Search for tag: "cybersecurity risk identification"

DAU Lunch and Learn: Contract Types and Incentives

During this presentation, John Pritchard, Professor of Contract Management, Defense Acquisition University, will identify what drives the selection of a particular contract type and potential use of…

From  EMMETT SIMMONS 2 Months ago 0 likes 22 views 0  

CMC201 QCO#4 Risk Assessment

Analyzing risk to determine candidates for quick closeout.

From  ROBERT GOULD 6 Months ago 0 likes 61 views 0  

QCO Start Here

QCO Start Here Video

From  SCOTT STURGILL 9 Months ago 0 likes 25 views 0  

ISA201 Lesson 7 Risk in SW Dev - Optional

ISA201 Lesson 7 Risk in SW Dev is a video by one of the Airlie Council Experts on managing software risks.

From  ROBERT SKERTIC 11 Months ago 0 likes 11 views 0  

ISA201 Lesson 8 Cybersecurity

ISA201 Lesson 8 Cybersecurity video for Pre-Part A.

From  ROBERT SKERTIC 11 Months ago 0 likes 36 views 0  

Sec 804 How it Helps - Middle Tier of Acquisition - Drs Roper & Jette

Mr Ben Fitzgerald of OUSD (A&S) interviews Dr Will Roper, ASAF (AT&L) and Dr Bruce Jette, ASA(ALT) on benefits of authority in Sec 804 of 2016 NDAA. This first of 8 topical clips from the…

From  TIM STOVALL A year ago 0 likes 35 views 0  

QCO Risk Assessment

QCO Risk Assessment

From  SCOTT STURGILL A year ago 0 likes 35 views 0  

Identify QCO Candidates

Identify QCO Candidates

From  SCOTT STURGILL A year ago 0 likes 22 views 0  

DCMA Expenditure Profile Use in Analysis Part IV

DCMA Expenditure Profile Use in Analysis Part IV

From  SCOTT STURGILL A year ago 0 likes 10 views 0  

DCMA Expenditure Profile Use in Analysis Part III

DCMA Expenditure Profile Use in Analysis Part III

From  SCOTT STURGILL A year ago 0 likes 6 views 0  

Defense Panel Discussion on Middle Tier of Acquisition

Ben FitzGerald, the Director of Strategy and Design in the Office of the Under Secretary of Defense for Acquisition and Sustainment, interviews Dr. Bruce Jette, Assistant Secretary of the Army for…

From  SAM PARKS A year ago 4 likes 940 views 0  

W1-T1

CMC235 Indices and their Use

From  SCOTT STURGILL A year ago 0 likes 64 views 0  

Supply Chain Risk Management (SCRM): Changing the Program Protection Paradigm

Supply Chain Risk Management for Acquisition Programs

From  HEATH FERRY A year ago 0 likes 79 views 0  

Step-2

Step 2 of the 7-Step Services Acquisition Process.

From  ADAM STROUP A year ago 0 likes 179 views 0  

Weighted Guidelines (DD 1547)

Walkthrough of the mechanics to utilize the DD 1547; preparation of a government profit position for negotiation.

From  JONATHAN HITT A year ago 1 likes 326 views 0  

Cybersecurity in Program Acquisition - Dr Chris D'Ascenzo, DAU Professor of Program Management

DSMC Faculty Brown Bag by Dr Chris D'Ascenzo 19 October 2017 Chris provides an update on current topics in cybersecurity for DOD program managers. This includes an overview of current attacks…

From  IVAN TEPER A year ago 0 likes 65 views 0