Innovate Integrate Standardize Improving the C&A Process to Deliver Today s Technology Tomorrow

Size: px
Start display at page:

Download "Innovate Integrate Standardize Improving the C&A Process to Deliver Today s Technology Tomorrow"

Transcription

1 Improving the C&A Process to Deliver Today s Technology Tomorrow Colonel Todd Whitlow Director, Modernization and Innovation Global Cyberspace Integration Center

2 RDT&E Challenge 2

3 The Good Emerging RDT&E DAA, CA, ACA governance structure and processes will be more responsive to our non-operational environments RDT&E Workgroup progress Developed C&A workflow for RDT&E enclaves and systems Identified IA Controls that apply to RDT&E enclaves and systems JMETC DIACAP Tiger Team Addressing IA guidance and technical approaches to support RDT&E RDT&E provides non operational venues where security vulnerabilities can be discovered You don t want to get to DT/OT and find that IA controls have not been adequately implemented RDT&E is where you want to build in IA from the beginning 3

4 Process and Tools We look forward to implementation of the RDT&E workflow in EITDR in the future to apply the appropriate IA controls to RDT&E enclaves and systems Validators and certifiers experienced in and dedicated to RDT&E will minimize the churn associated with answering questions that do not pertain to RDT&E Institutionalize Technical Configuration Control Board and Modified DIACAP Implementation Plan to assess risk of emerging technologies Need a means to review/approve cross domain solutions for temporary connections to RDT&E environments. Current process is geared for permanent connection to operational networks. Each service has different C&A process and tools but our capabilities must be connected to the same networks emass is the GFE DoD standard tool that no service is currently using Transition to emass all services 4

5 Incomplete C&A Guidance Enclave STIG and AFI : Zone definitions incomplete IAMs will say NO! for a classified Zone B or a Zone B on DREN We don t really have any experience with RDT&E. Can you help us rewrite the STIG? Enclave STIG Authors. CJCSI E: doesn t refer to zones Addresses RDT&E for software development and test labs. But IAMs say NO! for hardware in the loop (JREs, JASSM-ER models, DoDI : IA Controls aligned to MAC and CL levels but for RDT&E many do not apply or impact the broader community Validators and certifiers say no, you must address all IA Controls DoDI : IATTs are for temporary connection to operational networks IAMs will say NO! for temporary connection to DREN, SDREN, JMETC, CFBLnet, or JTEN 5

6 Legacy, M&S, and Innovations Security patches and scans break legacy test and range tools No program of record or programmer to repair M&S tools require reconfiguration and recoding to stimulate systems under test Agile RDT&E events require a pace that current DIACAP can t support Innovations require assessment in distributed environment before implementing all IA controls We require means to accommodate these tools and M&S Procedural risk review via TCCB Technology implementation with emerging Controlled Interface 6

7 Build and Test IA Incrementally 7

8 Culture Change Needed We can t Deliver Today's IT Capabilities Tomorrow with an Information Assurance workforce and certification & accreditation process that is only geared to verify or certify and to say: no you can t plug that new system in to our enclave or network. We need to shift our limited IA resources to team with developers of emerging technologies to coach and assist them to implement the appropriate IA controls necessary for innovation and experimentation venues and engineer and build in IA as you progress through acquisition. Move to incrementally build in IA smartly from the beginning 8

DIACAP and the GIG IA Architecture. 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) (C)

DIACAP and the GIG IA Architecture. 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) (C) DIACAP and the GIG IA Architecture 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) 210-9252417 (C) 210-396-0254 jwierum@cygnacom.com OMB Circular A-130 (1996) OMB A-130 required systems and applications

More information

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation Nov 2012 Page-1 Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation November 2012 Nov 2012 Page-2 DT&E for Complex Systems Performance Reliability Interoperability Information Security

More information

FOR OFFICIAL USE ONLY DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS

FOR OFFICIAL USE ONLY DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS 62225-5222 MEMORANDUM FOR AFNIC/NVI FROM: AFNIC/NW 203 West Losey Street, Room 3100 Scott

More information

Streamlined FISMA Compliance For Hosted Information Systems

Streamlined FISMA Compliance For Hosted Information Systems Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and

