IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Slides:



Advertisements
Similar presentations
Module N° 7 – SSP training programme
Advertisements

Module N° 4 – ICAO SSP framework
Session No. 4 Implementing the State’s Safety Programme Implementing Service Providers SMS
The New GMP Annex 11 and Chapter 4 Deadline for coming into operation: 30 June 2011.
Course: e-Governance Project Lifecycle Day 1
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2009 The MITRE Corporation. All rights Reserved. Evolutionary Strategies for the Development of a SOA-Enabled USMC Enterprise Mohamed Hussein, Ph.D.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Critical Design Review November 2015
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Systems Engineering in a System of Systems Context
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
DoD Systems and Software Engineering A Strategy for Enhanced Systems Engineering Kristen Baldwin Acting Director, Systems and Software Engineering Office.
IRM 101 Critical Design Review For March 2015 Update Status 11/21/2014.
1 Purchasing and Procurement Processes Module Four Revision Date: 2/06/2015.
Stephen S. Yau CSE , Fall Security Strategies.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Integrated Capability Maturity Model (CMMI)
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
NIST Special Publication Revision 1
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
LOG 235 Curriculum Review 8 Oct 2010 Curriculum Review LOG 235 Performance Based Logistics Presented to the Life Cycle Logistics (LCL) Functional Integrated.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
1 | 2010 Lecture 3: Project processes. Covered in this lecture Project processes Project Planning (PP) Project Assessment & Control (PAC) Risk Management.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Implementing Multiagency Coordination IS-701.A – February 2010 Visual 4.1 Unit 4: Implementing Multiagency Coordination.
The Project Plan Plan Your Work, then Work Your Plan
Defense Business Systems (CLE077) Sprint November 9, 2015 DRAFT1 Sprint Working Group Toni Freeland Kevin Hamilton Lee Hewitt Tom Hickok Len Nale Bob Ramsey.
DAU IT Curriculum TEAM ORGANIZATIONAL MEETING (Initial Focus – Increment 1) (From 19 June to 1 August 2014) PURPOSE: TO ESTABLISH THE IT CURRICULUM TEAM.
SRR and PDR Charter & Review Team Linda Pacini (GSFC) Review Chair.
1 Lecture 2.4a: SEF SE Planning and the SEP (SEF Ch 16) Dr. John MacCarthy UMBC CMSC 615 Fall, 2006.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e As of: 3/1/2016 Air Force Weather Agency CEISC Committee Focus Shift - Proposed Modification to.
CDIO: Overview, Standards, and Processes (Part 2) Doris R. Brodeur, November 2005.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Defense Business Systems - CLE 077 Requirement Readiness Review (RRR) January 14, 2016.
Environment, Safety, and Occupational Health Opportunities in DoD Business Transformation May 4, 2006.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
ISA 201 Intermediate Information Systems Acquisition
ISA 301 Advanced Enterprise Information Systems Acquisition
Sample Fit-Gap Kick-off
Office 365 Security Assessment Workshop
ISA 201 Intermediate Information Systems Acquisition
Milestone A to Milestone B Requirements Management Activities
JTAMS MILESTONE A ANALYSIS
Identify the Risk of Not Doing BA
ISA 301 Advanced Enterprise Information Systems Acquisition
ISA 201 Intermediate Information Systems Acquisition
ISA 301: Advanced Enterprise Information Systems Acquisition
ISA 201 Intermediate Information Systems Acquisition
Product Support BCA Exercise – JRATS/JTAMS
ISA 201 Intermediate Information Systems Acquisition
Lesson 2: SBP Review Lesson 2: SBP Review February 2017
Defense Business Systems (CLE077) Sprint
IS4550 Security Policies and Implementation
Communication and Consultation with Interested Parties by the RB
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
AM Business Model Wargame Working Team Documentation
AM Business Model Wargame Working Team Documentation
Continuity Guidance Circular Webinar
Vijay Rachamadugu and David Snyder September 7, 2006
INCOSE Digital Artifacts Challenge Team
JTAMS Post-Milestone C Analysis
Presentation transcript:

IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning], 4 (BCA)-Thorne

SummaryDescriptionblooms level ELO ELO : Given an Information Resource scenario, make actionable recommendations. (BL 3) 3 ELO ELO : Given an Information Resource scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) 4 ELO ELO : Adapt and improve the Information Resource measurement process. (BL 3) 3 ELO ELO : Given an Information Resource scenario, collect and process measurement and context relevant IT management and technical data. (BL 3) 3 ELO ELO : Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) 2 ELO ELO : Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5) 5 ELO ELO : Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) 5 ELO ELO : Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) 5 ELO ELO : Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5) 5 ELO ELO Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) 5 Scope of Change (10 ELOs) Measurement5 BCA1 Cybersecurity2 DBS2

July 2014IRM 304 MondayTuesdayWednesdayThursdayFriday LUNCH Course Introduction Course Introduction DAU Brief Enterprise Architecture (1) Enterprise Architecture (1) Cybersecurity (3) Cybersecurity (3) IT Acquisition Strategies (5) IT Acquisition Strategies (5) Industry Guest Speakers Industry Guest Speakers System T&E And Software V&V (8) System T&E And Software V&V (8) IT-related Project/ Program Management (P/PM) (4) IT-related Project/ Program Management (P/PM) (4) Acquisition Planning Solicitation & Administration of product & services (6) Acquisition Planning Solicitation & Administration of product & services (6) Information Systems Engineering (7) Information Systems Engineering (7) Emerging Technologies (9) Emerging Technologies (9) Capital Planning And Investment Control (CPIC) And Portfolio Management (2) Capital Planning And Investment Control (CPIC) And Portfolio Management (2) Hot Topic Information Exchange Hot Topic Information Exchange Course Graduation Course Graduation Policies, Laws & Regulations Recommended Practices = Graded Team Exercise

Lesson 3 - Cybersecurity Module Lead: Denman (26-Cybersecurity) 2 ELOs, each Blooms 5; completely replaces existing lesson objectives. Assessment: Case Approach: Develop unique case for each ELO

2 ELOs Replace ALL existing Objectives 2 ELOs Integrate/Replace existing Objectives 5 ELOs Integrate with existing Objectives 1 ELO Integrate with existing Objectives Unique Case for each ELO Single case Integrating all ELOs 26 Cybersecurity 19 Measurement 7 DBS 4 BCA Denman Denny Kinner Parker, Corcoran Thorne Bloom 5 Bloom 2-4 Bloom 5 Bloom 5

Lesson 3 - As-Is Objectives TLO: Given current IT Cybersecurity threats, explain how the risks can be mitigated via acquisition planning to ensure mission success. ELOs: – Discuss the Cybersecurity, critical infrastructure protection, and continuity of operation requirements for mission assurance. (ELO )  IRM101 – Assess the scope and seriousness of current and emerging Cybersecurity threats to DoD systems. (ELO )  IRM202 – Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. (ELO )  IRM101 Existing Objectives map to ELOs allocated to other course(s) Choose 5 to 7 elements that go into a continuity of operations plan Choose 5 to 7 elements that go into a continuity of operations plan Given examples of Cybersecurity attack surfaces, identify threats and threat vectors related to each Given examples of Cybersecurity attack surfaces, identify threats and threat vectors related to each Identify underlying guidance and policies associated with cybersecurity within the DoD Identify underlying guidance and policies associated with cybersecurity within the DoD

Lesson 3 - To-Be Objectives TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario and associated acquisition hardware/software documentation, learner will develop Cybersecurity requirements regarding security measures, continuity of operations, and protection of acquisition systems and system content. (BL 6) ELOs: – Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) – Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

Lesson 3 – Module Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) Summary – Identify cybersecurity threat – Define a case which integrates the defined threat within a cybersecurity incident – Develop Superset of activities that aid mitigation of the defined threat – Develop framework for critical thinking to select major activities from Superset from above – Develop student/group presentation scheme for validation of student learning!

