*Separate register for CTF at:

Slides:



Advertisements
Similar presentations
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
DoD Systems and Software Engineering A Strategy for Enhanced Systems Engineering Kristen Baldwin Acting Director, Systems and Software Engineering Office.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
0 Architecting and Engineering the Naval Force: A Warfare Systems Perspective 18 June 2009 RDML (Sel) Jerry K. Burroughs SPAWAR Chief Engineer Distribution.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Life Cycle Logistics.
Center for Cybersecurity Research and Education (CCRE)
Infrastructure Protection
H UMAN R ESOURCES M ANAGEMENT August 18, O UTLINE Key Results Ensure all stakeholders are well informed of cybersecurity and its financial impact.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
ISA 201 Information System Acquisition
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Security – An Existential Threat? (IIC, Singapore)
MEM Cybersecurity Working Group Update to PCD Technical Committee
Life Cycle Logistics.
DT&E Strategy and the Developmental Evaluation Framework (DEF) Concept & Program Implementation 5 June 2014.
ISA 201 Intermediate Information Systems Acquisition
Agenda Control systems defined
MEM Cybersecurity Working Group Update to PCD Technical Committee
DSMC-Executive Program Management Courses
CS 3630 Database Design and Implementation
2017 Palmetto Cyber Defense Competition
Developing Project Managers
Subcontracting SBP 210 Lesson 1: Introduction
ISA 201 Intermediate Information Systems Acquisition
Better Buying Power 3.0 Continue Strengthening Our Culture of:
Introduction to the Federal Defense Acquisition Regulation
DoD Software Domains and their Impacts on SW Acquisition
Commercial Item Group Overview.
Subset of Executive Briefing
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
ATD session 2: compliancy versus mission assurance
IS4550 Security Policies and Implementation
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
5G Security Training
I have many checklists: how do I get started with cyber security?
Understanding Existing Standards:
ACM/IEEE-CS Computer Science Curriculum
Cybersecurity Involves systems and practices to prevent and mitigate cyber attacks and cyber crimes aimed at global, national, organizational, or personal.
IS4550 Security Policies and Implementation
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
UConn NIST Compliance Project
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Four Generations of Security Devices Putting IDS in Context
IS4550 Security Policies and Implementation
Capture The Flag: A Brief History
Monday, March 19th Today will be the first day of three days for the SHARE presenters. Today will be talking about guarding your heart and relationships.
Acquisition training day one Wrap up
How to Mitigate the Consequences What are the Countermeasures?
2019 Palmetto Cyber Defense Competition Pro Day Event – Monday, 15 April The Space and Naval Warfare Systems Center (SSC) Atlantic, the Navy’s East Coast.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Cybersecurity ATD technical
Use of CMMI in an Acquisition Context Using CMMI for Process Improvement at USAF Space and Missile Systems Center (SMC) Dr. Jack R. Ferguson
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
(U) R&D Consolidation and Opportunities for Technology Insertion
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Cyber Security in a Risk Management Framework
DSC Contract Management Committee Meeting
Security Policies and Implementation Issues
IT Management Services Infrastructure Services
DSC Contract Management Committee Meeting
Security of Department of Defense Acquisition Ecosystem
Pre-Solicitation Conference Southern Maryland Higher Education Center
*Separate register for CTF at:
Presentation transcript:

*Separate register for CTF at: https://dau.kaizen-ctf.com DAU Cybersecurity Acquisition Focus Event: Mission-Aligned Cyber for Weapon Systems Government & Industry Panels, Briefs, *Capture the Flag (CTF) Competition! Register at: https://www.eventbrite.com/e/dau-cyber-acquisition-focus-mission-aligned-cyber-warfare-tickets-52362555814 (password: cyberfocus) Dial in at 721-451-0499, #346352 , Briefs will be posted at: https://www.dau.mil/cop/cybersecurity/Pages/Documents.aspx (Learning Materials) *Separate register for CTF at: https://dau.kaizen-ctf.com This morning/afternoon we’ll baseline our discussion with some foundational cybersecurity concepts and then discuss “at an unclassified level” the types of cyber threats to our weapon systems, networks and critical infrastructure such as electrical, water, oil, and gas systems. Recognizing the increase in the cyber threat, the DoD has updated and published guidance and instructions on cybersecurity; we’ll look at some implications of that guidance. One key takeaway from today’s discussion is…cybersecurity is not a separate process but should be considered in the requirements phase and embedded in existing processes. We’ll discuss the cybersecurity Risk Management Framework and how this “risk” “framework” should be integrated in the Systems Security Engineering processes. And, finally we’ll talk about who should be involved in cybersecurity throughout the acquisition lifecycle. Who in the audience is in the contracting career field, PM, FM/budget, logistics, T&E, Engineering, Cyber/IT? You all play a key role in mitigating cybersecurity risk in our weapon systems, networks, business systems and infrastructure. Agenda 14-16 May 2019 Tuesday 14 May 2019 - Cyber Leadership Day Threat Brief (UNCLAS) Cyber Leadership Panel Software Assurance Initiatives Cyber Technical Initiatives Panel Thursday 16 May 2019 Cyber Industry (Half) Day Capture the Flag Awards and Lessons Learned Expert Industry Assessment of DoD Cybersecurity Industry Panel: Cybersecurity Initiatives for Weapon Systems Wednesday 15 May 2019 Cyber Implementation Day Capture the Flag Event (Parallel Track – Full Day at St Mary’s College) Integrated Program Protection Prototype National Cyber Range Hack the Machine Cyber Training Initiatives for Weapon Systems Mission-Based Cyber Risk Assessment Penetration Testing NAVAIR Cyber Incident Response DFARS Covered Defense Information CYBERSAFE 0800-1630 at Southern Maryland Higher Education Center 44219 Airport Rd, California, MD 20619 Up to 20 Continuous Learning Points Awarded!