More information

An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP)

An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP) An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP) Solutions Built On Security Prepared for The IT Security Community and our Customers Prepared by Lunarline,

More information

GSAW Information Assurance in Government Space Systems: From Art to Engineering

GSAW Information Assurance in Government Space Systems: From Art to Engineering GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the

More information

DIACAP IA CONTROLS. Requirements Document. Sasa Basara University of Missouri-St. Louis

DIACAP IA CONTROLS. Requirements Document. Sasa Basara University of Missouri-St. Louis DIACAP IA CONTROLS Requirements Document 10.13.2015 Sasa Basara University of Missouri-St. Louis 1 1 University Blvd St. Louis, MO 63121 Overview This task is creating threshold (shall) requirements for

More information

Naval Surface Warfare Center,

Naval Surface Warfare Center, CAPT Brian R. Durant Commander NSWCDD Technical Director - (540) 653-8103 Dennis M. McLaughlin Technical Director Naval Surface Warfare Center, Dahlgren Naval Undersea DivisionWarfare Center The The Leader

More information

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk Neal Miller, Navy Authorizing Official December 13, 2016 UNCLASSIFIED 1 Some Inconvenient Truths The bad guys and gals still only work

More information

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Managing the Complexity of IT Modernization Constructing and modernizing a new campus is a complex undertaking, requiring

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

RISK MANAGEMENT FRAMEWORK COURSE

RISK MANAGEMENT FRAMEWORK COURSE RISK MANAGEMENT FRAMEWORK COURSE Secure Managed Instructional Systems, LLC Consulting Training Staffing Support 3350 Riverview Pkwy Suite 1900 * Atlanta, Georgia 30339 * Phone: 800-497-3376 * Email: semais@semais.net.*

More information

Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17

Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17 Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) 255-2328 Paul.phillips.12@us.af.mil 9 May 17 Disclaimer: The information provided herein represents the Government s best understanding of the procurement

More information

Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN)

Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN) Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN) Mr. Dan Knodle Strategic Planning and Engineering Division Joint Interoperability Test Command 16 June 2011 Background Proliferation

More information

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

More information

SIPRNet Contractor Approval Process (SCAP) December 2011 v2. Roles and Responsibilities

SIPRNet Contractor Approval Process (SCAP) December 2011 v2. Roles and Responsibilities Roles and Responsibilities PARTICIPANT RESPONSIBILITIES Defense Security Service (DSS) DAA for Information Systems (IS) used to process classified information in the National Industrial Security Program

More information

Test & Evaluation of the NR-KPP

Test & Evaluation of the NR-KPP Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general

More information

What is milcloud 2.0?

What is milcloud 2.0? What is milcloud 2.0? Caroline Bean DISA Jeffrey Phelan CSRA April 4, 2018 (DISA). CRSA is providing the milcloud 2.0 services to DoD customers 1 under Contract HC102817D0004. UNCLASSIFIED 1 All forward-looking

More information

Affordable Security. Sarah Pramanik April 10, 2013

Affordable Security. Sarah Pramanik April 10, 2013 Affordable Security Sarah Pramanik April 10, 2013 It s a Balancing Act Affordability Security 2 Overview Defining Cyber Security Defense in Depth Program Risk vs. Security Risk Life Cycle Phases Pre-proposal/Proposal

More information

Department of Defense INSTRUCTION. DoD Information Assurance Certification and Accreditation Process (DIACAP)

Department of Defense INSTRUCTION. DoD Information Assurance Certification and Accreditation Process (DIACAP) Department of Defense INSTRUCTION NUMBER 8510.01 November 28, 2007 ASD(NII)/DoD CIO SUBJECT: References: DoD Information Assurance Certification and Accreditation Process (DIACAP) (a) Subchapter III of

More information

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility IBM provides end-to-end strategy, migration, infrastructure and managed services on secure government premises

More information

The Perfect Storm Cyber RDT&E

The Perfect Storm Cyber RDT&E The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare

More information

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED UNCLASSIFIED : February 6 Exhibit R, RDT&E Budget Item Justification: PB : Research,, Test & Evaluation, / BA 5: System & Demonstration (SDD) COST ($ in Millions) FY 5 FY 6 R Program Element (Number/Name) PE 65A /

