Presentation is loading. Please wait.

Presentation is loading. Please wait.

IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Similar presentations


Presentation on theme: "IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],"— Presentation transcript:

1 IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning], 4 (BCA)-Thorne

2 SummaryDescriptionblooms level ELO 19.2.2.5 ELO 19.2.2.5: Given an Information Resource scenario, make actionable recommendations. (BL 3) 3 ELO 19.2.2.3 ELO 19.2.2.3: Given an Information Resource scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) 4 ELO 19.2.2.8 ELO 19.2.2.8: Adapt and improve the Information Resource measurement process. (BL 3) 3 ELO 19.2.2.2 ELO 19.2.2.2: Given an Information Resource scenario, collect and process measurement and context relevant IT management and technical data. (BL 3) 3 ELO 19.1.2.4 ELO 19.1.2.4: Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) 2 ELO 4.1.1.9 ELO 4.1.1.9: Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5) 5 ELO 26.1.1.7 ELO 26.1.1.7: Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) 5 ELO 26.1.1.3 ELO 26.1.1.3: Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) 5 ELO 7.1.1.6 ELO 7.1.1.6: Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5) 5 ELO 7.1.1.5 ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) 5 Scope of Change (10 ELOs) Measurement5 BCA1 Cybersecurity2 DBS2

3

4 July 2014IRM 304 MondayTuesdayWednesdayThursdayFriday 0800-1630 0800-1430 LUNCH Course Introduction Course Introduction DAU Brief Enterprise Architecture (1) Enterprise Architecture (1) Cybersecurity (3) Cybersecurity (3) IT Acquisition Strategies (5) IT Acquisition Strategies (5) Industry Guest Speakers 0800-1000 Industry Guest Speakers 0800-1000 System T&E And Software V&V (8) System T&E And Software V&V (8) IT-related Project/ Program Management (P/PM) (4) IT-related Project/ Program Management (P/PM) (4) Acquisition Planning Solicitation & Administration of product & services (6) Acquisition Planning Solicitation & Administration of product & services (6) Information Systems Engineering (7) Information Systems Engineering (7) Emerging Technologies (9) Emerging Technologies (9) Capital Planning And Investment Control (CPIC) And Portfolio Management (2) Capital Planning And Investment Control (CPIC) And Portfolio Management (2) Hot Topic Information Exchange Hot Topic Information Exchange Course Graduation Course Graduation Policies, Laws & Regulations Recommended Practices = Graded Team Exercise

5 Lesson 3 - Cybersecurity Module Lead: Denman (26-Cybersecurity) 2 ELOs, each Blooms 5; completely replaces existing lesson objectives. Assessment: Case Approach: Develop unique case for each ELO

6 2 ELOs Replace ALL existing Objectives 2 ELOs Integrate/Replace existing Objectives 5 ELOs Integrate with existing Objectives 1 ELO Integrate with existing Objectives Unique Case for each ELO Single case Integrating all ELOs 26 Cybersecurity 19 Measurement 7 DBS 4 BCA Denman Denny Kinner Parker, Corcoran Thorne Bloom 5 Bloom 2-4 Bloom 5 Bloom 5

7

8 Lesson 3 - As-Is Objectives TLO: Given current IT Cybersecurity threats, explain how the risks can be mitigated via acquisition planning to ensure mission success. ELOs: – Discuss the Cybersecurity, critical infrastructure protection, and continuity of operation requirements for mission assurance. (ELO 26.1.1.4)  IRM101 – Assess the scope and seriousness of current and emerging Cybersecurity threats to DoD systems. (ELO 26.1.1.2)  IRM202 – Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. (ELO 26.1.1.5)  IRM101 Existing Objectives map to ELOs allocated to other course(s) Choose 5 to 7 elements that go into a continuity of operations plan 26.1.1.4 Choose 5 to 7 elements that go into a continuity of operations plan 26.1.1.4 Given examples of Cybersecurity attack surfaces, identify threats and threat vectors related to each 26.1.1.2 Given examples of Cybersecurity attack surfaces, identify threats and threat vectors related to each 26.1.1.2 Identify underlying guidance and policies associated with cybersecurity within the DoD 26.1.1.5 Identify underlying guidance and policies associated with cybersecurity within the DoD 26.1.1.5

9 Lesson 3 - To-Be Objectives TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario and associated acquisition hardware/software documentation, learner will develop Cybersecurity requirements regarding security measures, continuity of operations, and protection of acquisition systems and system content. (BL 6) ELOs: – 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) – 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

10 Lesson 3 – Module 1 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) Summary – Identify cybersecurity threat – Define a case which integrates the defined threat within a cybersecurity incident – Develop Superset of activities that aid mitigation of the defined threat – Develop framework for critical thinking to select major activities from Superset from above – Develop student/group presentation scheme for validation of student learning!

