Security of Department of Defense Acquisition Ecosystem

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
THE STRATEGIC COUNCIL LEADERSHIP TRUST AND ENGAGEMENT NEW FUNDING SOURCES AND NEW DELIVERY VEHICLES Appendix 1 NEW FUNDING SERVOURCES AND NEW DELIVERY.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
2014 Key Issues – National Security John C. Rose Deputy Director, Public Policy Region 6 Chair, National Security Sub-Committee.
ARINC Overview Alliance Baltimore November 16, 2007.
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
Background June 2011– DoD Proposes New DFARS Rule for Protecting Controlled, Unclassified Information Industry meeting scheduled for November 15, 2011.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Office of the Under Secretary of Defense (Comptroller) Physical Inventory Best Practices 1 Briefing for Joint Physical Inventory Working Group September.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
1 Pipeline Measurement Process Review Committee Kickoff Session Paul Blackwell Office of the Deputy Assistant Secretary of Defense for Supply Chain Integration.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Association of Defense Communities June 23, 2015
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Copyright ©2009, Oracle and/or its Affiliates. All rights reserved. 1 Enterprise Project Portfolio Management Value, Visibility, Agility and Accountability.
Mr. Charles Riechers Principal Deputy Assistant Secretary for Acquisition and Management 17 April 2007 SAE/CAE Panel on Acquisition of Services.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
National Information Assurance Strategy: New challenges, new responses Owen Pengelly Microsoft Public Sector Conference 30 September 2009.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Randy Beavers CS 585 – Computer Security February 19, 2009.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
| 1 Weapon System Acquisition Reform- Product Support Assessment DAU SYMPOSIUM 13 April 2010 Presented by: Basil Gray Where Innovation.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
Coast Guard Cyber Command
UNCLASSIFIED The Open Group 01/07/10 Page-1 Kick-off Meeting for The Open Group Acquisition Cyber Security Initiative Ms. Kristen Baldwin Director, Systems.
DoD Lead Agent: Office of the Assistant Secretary of the Army (Installations and Environment) Department of Defense Voluntary Protection Programs Center.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
Pete Verga Under Secretary of Defense for Policy Chief of Staff The Department of Defense (DoD) United States of America Policy as a Technology Partner.
Role Responsibilities
Cyber Security – An Existential Threat? (IIC, Singapore)
“Existing world order is being redefined.” Henry Kissinger Jan 2015
INSTITUTE FOR RISK AND DISASTER REDUCTION
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Introduction to the Federal Defense Acquisition Regulation
NIST Cybersecurity Framework
Commercial Item Group Overview.
ATD session 2: compliancy versus mission assurance
San Francisco IIA Fall Seminar
CIO G-6 Signal Conference
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
An Urgent National Imperative
Defense Logistics: Integrated and Efficient
2018 NOHA Business Summit Conference
Defense Health Agency Industry Exchange J-6 I&O’s Enterprise Approach by COL Beverly Beavers November 08, 2018 Authorized Use Only Authorized Use Only.
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Cybersecurity ATD technical
Industrial Base Analysis and Sustainment (IBAS) Program Overview
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
NS3040 Fall Term 2018 Defense Industrial Base
Gartner for Sales Leaders
IT Management Services Infrastructure Services
*Separate register for CTF at:
Energy Storage & Cyber Security
Policy Update Overview
Anti-Counterfeit Policy Framework
Presentation transcript:

Security of Department of Defense Acquisition Ecosystem Presented by: Katie Arrington HQE Cyber for ASD (A) Katherine.e.Arrington@mail.mil Driving accountability to the people doing the work.

Security of Department of Defense Acquisition Ecosystem The Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD A&S) provides policy and governance, for the Department of Defense (DoD) and the national security innovation base, which enables the delivery and sustainment of critical capabilities to the U.S. Service Members and allies. Safe and secure acquisition of goods and services must be done in conjunction with strong cybersecurity throughout the Defense Industrial Base (DIB) and the DoD Supply Chain. As our leaders have said, economic security is National security. Because this is a complex global challenge, protecting the DIB and the DoD Supply Chain will be addressed through multiple solutions within the DoD Acquisition Ecosystem. The diagram shown below represents the Department’s ongoing efforts to provide security and cybersecurity to the DIB and DoD Supply Chain.

Security of Department of Defense Acquisition Ecosystem Offense 1 NDAA 16 1647 & 1650 Assessments/Wargames Vulnerability of Weapon Systems Vulnerability of Critical Infrastructure DIB Cybersecurity /Supply Chain Unified Stakeholder Cybersecurity Standard Metrics /3rd Party Auditors Independent Cybersecurity Score Secure & Resilient DevSecOps 5G Standards HW Infrastructure Harden Business System USCyberCom New Authorities CIO R&E A&S USDI Policy Mitigation Harden Weapon Systems Harden Critical Infrastructure Software Provenance PROCUREMENT Source Selection Criteria NIST 171 DFARS 252.204-7012 Block Change Acquisition Reform DoD 5000.02 rewrite & 809 DCMA Contract Monitoring Dashboard to view Supply Chain Security Defense Security Service (DSS) NISP, NCSS, OBMS DAU Education