More information

Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs

Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based

More information

DoD Strategy for Cyber Resilient Weapon Systems

DoD Strategy for Cyber Resilient Weapon Systems DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1

More information

Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment

Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment Joseph L. Wolfkiel Secure Configuration Management Lead Engineer May 2018 1 Disclaimer The information

More information

Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT Approval Date:

Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT Approval Date: DATA ITEM DESCRIPTION Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT-81845 Approval Date: 20111108 AMSC Number: N9222 Limitation: N/A DTIC Applicable: N/A GIPDEP

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

DoD Information Technology Security Certification and Accreditation Process (DITSCAP) A presentation by Lawrence Feinstein, CISSP

DoD Information Technology Security Certification and Accreditation Process (DITSCAP) A presentation by Lawrence Feinstein, CISSP DoD Information Technology Security Certification and Accreditation Process (DITSCAP) A presentation by Lawrence Feinstein, CISSP April 14, 2004 Current Macro Security Context within the Federal Government

More information

Job Aid: Introduction to the RMF for Special Access Programs (SAPs)

Job Aid: Introduction to the RMF for Special Access Programs (SAPs) Contents Terminology... 2 General Terminology... 2 Documents and Deliverables... 2 Changes in Terminology... 3 Key Concepts... 3 Roles... 4 Cybersecurity for SAPs: Roles... 5 Support/Oversight Roles...

More information

Modular Open Systems Approach (MOSA) Panel on Standards

Modular Open Systems Approach (MOSA) Panel on Standards Modular Open Systems Approach (MOSA) Panel on Standards Ms. Phil Zimmerman Deputy Director, Engineering Tools and Environments Office of the Deputy Assistant Secretary of Defense on Systems Engineering

More information

Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event

Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Mr. George Rumford Deputy Director Major Initiatives and Technical Analyses Test Resource Management Center January

More information

Forecast to Industry Program Executive Office Mission Assurance/NetOps

Forecast to Industry Program Executive Office Mission Assurance/NetOps Defense Information Systems Agency A Combat Support Agency Forecast to Industry Program Executive Office Mission Assurance/NetOps Mark Orndorff Director, PEO MA/NetOps 29 July 2010 What We Do We develop,

More information

Integration of the Energy Industry

Integration of the Energy Industry Session 2: Energy Integration Integration of the Energy Industry Tammie Gibson, PMP Schneider Electric August 9, 2016 Rhode Island Convention Center Providence, Rhode Island Overview Industry has become

More information

Shift Left: Putting the Process Into Action

Shift Left: Putting the Process Into Action U.S. ARMY EVALUATION CENTER Shift Left: Putting the Process Into Action March 30, 2017 Agenda The Evaluator s Motivation Where We Were Guidance and Policy Putting it into Action 2 The Evaluator s Motivation

More information

Joint Mission Environment Test Capability (JMETC)

Joint Mission Environment Test Capability (JMETC) Joint Mission Environment Test Capability (JMETC) Distributed Testing for Cyber Security Marty Arnwine JMETC, Deputy for Plans and Operations February 26, 2015 Agenda JMETC Overview JMETC Networks National

More information

Risk Management Framework for DoD Medical Devices

Risk Management Framework for DoD Medical Devices Risk Management Framework for DoD Medical Devices Session 136, March 7, 2018 Lt. Col. Alan Hardman, Chief Operations Officer, Cyber Security Division, Office of the DAD IO/J-6 William Martin, Deputy of

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

Couples Therapy for DevOps and ITIL

Couples Therapy for DevOps and ITIL Couples Therapy for DevOps and ITIL Jayne Groll, CEO DevOps Institute About Me CEO and co-founder of the DevOps Institute, co-founder of ITSM Academy, active trainer, ScrumMaster, ITIL Expert and former

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

8 Must Have. Features for Risk-Based Vulnerability Management and More

8 Must Have. Features for Risk-Based Vulnerability Management and More 8 Must Have Features for Risk-Based Vulnerability Management and More Introduction Historically, vulnerability management (VM) has been defined as the practice of identifying security vulnerabilities in

