DoD Cyberspace Workforce Definitions

Slides:



Advertisements
Similar presentations
INTOSAI IT Audit IT Methods Awareness
Advertisements

Instructional Technology vs. Educational Technology
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Introduction to Information Operations Attaché Corps- SEP 09
Agenda COBIT 5 Product Family Information Security COBIT 5 content
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
South Carolina Cyber.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Stephen S. Yau CSE , Fall Security Strategies.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
Presented by: Cyber Operations Division 1 Navigating the Compliance, Risk and Engineering Cyber Security Challenges Impacting Navy Programs 2015 ASNE Intelligent.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Georgia Institute of Technology CS 4320 Fall 2003.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
Project Management Components (Part 5)
2 2 Eleanor Spector Vice President, Contracts Lockheed Martin Corporation August 5, :30-10:15AM Industry Acquisition Issues.
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
DOD SOFTWARE ASSURANCE INITIATIVE: Mitigating Risks Attributable to Software through Enhanced Risk Management Joe Jarzombek, PMP Deputy Director for Software.
Ms. Sandra Stanar-Johnson
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
UNCLASSIFIED National Defense University Center for Complex Operations An Initial Framework for Transitional Public Security Bernie Carreau SSE IPR Workshop.
State of Georgia Release Management Training
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Pittsburgh, PA CMMI Acquisition Module - Page M5-1 CMMI ® Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University This.
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Information Security tools for records managers Frank Rankin.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Coast Guard Cyber Command
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Hyperconvergence in Space Ground Systems Architectures
COMP532 IT INFRASTRUCTURE
CCJ6 Strategic Cybersecurity Engagement Scorecard
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Figure 2: Overview of Program Protection Activities and Relationships
Electronic Records Management Program
Introduction to the Federal Defense Acquisition Regulation
KELA Targeted Cyber Intelligence
United States Coast Guard
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
U.S. Coast Guard Cyber Education & Training
Cyber defense management
DoD Cyberspace Workforce Definitions
2017 Health care Preparedness and Response Draft Capabilities
UConn NIST Compliance Project
CUSTOMER RELATIONSHIP MANAGEMENT CONCEPTS AND TECHNOLOGIES
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Table 1: Human Systems Integration Related Policy and Direction
Perspectives on Defense Cyber Issues
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Robin Dale RLG OAIS Functionality Robin Dale RLG
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
IT Management Services Infrastructure Services
NPHS 1510 Federal and International
UDTSecure TM.
Presentation transcript:

DoD Cyberspace Workforce Definitions cyberspace Workforce. “Personnel who build, secure, operate, defend, and protect DoD and US cyberspace resources; conduct related intelligence activities, enable future operations, and project power in or through cyberspace. It is comprised of personnel assigned to the areas of cyberspace effects, cybersecurity, cyberspace IT and portions of the Intelligence workforces.” cyberspace effects workforce. “Personnel who plan, support and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.” cybersecurity workforce. “Personnel who secure, defend and preserve data, networks, net-centric capabilities, and other designated systems by ensuring appropriate security controls and measures are in place, and taking internal defense actions. This includes access to system controls, monitoring, administration and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities.” cyberspace information technology workforce. “Personnel who design, build, configure, operate and maintain information technology, networks and capabilities. This includes actions to prioritize portfolio investments, architect, engineer, acquire, implement, evaluate, and dispose of information technology and services; as well as information resources management, and the management, storage, transmission, and display of data and information.” intelligence workforce (cyberspace). “Personnel who collect, process, analyze, and disseminate information from all sources of intelligence on foreign actors’ cyber programs, intentions, capabilities, research and development, and operational activities.” Unclassified