Instructors Curriculum Developers Students Storyboard – IRM304, Lesson 3, ELO Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) Case RECOMMEND Select Develop Case THREAT Incident Activities That aid Mitigation Critical Thinking Review, Evaluate Present Assess Score

Lesson 3 – Module Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) Summary – Identify cybersecurity related IT Acquisition scenario – Define a case which integrates the defined scenario within a Request for Proposal (RFP) setting – Develop framework for critical thinking to identify, qualify, and select Cybersecurity related requirements – Develop student/group presentation scheme for validation of student learning!

Lesson 4 - Project/Program Management Module Lead: Denny (19-Measurement) 5 ELOs, Blooms 2-4 Assessment: Case Approach: Develop a single comprehensive case that integrates the 5 objectives; alternately break out the BL 2 objective into single slide meeting that objective

Lesson 4 - Project/Program Management Module Lead: Denny (Measurement) ELO Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) ELO Given a scenario, collect and process measurement and context relevant IT management and technical data. (BL 3) ELO Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) ELO Given a scenario, make actionable recommendations. (BL 3) ELO Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

Major Takeaways At the enterprise level, there are measurement process differences in the decision objectives, information needs, analytical techniques, communication structures, scope of application, and implementation complexity. Project and enterprise performance are interdependent - enterprise performance is based on the valid aggregation of the performance of multiple programs - the enterprise portfolio. Enterprise measurement must focus not only on the integrity of the program source data, but also on the validity of the data and information aggregation structures. There must be a suitable enterprise information infrastructure available to support the generation, aggregation, and communication of enterprise measurement results Enterprise measurement analysis and results interpretation are more complex

Lesson 5 - Acquisition Strategies Module Lead: Corcoran (7-Capability Planning- DBS) 2 ELOs, both Blooms 5 Assessment: Case Approach: Develop a single case that integrates both objectives

Lesson 5 - As-Is Objectives TLO: Given IT an acquisition scenario, advocate current and emerging IT acquisition strategies and recommended practices to ensure mission success. ELOs: – Appraise information technology acquisition programmatic issues and risks. – Assess appropriate information technology acquisition strategies and recommended practices. – Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. Existing Objectives map to ELOs allocated to other course(s) ?

Lesson 5 - To-Be Objectives TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario, learner will assess whether objectives in planning documents are stated clearly enough to support IT capability development. (BL 5) ELOs: – Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) – Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Lesson 5 - Acquisition Strategies Module Lead: Corcoran (DBS) ELO Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) ELO Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Lesson 5 – DBS Module ELOs Summary – Develop a DBS case – Integrate timeline and decision aspects relating to the Material Development Decision (MDD) and authorization into Engineering and Manufacturing Development (EMD) – Integrate Business Process Reengineering (BPR) into the case – Describe BPR assessment with regards generating artifacts that promote confidence in the solution – Establish that timing of the assessment should support decision making for Milestone B

Lesson 7 - Systems Engineering Module Lead: Thorne (4-BCA) 1 ELO, blooms 5 Assessment: Case Approach: Generate a single case that integrates the objectives

Lesson 7 - Systems Engineering Module Lead: Thorne (BCA) ELO Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5)

Lesson 7 – BCA Module ELOs Summary – Develop a DOD BCA case that includes aspects of Product Support/Sustainment strategy – Establish BCA update process requiring critical thinking for determining impacts to program strategies. – Given a BCA checklist, apply it to a product support BCA report

Backup Slides Follow

Competency Lead View

IRM 304 Lesson Managers LESSONLesson ManagerBackup 00 – Course IntroductionDenny 01 – Enterprise ArchitectureCorcoran 02 – Capital Planning and Investment ControlCooke 03 – CybersecurityDenman 04 – IT related Program ManagementThorneDenny 05 – Acquisition StrategiesHunt 06 – Acquisition Planning, Solicitation, & Administration of products & services Schlich Denny 07 – Information Systems EngineeringRice 08 – Test & Evaluation and Verification & ValidationMcMannes 09 – Emerging TechnologiesDenny