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Cybersecurity Test and Evaluation Achievable and Defensible Architectures

Cybersecurity Test and Evaluation Achievable and Defensible Architectures Cybersecurity Test and Evaluation Achievable and Defensible Architectures October 2015, ITEA Francis Scott Key Chapter Mr. Robert L. Laughman for COL Scott D. Brooks, Director, Survivability Evaluation

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to

More information

DEFENSE HEALTH AGENCY 7700 ARLINGTON BOULEVARD, SUITE 5101 FALLS CHURCH, VIRGINIA

DEFENSE HEALTH AGENCY 7700 ARLINGTON BOULEVARD, SUITE 5101 FALLS CHURCH, VIRGINIA DEFENSE HEALTH AGENCY 7700 ARLINGTON BOULEVARD, SUITE 5101 FALLS CHURCH, VIRGINIA 22042-5101 MEMORANDUM FOR DEFENSE HEALTH AGENCY AUTHORIZING OFFICIAL SUBJECT: Software Certification for Spirola version

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Intrusion The Network Intrusion helps to detect malicious activity incoming to, outgoing from, and on the

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

National Information Assurance (IA) Policy on Wireless Capabilities

National Information Assurance (IA) Policy on Wireless Capabilities Committee on National Security Systems CNSS Policy No. 17 National Information Assurance (IA) Policy on Wireless Capabilities This document prescribes minimum standards. Your department or agency may require

More information

DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE SPACE COMMAND

DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE SPACE COMMAND DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE SPACE COMMAND MEMORANDUM FOR AFNIC/NTV FROM: HQ AFSPC/A2/3/6M 150 Vandenberg Street, Suite 1105 Peterson AFB, CO 80914-4420 SUBJECT: Software Certification

More information

Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen

Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering 2 April 2014 Ross Adjei Mike Nguyen Agenda Background Architecture Implementation/Demo Performance Challenges

More information

DoDD DoDI

DoDD DoDI DoDD 8500.1 DoDI 8500.2 Tutorial Lecture for students pursuing NSTISSI 4011 INFOSEC Professional 1 Scope of DoDD 8500.1 Information Classes: Unclassified Sensitive information Classified All ISs to include:

More information

National Capital Region Medical INSTRUCTION

National Capital Region Medical INSTRUCTION Joint Task Force National Capital Region Medical INSTRUCTION NUMBER 8500.02 DEC 0 8 2011 J-6 SUBJECT: Reference: DoD Information Assurance Certification and Accreditation Process (DIACAP) Interim Authorization

More information

Corporate Capabilities

Corporate Capabilities Corporate Capabilities 2017 Summary Thomas Edison stated, "there's a way to do it better find it." intellisolutions is 3 rd party certified as a Woman-Owned Small Business (WOSB)*. Founded in 2006 in San

More information

RISK MANAGEMENT FRAMEWORK: A LAB-BASED APPROACH TO SECURING INFORMATION SYSTEMS BY JAMES BROAD

RISK MANAGEMENT FRAMEWORK: A LAB-BASED APPROACH TO SECURING INFORMATION SYSTEMS BY JAMES BROAD RISK MANAGEMENT FRAMEWORK: A LAB-BASED APPROACH TO SECURING INFORMATION SYSTEMS BY JAMES BROAD DOWNLOAD EBOOK : RISK MANAGEMENT FRAMEWORK: A LAB-BASED Click link bellow and free register to download ebook:

More information

DoDI IA Control Checklist - MAC 1-Classified. Version 1, Release March 2008

DoDI IA Control Checklist - MAC 1-Classified. Version 1, Release March 2008 DoDI 8500-2 IA Control Checklist - MAC 1-Classified Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark

More information

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD)

Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD) Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD) 1 C5AD Presentation (Approved for Public Release: 20150219) ITEA 26 March 2019 Greg Curth J6/DDC5I/C5AD/ENG Cyber Capability

More information

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA CYBER SECURITY BRIEF Presented By: Curt Parkinson DCMA September 20, 2017 Agenda 2 DFARS 239.71 Updates Cybersecurity Contracting DFARS Clause 252.204-7001 DFARS Clause 252.239-7012 DFARS Clause 252.239-7010

