REGISTER NOW: Sponsors Exhibitors Attendees

Management Track Day 2

June 7, 2017

 

1:30 pm - 2:15 pm

Management Track

Ballroom 1

“Engineering Cyber Resilient Weapon Systems”

Ms. Melinda Reed
Office of the Deputy Assistant Secretary of
Defense for Systems Engineering DASD(SE)

Abstract:

Better Buying Power (BBP) 3.0, launched in 2014, emphasizes acquisition best practices to achieve Dominant Capabilities through Technical Excellence and Innovation.  This includes weapon systems that are designed, built, and sustained to be successful in hostile or contested cyber environments.  Acquisition best practices for cyber-resilient weapon systems are being described in new defense policy, guidelines, and standards, starting with DoDI 5000.02, Operation of the Defense Acquisition System.

This presentation will discuss ongoing initiatives to establish or strengthen key acquisition best practices such as:

  • Providing systems analysis and engineering support to ensure cyber resilience is considered during the formulation of capabilities requirements
  • Defining the weapon ecosystem as all enabling systems, supporting systems, and operational systems that interact with the weapon system platform across the life cycle
  • Establishing and promoting acquisition, engineering, and test methods, processes, and tools to identify and manage weapon ecosystem design guidance, interface standards, and technical standards
  • Using the weapon ecosystem to establish or clarify organizational roles and responsibilities and to identify and manage life cycle transition points
  • Measuring and managing cyber resilience performance across the life cycle
 

2:15 pm - 3:00 pm

Management Track

Ballroom 1

“Cybersecurity Success Stories: How to Get It Right”

Dr. Mitch Crosswait
Deputy Director, Operational Test and Evaluation, DoD

Abstract:

Each year, the Director, Operational Test and Evaluation (DOT&E) oversees dozens of cybersecurity assessments of DOD acquisition programs and combatant command networks. During these assessments, cyber red teams attempt to penetrate the target system(s) using realistic threat tactics. All too often, our assessments show that DOD cyber defenses are not adequate to defend against a realistic threat. However, in recent years some DOD programs and networks have demonstrated significant improvements in cybersecurity, with network defenders able to prevent red teams from compromising critical operations and data. Understanding these success stories will help the entire Department improve its cybersecurity posture.

DOT&E’s cybersecurity assessments of live combatant command networks are an integral part of most commands’ major exercises. Poor cybersecurity often enables the exercise opposing force (OPFOR) to gain access to the blue force’s critical operational data, enabling the OPFOR to inflict serious damage to blue forces and evade blue force attacks. Since 2014, three combatant commands (TRANSCOM, PACOM and AFRICOM) have demonstrated the ability to fight through cyber attacks during major exercises, through a combination of good network hygiene, defensive technologies and well-trained, experienced network defenders, with the defenders being the most critical. Many combatant commands have improved their cybersecurity hygiene and technology, but only those commands with network defenders who know their network and who communicate well with other defenders have proven able to fight through realistic red team attacks and avoid serious impacts to their missions.

 

3:30 pm - 4:00 pm

Management Track

Ballroom 1

“DoD Risk Management Framework (RMF)- RMF’s Role in Achieving Cyber Resilient Weapon Systems”

Mr. Kevin Dulany
DoD CIO Office

Abstract:

This session will discuss the latest activities and key concepts for successful implementation of the DoD Risk Management Framework (RMF) within the Department. The RMF brings a risk-based approach to the implementation of cybersecurity and supports integration of cybersecurity in the systems design process, resulting in a more trustworthy system that can dependably operate in the face of a capable cyber adversary.

 

4:00 pm - 5:00 pm

Management Track

Ballroom 1

“Cybersecurity and DoD Acquisition Panel” 

Moderator
Mr. Dave Pearson
Engineering & IT Center Director, DAU

Panelists
Dr. Mitch Crosswait
Deputy Director, Operational Test and Evaluation, DoD

Mr. Stephen Mills
Professor, DAU

Mr. Kevin Dulany
DoD CIO Office

Ms. Melinda Reed
DASD-SE

Mr. Rodney Visser
Cyber Technical Director, SRC

Event Tracks for Day 2

Be Sure to Visit Our Amazing Sponsors!

Booz Allen Hamilton
All Points
Dynetics

Brought to You By...