Robert (Bob) Kazimer, SES Deputy to the Commanding General, U. S

Slides:



Advertisements
Similar presentations
IS-700.A: National Incident Management System, An Introduction
Advertisements

Forensics, Fighter Pilots and the OODA Loop The Role of Digital Forensics in Cyber Command & Control Heather M.B. Dussault, Ph.D. Assistant Professor,
Navy’s Operational Authority for Naval Networks, Information Operations, and FORCEnet 2004 Strike, Land Attack & Air Defense Annual Symposium Vice Admiral.
Build a Better Mousetrap: Quality Assurance and Call Specialist Performance Evaluation.
American Academy of Ambulatory Care Nursing Diane D. Scherr COL, AN Ambulatory Nursing Consultant 30 April,
Abt Associates Inc. In collaboration with: I Aga Khan Foundation I BearingPoint I Bitrán y Asociados I BRAC University I Broad Branch Associates I Forum.
NA-40 Training Overview January 31, EOTA Qualification Standards.
The Information School at the University of Washington IMT 582 Readiness Assessment Bob Boiko UW iSchool ischool.washington.edu Metatorial Services Inc.
Unit 8: Tests, Training, and Exercises Unit Introduction and Overview Unit objectives:  Define and explain the terms tests, training, and exercises. 
Welcome Thank you for choosing to view our company presentation.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
United States Army Combined Arms Center
Army Operational Electronic Warfare Course
Virtual Environment Tutoring Engine: ITSs for 3D Game Environments Shrenik Devasani Stephen Gilbert, Ph.D. Suhas Shetty Nandhini Ramaswamy Stephen Blessing,
How get your project management or professional services organization ISO 9001 certified.
 Explored alternative data collection for Family Development efforts in ETO with 3 pilot centers  Conducted focus groups with FRC Family Development.
CDT Samantha Dorminey CDT Daniel Lasche CDT Angel Santiago CDT Milton Washington 10 DEC 2014.
5-Step Process Clarification The 5-Step Process is for a unit, topic, or “chunk” of information. One form should be used for the unit, topic, etc. The.
Unit 5:Elements of A Viable COOP Capability (cont.)  Define and explain the terms tests, training, and exercises (TT&E)  Explain the importance of a.
1 of 16 The beauty of Office Automation is to alter not only our work environment but our very concept of the work.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Virginia Local Government IT Executives (VALGITE) April 26, 2010 Bruce Sturk & Leslie Fuentes – City of Hampton.
Military Psychology: Teams and Teamwork Dr. Steven J. Kass.
Unit 1 – Preparation for Assessment 1.2 Discuss approaches to auditing the capabilities and capacity of an college in or der to evaluate its readiness.
Communications Skills (ELE 205)
Chapter 6 Team Work Blueprint By Lec.Hadeel Qasaimeh.
United States Army Combined Arms Center "Responsive to Change Today, Ready for Tomorrow's Challenges.” FM 7-0 Training.
Command Post of the Future Limited Objective Experiment-1 Presented to: Information Superiority Workshop II: Focus on Metrics March 2000 Presented.
FA50 Qualification Course
Fermilab Presentation Greg Bock, Pepin Carolan, Mike Lindgren, Elaine McCluskey 2014 SC PM Workshop July 2014.
Communications Skills (ELE 205) Dr. Ahmad Dagamseh Dr. Ahmad Dagamseh.
Train the Force I Introduce the class by discussing Training, its importance to the success of the army. This lesson will first focus on the principles.
Jennifer C. Lovejoy, Ph.D. & Andrew Roberts Session 17: Monitoring, Quality Assurance, and Improvement 09/14/2011.
Fort Benning, Home of the MCoE Maneuver Center of Excellence - Team of Soldiers, Families, and Civilians from the Best Army in the World! UNCLASSIFIED.
[Exercise Name] Initial Planning Conference [Date] Initial Planning Conference [Date]
Lecture 8 TQM 311 lecturer: Noura Al-Afeef Medical Record Department 1.
Presentation Title | May 4, 2009 Training and Development Fall and Spring Course Offerings.
JAEC Assessment Initiatives and Implications Julia Loughran ThoughtLink, Inc Presented to: NDIA’s Training Transformation.
Aviation Security Training Module 3 Conducting an Exercise 1.
Dale Emmerson 75 FSS/FSD Chief, Force Development Flight I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Sustainment Center AFSC Way.
Teacher Assessment in Lithuania Dalia Brazienė, The Senior specialist of Culture, Education and Sports Department of Kaunas Region, Lithuania 12 / 04 /
MANAGING EMPLOYEE PERFORMANCE Facilitator: Joan Strohauer, CalHR Guest Presenters: Marva Lee, Personnel Officer, CalSTRS Brenna Neuharth, Workforce Planning.
Accelerated Adaptation Evolution The learning contest between the IDF and its adversaries ( ) Hezbollah [aided by Iran], Hamas, Islamic Jihad (Gaza),
Joint Framework Concept
Requirements of an ITS/Simulation Interoperability Standard (I/SIS)
Good B.I..
Why KM is Important KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports.
2017 Palmetto Cyber Defense Competition
Tracking Performance Data
SKILL ASSESSMENT OF SOFTWARE TESTERS Case Study
Designing and Implementing Local Faculty Development Programs
AUTL concept of Unit Ministry Team Religious Support Training Model
CERTS Workshop 1: Developing Training Resources & Education Curriculum
Dr. David “Fuzzy” Wells U.S. Pacific Command's Cyber War Innovation Center Introducing the Cyber War Innovation Center (CWIC) ** GE-104, 15:00 – 16:00,
Deployable Training Division (DTD)
CERTS Workshop 2: Cyber Degrees and Skills Certifications
Role and Plan - Demand Demand Team assesses the scope of this capability and the levels of usefulness. Step 1 – Read relevant articles and After-Action.
Cyber Center of Excellence
ARTIFICIAL INTELLIGENCE IN SOFTWARE TESTING
Mission Command Center Excellence Directorate of Training
Mission Command Center Excellence Directorate of Training
Joint Warfare Training Center (JWTC)
Defense Health Agency Industry Exchange J-6 I&O’s Enterprise Approach by COL Beverly Beavers November 08, 2018 Authorized Use Only Authorized Use Only.
Commandant, U.S. Army Cyber School January 17, 2018
Steering Committee Brief to the DoD M&S Conference 2008
Learning Objective TLO: 158-L-0030 Action: Manage Training
Linking Evaluation to Coaching and Mentoring Models
Coalition CBRN Information Inter-Operability Study (CCIIS)
Finance roles and responsibilities
The Top Rated EM Program
Presentation transcript:

CERTS Workshop 3: "Research and Development Supporting the Cyber Training Environment and Tools" Robert (Bob) Kazimer, SES Deputy to the Commanding General, U.S. Army Cyber Center of Excellence January 18, 2018

Workshop #3 Co- Chair: Dr Workshop #3 Co- Chair: Dr. Norbou Buchler, Army Research Laboratory, Adelphi MD Subgroup 1: Best Practices in Observational Measurement and Automated Metrics of Performance. What measures are required? How to measure readiness? Assessment results Readiness Input Process INDIVIDUAL LEADER (capstone) COLLECTIVE (exercise) FORCE (cyber flag) Qualification Automated Certification Observational (Manual) Cyber Capability Gunnery model for Cyber largely focused on individual level (no consistent measure at collective echelons) Longitudinal studies of team maturation needed (Storming -> Norming -> Performing)

Workshop #3 Co-Chair: Dr. Kenneth Williams, Ph. D Workshop #3 Co-Chair: Dr. Kenneth Williams, Ph.D., Program Director Associate Professor, STEM, APU Subgroup 2: Cyber Scenario and Ontology Development to support Cyber training There is a need to capture what responses have been done to date and categorize them. Pattern analysis of real world missions to perform a front end analysis in order to determine the requirements definition process. Task, conditions, standards; based on a survey so all players understand their left and right limits, priorities, to help identify what will be the scenario Create a game-like environment, monitor, record, automate the collection process needed due to the speed in which cyber changes Need to understand the vectors of attack, record events in training environment, develop pattern analysis, to help determine skillsets needed to solve the problem.

Workshop #3 Co-Chair: COL Paul Stanton, USA, Commander, Cyber Protection Brigade Subgroup 3: Readiness of Cyber Teams and the Dynamics of Mission Preparation Adaptable, Dynamic, Agile Training Environment that supports skill level 1-4 training Need to incorporate individual, collective, and leader training Need battle staff and commanding control training for cyber Reporting, tracking, and training management: collection, analysis, solution, & feedback