Search for tag: "space security"

DSCA Video -- Introduction to DoD Security Cooperation (V3)

This Defense Security Cooperation Agency (DSCA) video provides an overview of U.S. Government and DoD Security Cooperation activities with allied/friendly nations and international organizations. …

From  FRANK KENLON 3 Months ago 0 likes 19 views 0  

DSCA Foreign Military Sales Overview

This Defense Security Cooperation Agency (DSCA) video provides an overview of U.S. Government and DoD Security Cooperation FMS program activities. Most DoD FMS activities involve DoD acquisition…

From  FRANK KENLON 3 Months ago 0 likes 33 views 0  

DSCA Video on Security Cooperation Foundational Agreements

This Defense Security Cooperation Agency (DSCA) video provides an overview of U.S. Government and DoD Security Cooperation Foundational Agreements with allied/friendly nations and international…

From  FRANK KENLON 3 Months ago 0 likes 3 views 0  

DSCA Video on End Use Monitoring Checks

This Defense Security Cooperation Agency (DSCA) describes the policy and process used by DoD personnel -- including DoD acquisition workforce members -- who are either responsible for performing or…

From  FRANK KENLON 3 Months ago 0 likes 2 views 0  

Other Transaction Mythbusting Video Series - Ep. 4: There is only one type of OT available to DoD

This video busts the myth that there is only one type of Other Transaction available to DoD.

From  RYAN JOHNSON 8 Months ago 1 likes 118 views 0  

ISA201 Lesson 8 Cybersecurity

ISA201 Lesson 8 Cybersecurity video for Pre-Part A.

From  ROBERT SKERTIC 11 Months ago 0 likes 36 views 0  

A New Approach to Cyber Software Assurance

Roy Wilson discusses Cyber Software Assurance.

From  TIM DENMAN A year ago 0 likes 35 views 0  

NAVAIR Cyber Controls.v2 (Basic Small - WEB MBL (H264-600))

NAVAIR Cyber Warfare Tech Director - 3 min video on NIST 800-53 security controls tailoring and assessment

From  VINCENT LAMOLINARA A year ago 0 likes 28 views 0  

Cybersecurity in Program Acquisition - Dr Chris D'Ascenzo, DAU Professor of Program Management

DSMC Faculty Brown Bag by Dr Chris D'Ascenzo 19 October 2017 Chris provides an update on current topics in cybersecurity for DOD program managers. This includes an overview of current attacks…

From  IVAN TEPER A year ago 0 likes 65 views 0  

Protecting DoD's Unclassified Info - Part 3

Third video in a 3-Part Series on Protecting DoD's Unclassified Information

From  KIMBERLY KENDALL A year ago 0 likes 233 views 0  

Protecting DoD's Unclassified Info - Part 2

Second video in a 3-Part Series on Protecting DoD's Unclassified Information

From  KIMBERLY KENDALL A year ago 0 likes 331 views 0  

Protecting DoD's Unclassified Info - Part 1

First Video in a 3-Part Series on Protecting DoD's Unclassified Information.

From  KIMBERLY KENDALL A year ago 0 likes 458 views 0  

Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)

This video provides an overview of the Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT).

From  STEVE MILLS A year ago 0 likes 645 views 0  

NAVAIR_Cyber_Controls.v2

2nd version of NAVAIR Cyber Controls Video with Dr. Burke

From  VINCENT LAMOLINARA 2 Years ago 0 likes 144 views 0  

Risk Attitude (Dave Lengyel: 2 of 3)

Dave Lengyel further discusses his research about risk attitudes using multi-attribute utility theory. He discusses what drives risk decisions on some NASA programs.

From  JOHN DRIESSNACK 2 Years ago 0 likes 40 views 0  

Four Research Paths in Risk Management (David Lengyel 1 of 3)

Four Research Paths in Risk Management (David Lengyel 1 of 3) Dave Lengyel discusses his four research paths in risk management. First is multi-attribute utility theory, second is development and…

From  JOHN DRIESSNACK 2 Years ago 0 likes 40 views 0