CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
|
|
|
- Roderick Maximillian Eaton
- 10 years ago
- Views:
Transcription
1 CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1
2 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science Board Observations Cybersecurity Policy Overview Cybersecurity in the DoD Acquisition Lifecycle Sustainment vs Cybersecurity DAU CyberSecurity Courses Take Aways How DAU Can Help 2
3 Questions How vulnerable and resilient are DoD systems against the Cyber threat? Should Cybersecurity be treated as a design consideration in DoD acquisition programs? Who in the acquisition workforce needs to be involved in addressing the Cyber threat? 3
4 Cybersecurity Owners & Stakeholders G2 - Intel It s Hacking! It s Network Defense! G3 - Ops PM SE G6 CIO Cybersecurity is Operational! It s Electronic Warfare! Cybersecurity It s Program Protection! IT T&E LOG CON 4
5 Defense Science Board CyberSecurity Observations Current DoD actions, though numerous are fragmented. Thus DoD is not prepared to defend against this threat. DoD Red Teams, using cyber attack tools which can be downloaded from the internet, are very successful at defeating our systems With present capabilities and technology it is not possible to defend with confidence against the most sophisticated cyber attacks. It will take years for the Department to build an effective response to the cyber threat. 5 Source: DoD Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat. (January 2013)
6 DoDI Cybersecurity Adopts the term Cybersecurity in lieu of Information Assurance Extends applicability to all DoD information technology processing DoD information Emphasizes operational resilience, integration, and interoperability Leverages and builds upon numerous existing Federal policies and standards so we have less DoD policy to write and maintain Adopts common Federal Cybersecurity terminology so we are all speaking the same language Transitions to the newly revised NIST SP Security Control Catalog Incorporates Cybersecurity early and continuously throughout the acquisition lifecycle 6
7 Operational Resilience, Integration, and Interoperability Operational Resilience 1. Information and computing services are available to authorized users whenever and wherever needed 2. Security posture is sensed, correlated, and made visible to mission owners, network operators, and to the DoD Information Enterprise 3. Hardware and software have the ability to reconfigure, optimize, selfdefend, and recover with little or no human intervention Integration and Interoperability 1. Cybersecurity must be fully integrated into system life cycles and will be a visible element of IT portfolios. 2. Interoperability will be achieved through adherence to DoD architecture principles 3. All interconnections of DoD IT will be managed to minimize shared risk 7
8 DoDI Risk Management Framework (RMF) for DoD IT New approach for DoD to manage Cybersecurity risk RMF adds another dimension to the DoD Risk Management Process A 6 step process that emphasizes continuous monitoring and timely correction of deficiencies Adopts NIST s Risk Management Framework, used by Civil and Intelligence communities Moves from a checklist-driven process to a risk based approach Embeds the RMF steps and activities in the DoD Acquisition Lifecycle Promotes DT&E and OT&E integration Implements Cybersecurity via security controls vice numerous policies and memos Supports and encourages use of automated tools Enclosure 8 defines the timeline to transition from DIACAP to RMF 8
9 RMF and Cybersecurity Reciprocity Definition: Mutual agreement among participating enterprises to accept each other s security assessments in order to reuse information system resources and/or to accept each other s assessed security posture in order to share information. If applied appropriately, reciprocity will reduce: Redundant testing Redundant assessment and documentation Overall costs in time and resources 9
10 Cybersecurity & DoDI Prevention of damage to, protection of, and restoration of computers, electronic communications systems, wire communication, and electronic communication, including information contained therein DoDI Required by DoDI Enclosure 11, Section 6. Cybersecurity All acquisitions of systems containing IT will have a Cybersecurity Strategy. Beginning at Milestone A, the PM will submit the Cybersecurity Strategy STATUTORY for all programs containing IT, including NSS. Also cited in DODI Table 9. Clinger-Cohen Act Ensure that the program has a Cybersecurity Strategy that is consistent with DoD policies, standards and architectures 10 Cybersecurity = Everything that processes 1 s and 0 s. This is new! Cybersecurity effort spans the entire acquisition process A team sport with impacts to all Acquisition Career Fields
11 Cybersecurity in the DoD Acquisition Lifecycle Model 1: Hardware Intensive Program A B C IOC Materiel Solution Analysis Materiel Development Decision Technology Maturation & Risk Reduction. CDD-V DRFPRD Engineering & Manufacturing Development LRIP FRP Decision Sustainment Operations & Support ICD Draft CDD CDD PDR CDR CPD Production & Deployment FOC Disposal JCIDS Process Defense Acquisition System/JCIDS Process Warfighter/End User 11 To achieve positive acquisition outcomes, we must consistently bake in Cybersecurity into our acquisition programs
12 Cybersecurity in the DoD Acquisition Lifecycle Cybersecurity Requirements must be identified and included throughout the lifecycle of systems to include acquisition, design, development, developmental testing, operational testing, integration, implementation, operation, upgrade, or replacement of all DoD IT supporting DoD tasks and missions. Cybersecurity Integration: Cybersecurity must be fully integrated into system life cycles so that it will be a visible element of organizational, joint, and DoD Component architectures, capability identification and development processes, integrated testing, information technology portfolios, acquisition, operational readiness assessments, supply chain risk management, SSE, and operations and maintenance activities. 12
