REGISTER NOW: Sponsors Exhibitors Attendees

Management Track Day 2

June 7, 2017


1:30 pm - 2:15 pm

Management Track

Ballroom 1

“Engineering Cyber Resilient Weapon Systems”

Ms. Melinda Reed
Office of the Deputy Assistant Secretary of
Defense for Systems Engineering DASD(SE)


Better Buying Power (BBP) 3.0, launched in 2014, emphasizes acquisition best practices to achieve Dominant Capabilities through Technical Excellence and Innovation.  This includes weapon systems that are designed, built, and sustained to be successful in hostile or contested cyber environments.  Acquisition best practices for cyber-resilient weapon systems are being described in new defense policy, guidelines, and standards, starting with DoDI 5000.02, Operation of the Defense Acquisition System.

This presentation will discuss ongoing initiatives to establish or strengthen key acquisition best practices such as:

  • Providing systems analysis and engineering support to ensure cyber resilience is considered during the formulation of capabilities requirements
  • Defining the weapon ecosystem as all enabling systems, supporting systems, and operational systems that interact with the weapon system platform across the life cycle
  • Establishing and promoting acquisition, engineering, and test methods, processes, and tools to identify and manage weapon ecosystem design guidance, interface standards, and technical standards
  • Using the weapon ecosystem to establish or clarify organizational roles and responsibilities and to identify and manage life cycle transition points
  • Measuring and managing cyber resilience performance across the life cycle

2:15 pm - 3:00 pm

Management Track

Ballroom 1

“Cybersecurity Success Stories: How to Get It Right”

Dr. Mitch Crosswait
Deputy Director, Operational Test and Evaluation, DoD


Each year, the Director, Operational Test and Evaluation (DOT&E) oversees dozens of cybersecurity assessments of DOD acquisition programs and combatant command networks. During these assessments, cyber red teams attempt to penetrate the target system(s) using realistic threat tactics. All too often, our assessments show that DOD cyber defenses are not adequate to defend against a realistic threat. However, in recent years some DOD programs and networks have demonstrated significant improvements in cybersecurity, with network defenders able to prevent red teams from compromising critical operations and data. Understanding these success stories will help the entire Department improve its cybersecurity posture.

DOT&E’s cybersecurity assessments of live combatant command networks are an integral part of most commands’ major exercises. Poor cybersecurity often enables the exercise opposing force (OPFOR) to gain access to the blue force’s critical operational data, enabling the OPFOR to inflict serious damage to blue forces and evade blue force attacks. Since 2014, three combatant commands (TRANSCOM, PACOM and AFRICOM) have demonstrated the ability to fight through cyber attacks during major exercises, through a combination of good network hygiene, defensive technologies and well-trained, experienced network defenders, with the defenders being the most critical. Many combatant commands have improved their cybersecurity hygiene and technology, but only those commands with network defenders who know their network and who communicate well with other defenders have proven able to fight through realistic red team attacks and avoid serious impacts to their missions.


3:30 pm - 4:00 pm

Management Track

Ballroom 1

“Cybersecurity and Lifecycle Acquisition Integration Tool (CALIT) Overview”

Steve Mills
Professor, DAU South Region


Effective Integration of Cybersecurity into the DoD Acquisition Lifecycle encompasses several key policies and processes:

  • DoDI 5000.02 – Operation of the Defense Acquisition System
  • DoDI 8510.01- Risk Management Framework (RMF) for DoD Information Technology (IT)
  • Cybersecurity and Test Evaluation
  • Program Protection
  • System Security Engineering (SSE)

Understanding what these processes are and how they interact will lead to better acquisition outcomes.   The Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT) provides the user the insight into these supporting processes and the ability to visualize how these processes work together to promote cyber resilient weapon systems.



4:00 pm - 5:00 pm

Management Track

Ballroom 1

“Cybersecurity and DoD Acquisition Panel” 

Mr. Dave Pearson
Engineering & IT Center Director, DAU

Dr. Mitch Crosswait
Deputy Director, Operational Test and Evaluation, DoD

Mr. Stephen Mills
Professor, DAU

Vinny Lamolinara
Cybersecurity Acquisition Professor, DAU

Ms. Melinda Reed

Mr. Rodney Visser
Cyber Technical Director, SRC

Event Tracks for Day 2

Be Sure to Visit Our Amazing Sponsors!

Booz Allen Hamilton
All Points

Brought to You By...