scientific discipline and tools of nuclear sciences to provide assessments or solve specific problems 919 Physics Capability to apply the scientific principles of physics to solve customer problems 920 Robotics Capability to apply fundamental principles and knowledge in the field of robotics to support customer missions 2011 TASC, Inc
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationTask Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationHHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
More informationCIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging
More informationArmy Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
More informationA Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
More informationSECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
More informationData Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationAmes Consolidated Information Technology Services (A-CITS) Statement of Work
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationSECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
More informationTOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
More informationSECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
More informationCommercial Price List
Commercial Price List Effective May 14, 2010 Scope The Labor rates listed herein are based on the calendar year and applicable to Time-and-Material or Firm Fixed Price proposals for the following commercial
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationAn Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationCHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE THREAT INTELLIGENCE 1 THREAT INTELLIGENCE How it applies to our clients, and discuss some of the key components and benefits of a comprehensive threat intelligence strategy. Threat
More informationIntroduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
More informationCAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary
UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationNATIONAL SUN YAT-SEN UNIVERSITY
NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures
More information7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationImplementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
More informationNASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
More informationComputer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationdefense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
More information---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
More informationNational Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
More informationSTATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has
More informationSECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
More informationInformation Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189
CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,
More informationG2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
More informationRUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationCyber Security Solutions Integrated. Proactive. Resilient.
Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationCYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
More informationCyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
More informationLaw Enforcement Commercial Price List ManTech International Corporation January 2015
Law Enforcement Commercial Price List ManTech International Corporation January 2015 Page - 1 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationNSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas
The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or
More informationDepartment of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
More informationThe President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
More informationServices we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com
EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership
More informationStrategic Plan On-Demand Services April 2, 2015
Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on
More informationLooking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
More informationSAIC Corporate and Small Business Introduction
SAIC Corporate and Small Business Introduction April 2016 Michael A. Townsend, Sr. Director, SBLO SAIC Small Business Development and Utilization Office SAIC. All rights reserved. SAIC Overview Leading
More informationworkforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework
introduction The National Initiative for Cybersecurity Education (NICE) is a nationally coordinated effort focused on cybersecurity awareness, education, training, and professional development. Two Executive
More informationTHE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK USER GUIDE Employers Workforce Framework User Guide Welcome to the User Guide! The Workforce Framework helps Employers to recruit from a larger pool of more
More informationPage 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer Technology: Your Need to Know
Lecture Outline Computer Technology: Your Need to Know Objectives In this discussion, you will learn to: Describe the activities of information systems professionals Describe the technical knowledge of
More informationESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
More informationFaculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity
Faculdade de Direito, Lisboa, 02-Jul-2014 The Competitive Advantage of Cybersecurity Thales Key highlights (I) A global company with 65,000 employees and 14,2 billion in revenues, R&D 2,5 billion * We
More informationIT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
More informationFACULTY OF ENGINEERING AND INFORMATION SCIENCES
FACULTY OF ENGINEERING AND INFORMATION SCIENCES ENGINEERING INFORMATION & COMMUNICATION TECHNOLOGY MATHEMATICS & STATISTICS PHYSICS ENGINEERING Master of Engineering go.uow.edu.au/meng 083844B ENTRY REQUIREMENTS
More informationBSc in Information Systems & BSc in Information Technology Degree Programs
BSc in Information Systems & BSc in Information Technology Degree Programs General Sir John Kotelawala Defence University is about to start the above mentioned degree programs at Hambanthota Southern Campus
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationCareer Tracks- Information Technology Family
Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services
More informationA Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
More informationOFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
More informationThe Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
More informationDepartment of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
More informationCybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
More informationHow SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
More informationCyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
More informationSession 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
More informationAdvanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationTRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
More informationCorporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
More information11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3
11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.
More informationBEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Northrop Grumman Corporation Trusted, Innovative, World-Class Supply Chain INTERVIEWS Kevin Engfer Director, Supplier Mission Assurance, Northrop Grumman
More informationAbout Our 2015 WTA Cyber Security Speakers and Sessions
About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationPosition Descriptions. Aerospace
Position Descriptions Aerospace Aerospace Engineering? Aeromechanics / Flight Control / Flight Qualities Engineer Predict, analyze, and verify air vehicle flight dynamics including aircraft aerodynamics,
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationThe following comments are being jointly presented by TASC and BTS (Battlefield Telecommunications Systems, LLC.)
Introduction: TASC and BTS are pleased to submit our comments in response to the Department of Commerce National Telecommunications and Information Administration Docket No: 121031596-2596-01 RIN: 0660-XC003
More informationNICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
More informationSECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationDefending against modern threats Kruger National Park ICCWS 2015
Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter
More informationThe ICS Approach to Security-Focused IT Solutions
The ICS Approach to Security-Focused IT Solutions for the State of Mississippi ICS offers a dynamic and comprehensive portfolio of security-driven IT solutions for the State of Mississippi. Taking a proactive
More informationCyber Security. Doug Houseman Doug@Enernex.com. Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM
Cyber Security Engineering Consulting Research Modeling Simulation Security Doug Houseman Doug@Enernex.com The Practical Grid Visionaries TM Warnings The costs given are based on prior projects They may
More informationCloud Computing Technologies Achieving Greater Trustworthiness and Resilience
Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience Cloud Standards Customer Council Public Sector Cloud Summit March 24, 2014 Dr. Ron Ross Computer Security Division Information
More informationTriangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
More informationNational Cybersecurity Assessment and Technical Services
National Cybersecurity Assessment and Technical Services Updated: September 9, 2015 NCATS Program Overview Offer Full-Scope Red Team/Penetration Testing Capabilities through two primary programs: Risk
More informationDISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO
ELBIT SYSTEMS Jefferies Global Industrials Conference - August 2014 Joseph Gaspar EVP & CFO AT A GLANCE HEADQUARTED ISRAEL with International Operations 11,700 EMPLOYEES 50% engineers TEL AVIV & NASDAQ
More informationInformation and Understanding (IFU) Overview
Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May
More informationDefending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
More information