More information

Test and Evaluation. The Key to Successful Acquisition Outcomes. Steve Hutchison. 3 October Director Office of Test and Evaluation

Test and Evaluation. The Key to Successful Acquisition Outcomes. Steve Hutchison. 3 October Director Office of Test and Evaluation Test and Evaluation The Key to Successful Acquisition Outcomes 3 October 2017 Steve Hutchison Director Office of Test and Evaluation DHS Test & Evaluation Year in Review USCG Fast Response Cutter FOT&E

More information

DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER (DON CIO) CYBERSECURITY STRATEGY TEMPLATE

DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER (DON CIO) CYBERSECURITY STRATEGY TEMPLATE DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER (DON CIO) CYBERSECURITY STRATEGY TEMPLATE AND INSTRUCTIONS MAY 2016 INTRODUCTION 1. Purpose: The Cybersecurity Strategy (CSS) ensures compliance with the

More information

MEDICAL DEVICES SECURITY TECHNICAL IMPLEMENTATION GUIDE. Version 1, Release July Developed by DISA for DoD

MEDICAL DEVICES SECURITY TECHNICAL IMPLEMENTATION GUIDE. Version 1, Release July Developed by DISA for DoD MEDICAL DEVICES SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 1, Release 1 27 July 2010 Developed by DISA for DoD Medical Devices STIG, V1R1 27 July 2010 Developed by DISA for the DoD This page is intentionally

More information

STUDENT GUIDE Risk Management Framework Step 5: Authorizing Systems

STUDENT GUIDE Risk Management Framework Step 5: Authorizing Systems Slide 1 - Risk Management Framework RMF Module 5 Welcome to Lesson 5 - RMF Step 5 Authorizing Systems. Once the security controls are assessed, the POA&M and security authorization package must be finalized

More information

TRIAEM LLC Corporate Capabilities Briefing

TRIAEM LLC Corporate Capabilities Briefing TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through

More information

IPv6 Essentials for IT Professionals Course

IPv6 Essentials for IT Professionals Course IPv6 Essentials for IT Professionals Course Version: 2.0 Updated: 10 December 2011 Table of Contents Overview...3 Content...3 Costs and Fees...6 Contact...6 Overview Tachyon Dynamics has produced a quick,

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Boundary and The Network Boundary and for an Enterprise is essential; it provides for an understanding of

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

Task Force Cyber Secure

Task Force Cyber Secure Headquarters U.S. Air Force Task Force Cyber Secure Colonel Bill Data Bryant Task Force Cyber Secure Deputy Director Task Force Objectives Synchronize multiple efforts and studies attempting to address

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Vulnerability Vulnerability Assessment is the systematic examination of an Enterprise to determine the adequacy of

More information

Making Security Agile

Making Security Agile Making Security Agile 2017 - INVITING SECURITY INTO DEVOPS SURVEY 1 CEOs are caught between a rock and a hard place. On one hand, there is tremendous pressure to digitally transform their companies. As

More information

Data Management & Test Scenarios Exercise

Data Management & Test Scenarios Exercise Data Management & Test Scenarios Exercise MDD CDD Validation Dev. RFP Release A B C FRP IOC FOC Materiel Solution Analysis Tech Maturation & Risk Reduction Engineering and Manufacturing Development Production

More information

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,

More information

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER NATIONAL AIR & SPACE INTELLIGENCE CENTER NASIC INSTRUCTION 33-108 6 JUNE 2013 Communications NASIC STRATEGIC IT MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the

More information

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace

More information

DevOps Foundation Certification Training Course - Brochure

DevOps Foundation Certification Training Course - Brochure DevOps Foundation Certification Training Course - Brochure Get Ready for Next IT Automation Wave Course Name : DevOps Foundation Version : INVL_DevOps_BR_02_082_1.1 Course ID : ITSG-135 www.invensislearning.com

More information

Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training

Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training Rhonda Evans Head, WINS Academy Presentation to the IAEA International Conference

More information

Software Assurance Ecosystem Knowledge Architecture. 1 Wednesday, December 31, 2008

