Search for tag: "cyberspace"

Echo - Delivering Cyber Defensive Capabilities at the Speed of Relevance to the Warfighter

In this Echo episode of "Acquisition Practices Worth Emulating" LTC Scott Helmore explains how the Army can respond to new cyber threats and have fielded solutions within 30 days. I…

From  ANTHONY REYNOLDS 10 Months ago 0 likes 55 views 0  

Echo - Taking an ACAT 1 program from an idea without staffing or funding to delivering the first product in 18 months.

In this Echo episode of "Acquisition Practices Worth Emulating" COL Rich Haggerty discusses how his team when charged with an ACAT 1 program without either defined requirements, staffing…

From  ANTHONY REYNOLDS 10 Months ago 0 likes 41 views 0  

Cybersecurity Table Top Evaluation Tool

The presentation highlights the process used for evaluating the integrity and vulnerability of a DoD Program Management Office's cybersecurity posture. Participants will obtain a better…

From  WILLIAM CONROY 11 Months ago 0 likes 21 views 0  

ISA201 Lesson 8 Cybersecurity

ISA201 Lesson 8 Cybersecurity video for Pre-Part A.

From  ROBERT SKERTIC 11 Months ago 0 likes 38 views 0  

A New Approach to Cyber Software Assurance

Roy Wilson discusses Cyber Software Assurance.

From  TIM DENMAN A year ago 0 likes 35 views 0  

NAVAIR Cyber Controls.v2 (Basic Small - WEB MBL (H264-600))

NAVAIR Cyber Warfare Tech Director - 3 min video on NIST 800-53 security controls tailoring and assessment

From  VINCENT LAMOLINARA A year ago 0 likes 28 views 0  

Cybersecurity in Program Acquisition - Dr Chris D'Ascenzo, DAU Professor of Program Management

DSMC Faculty Brown Bag by Dr Chris D'Ascenzo 19 October 2017 Chris provides an update on current topics in cybersecurity for DOD program managers. This includes an overview of current attacks…

From  IVAN TEPER A year ago 0 likes 65 views 0  

Protecting DoD's Unclassified Info - Part 1

First Video in a 3-Part Series on Protecting DoD's Unclassified Information.

From  KIMBERLY KENDALL A year ago 0 likes 458 views 0  

Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)

This video provides an overview of the Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT).

From  STEVE MILLS A year ago 0 likes 647 views 0  

NAVAIR_Cyber_Controls.v2

2nd version of NAVAIR Cyber Controls Video with Dr. Burke

From  VINCENT LAMOLINARA 2 Years ago 0 likes 144 views 0  

Hirsch Research Paper Competition 2017

Waelchli: Lecture / Announcement in Hirsch Research Paper Competition for 2017. Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics, George C. Wilamowski,…

From  LARRIE FERREIRO 2 Years ago 0 likes 36 views 0  

Cyber Security/Risk Mgmt Framework (RMF)

Cyber Security/Risk Mgmt Framework (RMF), DAU Coordinator - Mr. Tim Denman; Instructor - Mr. Tim Denman, DAU

From  KIMBERLY KENDALL 2 Years ago 0 likes 126 views 1  

President's Opening Remarks 2016 DAU Training Symposium

DAU President, Jim Wolsey, provides opening remarks to the 2016 DAU Training Symposium.

From  SAM PARKS 2 Years ago 0 likes 36 views 0