11 Instructors Curriculum Developers Students Storyboard – IRM304, Lesson 3, ELO 26.1.1.3 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5) Case RECOMMEND Select Develop Case THREAT Incident Activities That aid Mitigation Critical Thinking Review, Evaluate Present Assess Score

12 Lesson 3 – Module 2 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) Summary – Identify cybersecurity related IT Acquisition scenario – Define a case which integrates the defined scenario within a Request for Proposal (RFP) setting – Develop framework for critical thinking to identify, qualify, and select Cybersecurity related requirements – Develop student/group presentation scheme for validation of student learning!

13 Lesson 4 - Project/Program Management Module Lead: Denny (19-Measurement) 5 ELOs, Blooms 2-4 Assessment: Case Approach: Develop a single comprehensive case that integrates the 5 objectives; alternately break out the BL 2 objective into single slide meeting that objective

14 Lesson 4 - Project/Program Management Module Lead: Denny (Measurement) ELO 19.1.2.4 Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) ELO 19.2.2.1 Given a scenario, collect and process measurement and context relevant IT management and technical data. (BL 3) ELO 19.2.2.2 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) ELO 19.2.2.3Given a scenario, make actionable recommendations. (BL 3) ELO 19.2.2.4 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

15 Major Takeaways At the enterprise level, there are measurement process differences in the decision objectives, information needs, analytical techniques, communication structures, scope of application, and implementation complexity. Project and enterprise performance are interdependent - enterprise performance is based on the valid aggregation of the performance of multiple programs - the enterprise portfolio. Enterprise measurement must focus not only on the integrity of the program source data, but also on the validity of the data and information aggregation structures. There must be a suitable enterprise information infrastructure available to support the generation, aggregation, and communication of enterprise measurement results Enterprise measurement analysis and results interpretation are more complex

16 Lesson 5 - Acquisition Strategies Module Lead: Corcoran (7-Capability Planning- DBS) 2 ELOs, both Blooms 5 Assessment: Case Approach: Develop a single case that integrates both objectives

17 Lesson 5 - As-Is Objectives TLO: Given IT an acquisition scenario, advocate current and emerging IT acquisition strategies and recommended practices to ensure mission success. ELOs: – Appraise information technology acquisition programmatic issues and risks. – Assess appropriate information technology acquisition strategies and recommended practices. – Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. Existing Objectives map to ELOs allocated to other course(s) ?

18 Lesson 5 - To-Be Objectives TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario, learner will assess whether objectives in planning documents are stated clearly enough to support IT capability development. (BL 5) ELOs: – 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) – 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

19 Lesson 5 - Acquisition Strategies Module Lead: Corcoran (DBS) ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5) ELO 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

20 Lesson 5 – DBS Module ELOs Summary – Develop a DBS case – Integrate timeline and decision aspects relating to the Material Development Decision (MDD) and authorization into Engineering and Manufacturing Development (EMD) – Integrate Business Process Reengineering (BPR) into the case – Describe BPR assessment with regards generating artifacts that promote confidence in the solution – Establish that timing of the assessment should support decision making for Milestone B

21 Lesson 7 - Systems Engineering Module Lead: Thorne (4-BCA) 1 ELO, blooms 5 Assessment: Case Approach: Generate a single case that integrates the objectives

22 Lesson 7 - Systems Engineering Module Lead: Thorne (BCA) ELO 4.1.1.9 Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5)

23 Lesson 7 – BCA Module ELOs Summary – Develop a DOD BCA case that includes aspects of Product Support/Sustainment strategy – Establish BCA update process requiring critical thinking for determining impacts to program strategies. – Given a BCA checklist, apply it to a product support BCA report

24 Backup Slides Follow

25

26 Competency Lead View

27 IRM 304 Lesson Managers LESSONLesson ManagerBackup 00 – Course IntroductionDenny 01 – Enterprise ArchitectureCorcoran 02 – Capital Planning and Investment ControlCooke 03 – CybersecurityDenman 04 – IT related Program ManagementThorneDenny 05 – Acquisition StrategiesHunt 06 – Acquisition Planning, Solicitation, & Administration of products & services Schlich Denny 07 – Information Systems EngineeringRice 08 – Test & Evaluation and Verification & ValidationMcMannes 09 – Emerging TechnologiesDenny


Download ppt "IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],"

Similar presentations


Ads by Google