13 Cybersecurity and BBP 3.0 Vision Statement for BBP 3.0 Achieving Dominant Capabilities through Technical Excellence and Innovation Cybersecurity is a design consideration and a key enabler of this vision Key BBP 3.0 goals related to Cybersecurity Anticipate and plan for responsive and emerging threats There is no greater emerging threat to DoD acquisition programs than Cybersecurity Strengthen organic engineering capabilities. To be effective, Cybersecurity must be baked in as part of the design process Improve our leaders ability to understand and mitigate technical risk. Cybersecurity can be the greatest technical risk that programs face 13
14 Sustainment Vs. Cybersecurity Sustainment Recognized activity spanning the entire acquisition lifecycle Represents significant program risk(s) Impacts most/all functional areas Significant tactical & operational impacts Sustainment is a design consideration: Design Interface Sustainment Engineering Management Approach IAW with FY 2010 NDAA / PL Mandated Plan Life Cycle Sustainment Plan (LCSP) Validated Measurement Sustainment KPP Mandated Plan Owners o Product Support Manager (PSM) o Product Support Integrator (PSI) Cybersecurity Recognized activity spanning the entire acquisition lifecycle Not yet! Represents significant program risk(s) not being addressed yet by many Impacts most/all functional areas Significant tactical & operational impacts Cybersecurity should be a design consideration! Design Interface Sustainment Engineering Management Approach IAW SEC. 811, P.L Mandated Plan Cybersecurity Strategy is requirement, but not a plan Validated Measurement None Mandated Plan Owners o No designated owner o Everyone has a part in cyber Cybersecurity represents a significant gap in the acquisition lifecycle
15 Take Aways DSB observations paint a grim picture of our current Cybersecurity posture Cybersecurity applies to all systems or subsystems that process 1 s and 0 s Cybersecurity is not just the network. It is part of the DNA of an acquisition program All acquisition career fields have a piece of Cybersecurity Industry Partners are a critical component of your cybersecurity efforts. They design and build our products! Cybersecurity is a design consideration which must be addressed throughout the entire acquisition lifecycle 15
16 DAU Cybersecurity Courses DAU is developing a Cybersecurity Online Course o Covers the RMF and Cybersecurity across acquisition career fields. Available CY15 DAU is developing a 100-level Program Protection (PP) Planning Online Course o Cybersecurity one element of PP. Available late CY14 DAU is developing a 200-level PP Planning Classroom Course o Cybersecurity one element of Program Protection. Available mid CY15 DAU is developing a 200-level RMF Online Course o Available late CY15 16
17 How DAU Can Help Ask A Professor ( Contact DAU directly for : Tailored Assistance Targeted Training such as: Seminar Cybersecurity Challenges for DoD PMs Seminar Risk Management Framework (RMF) Seminar Cybersecurity Testing in DoD Acquisition DAU Capital & Northeast (Ft. Belvoir, VA) Karen Currey (703) DAU Mid-Atlantic (California, MD) Mike Paul (240) DAU Midwest (Kettering, OH) Vishnu Nevekar (937) DAU South (Huntsville, AL) Jack Cain (256) DAU West (San Diego, CA) Rob Tremaine (619)
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing
RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED
Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Cybersecurity in Test & Evaluation. James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation
Cybersecurity in Test & Evaluation James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation Problem Statement Insufficient T&E information regarding a system s cybersecurity
Interim DoDI 5000.02 -- The Cliff Notes Version --
Interim DoDI 5000.02 -- The Cliff Notes Version -- A Quick Glance at New Guidance -- 17 December 2013 -- Defense Acquisition University/Midwest Region [email protected] 17 Jan 2014, v 1.0 The New Department
WORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010
WORKFORCE COMPOSITION CPR PEO IEW&S Organizational Assessment VCSA Brief Date 2010 October 13, 2010 This briefing is UNCLASSIFIED/FOUO PREDECISIONAL LIMITED DISTRIBUTION AS OF: 11 Sep 2010 Verification
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5000.02 January 7, 2015 USD(AT&L) SUBJECT: Operation of the Defense Acquisition System References: See References 1. PURPOSE. This instruction: a. In accordance
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
How To Become A Senior Contracting Official
Program Management Specific Functional Requirements for Key Leadership Positions (Attributes and Demonstrated Experience Beyond Level III Certification) Education: o Advanced Degree Preferably in a technical,
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
Update: OSD Systems Engineering Revitalization Efforts
Update: OSD Systems Engineering Revitalization Efforts 23 October 2007 Col Rich Hoeferkamp Ms. Sharon Vannucci Systems and Software Engineering (Enterprise Development) Office of the Deputy Under Secretary
WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST
WHITE PAPER Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST Table of Contents THE SECURITY MAZE... 3 THE CHALLENGE... 4 THE IMPORTANCE OF MONITORING.... 6 RAPID INCIDENT
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Human Resources Management. Portfolio Management Concept of Operations
Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