Software Assurance Ecosystem Knowledge Architecture. 1 Wednesday, December 31, 2008 Software Assurance Ecosystem Knowledge Architecture 1 1 Wednesday, December 31, 2008 What Do The Building Blocks for Measuring Assurance Look Like? Standard ways for enumerating things we care about Languages/Formats

More information

Defense Information Systems Agency

Defense Information Systems Agency Defense Information Systems Agency Risk Management Framework Implementation in Support of our Mission Partners 17 May 2018 UNITED IN INSERVICE TO OUR NATION 1 Disclaimer The information provided in this

More information

FISMA Compliance and the Search for Security. Tim Murray NES Associates February 5, 2008

FISMA Compliance and the Search for Security. Tim Murray NES Associates February 5, 2008 FISMA Compliance and the Search for Security Tim Murray NES Associates February 5, 2008 Agenda What is FISMA? What do I REALLY have to do? How can technology help my organization meet FISMA requirements

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Progress Report National Information Assurance Partnership

Progress Report National Information Assurance Partnership Progress Report 2012-2015 National Information Assurance Partnership Executive Summary The National Information Assurance Partnership (NIAP) has made significant progress in three primary mission areas:

More information

The erosion of the perimeter in higher education. Why IAM is becoming your first line of defence.

The erosion of the perimeter in higher education. Why IAM is becoming your first line of defence. www.pwc.com.au The erosion of the perimeter in higher education. Why IAM is becoming your first line of defence. What are all the things that make up IAM? 2 The identity scope is getting bigger and bigger.

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Test and Evaluation Methodology and Principles for Cybersecurity

Test and Evaluation Methodology and Principles for Cybersecurity Test and Evaluation Methodology and Principles for Cybersecurity Andrew Pahutski Deputy Director; Cyber & Information Systems Office of the Secretary of Defense (OSD) Developmental Test and Evaluation

More information

Rethinking Cybersecurity from the Inside Out

Rethinking Cybersecurity from the Inside Out Rethinking Cybersecurity from the Inside Out An Engineering and Life Cycle-Based Approach for Building Trustworthy Resilient Systems Dr. Ron Ross Computer Security Division Information Technology Laboratory

More information

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017

ISACA 2017 OVERVIEW. 3º Fórum IBGP de Tecnologias da Informação. Paulo Henrique Abreu Moreira. Brasília Chapter Associate & CSX Director 08/11/2017 ISACA 2017 OVERVIEW 3º Fórum IBGP de Tecnologias da Informação Paulo Henrique Abreu Moreira Brasília Chapter Associate & CSX Director 08/11/2017 1 2 3 4 Profissionalismo Conhecimento técnico Apoio Pesquisa

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

IT Governance and emerging trends

IT Governance and emerging trends IT Governance and emerging trends Athens, 4 November 2013 Professor Georges Ataya Academic Director, Solvay Brussels School (solvay.edu/it) Past International Vice President, ISACA (isaca.org) Managing

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"

More information

Subj: INFORMATION TECHNOLOGY CONFIGURATION CONTROL POLICY

Subj: INFORMATION TECHNOLOGY CONFIGURATION CONTROL POLICY TACTRAGRULANT INSTRUCTION 5239.4 From: Commanding Officer, TACTRAGRULANT (TTGL) Subj: INFORMATION TECHNOLOGY CONFIGURATION CONTROL POLICY Ref: (a) TTGLINST 5239.3 Network Policy, 30 Oct 2012 (b) MIL-HDBK-61A

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Enabling Efficient, Consistent Certification and Accreditation Enterprise-Wide

Enabling Efficient, Consistent Certification and Accreditation Enterprise-Wide Enabling Efficient, Consistent Certification and Accreditation Enterprise-Wide www.xacta.com Overview Certification & Accreditation The IRS Challenge The Solution: Xacta Web C&A Where Are We Today? Future

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

I n t e g r i t y - S e r v i c e - E x c e l l e n c e

I n t e g r i t y - S e r v i c e - E x c e l l e n c e I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Chief Information Security Officer (CISO) Mr. Pete Kim (SES)

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information