Defense Healthcare Management Systems
Defense Healthcare Management Systems Recovering Warrior Task Force Interagency Program Office (IPO) Review Mr. Christopher Miller 28 January 2014 1 Agenda Topic Introduction Program Executive Office (PEO)
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
UNITED STATES AIR FORCE. Air Force Product Support Enterprise Vision
UNITED STATES AIR FORCE Air Force Product Support Enterprise Vision July 2013 Foreword Product Support is a set of functions and products that enables operational capability and readiness of systems, subsystems,
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Information Security Risk and Compliance Series Risking Your Business
Information Security Risk and Compliance Series Risking Your Business Sergio Saenz and Ron Nemes June 2015 Introduction As the DoD Information Assurance Certification and Accreditation Process (DIACAP)
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8510.01 March 12, 2014 DoD CIO SUBJECT: Risk Management Framework (RMF) for DoD Information Technology (IT) References: See Enclosure 1 1. PURPOSE. This instruction:
IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3222.03 August 25, 2014 Incorporating Change 1, Effective January 8, 2015 DoD CIO SUBJECT: DoD Electromagnetic Environmental Effects (E3) Program References: See
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
U.S. Defense Priorities OSD PA&E
1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and
Managing Security Risk In a World of Complex Systems and IT Infrastructures
Object Management Group Technical Meeting Managing Security Risk In a World of Complex Systems and IT Infrastructures NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Classes of Vulnerabilities A 2013
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Joint Interoperability Certification
Joint Interoperability Certification What the Program Manager Should Know Chris Watson (Note: This article is an updated version of Joint Interoperability Certification: What the Program Manager Should
System Security Engineering and Comprehensive Program Protection
System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
Empowering IT Acquisitions
Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012
Monitoring in a Risk Management Framework US Census Bureau Oct 2012 Agenda Drivers for Monitoring What is Monitoring Monitoring in a Risk Management Framework (RMF) RMF Cost Efficiencies RMF Lessons Learned
FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative
Establishing the Technical FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative Aileen G. Sedmak, Zachary S. Taylor, and Lt Col William A. Riski, USAF (Ret.) Several government
DoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO [email protected] What is IT Service Management (ITSM)? ITSM
Proposed Cybersecurity T&E Process
Proposed Cybersecurity T&E Process M r P e t e C h r i s t e n s e n Te s t a n d E v a l u a t i o n P o r t f o l i o M a n a g e r T h e M I T R E C o r p o r a t i o n 1 5 N o v e m b e r 2 0 1 3 W
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Automate Risk Management Framework
Automate Risk Management Framework Providing Dynamic Continuous Monitoring, Operationalizing Cybersecurity and Accountability for People, Process and Technology Computer Network Assurance Corporation (CNA)
Strategy and Management Services (SAMS), Inc.
Strategy and Management Services (SAMS), Inc. Exceeding Expectations with People Who Make a Difference! Strategy and Management Services (SAMS), Inc. 8117 Lake Park Dr. Alexandria, VA 22309 1 703-969-7949
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Software Engineering Framing DoD s Issues
Software Engineering Framing DoD s Issues Ms. Kristen Baldwin Director, Systems Analysis 15 September 2009 09/15/09 Page-1 DDR&E Organization WSARA 2009 - D,DT&E - D,SE - Dev Planning Director, Defense
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Click to edit Master title style
Click to edit Master title style Fourth level» Fifth level Click Integrating to edit Master Cybersecurity title style Requirements into Source Selection and Contracts Breakout Session #F15 Alex Odeh, Third
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Department of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
Turning Portfolio Management into Decisions
Turning Portfolio Management into Decisions Elliot Chikofsky 2006 EM&I - distributed by SSTC 2006 by permission 2006 ENGINEERING, MANAGEMENT & INTEGRATION, INC. 455 Spring Park Pl.Ste.350 Herndon, VA 20170-4727
THE UNDER SECRETARY OF DEFENSE 30 1 0 DEFENSE PENTAGON WASHINGTON, DC 20301-3010
THE UNDER SECRETARY OF DEFENSE 30 1 0 DEFENSE PENTAGON WASHINGTON, DC 20301-3010 ACQUISmON, TECHNOLOGY AND LOGISTICS NOV 0 8 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS COMPONENT ACQUISITION
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
Re-Issuance of DOD Instruction 5000.02
Re-Issuance of DOD Instruction 5000.02 1 2 Overarching Objectives Decrease emphasis on rules and increase emphasis on process intent and thoughtful program planning Provide program structures and procedures
NICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst
TRACESECURITY WHITE PAPER GRC Simplified... Finally. A Guide to Successfully Implementing the NIST Cybersecurity Framework Jerry Beasley CISM and TraceSecurity Information Security Analyst TRACESECURITY
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Information Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
The Information Technology Program Manager s Dilemma
The Information Technology Program Manager s Dilemma Rapidly Evolving Technology and Stagnant Processes Kathy Peake 26 Since inception, the Department of Defense s development of acquisition policies and
