Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISA 201 Intermediate Information Systems Acquisition

Similar presentations


Presentation on theme: "ISA 201 Intermediate Information Systems Acquisition"— Presentation transcript:

1 ISA 201 Intermediate Information Systems Acquisition

2 Lesson 11 Practicum 2

3 Today you will learn to (1 of 2):
Given an IT/SIS acquisition program, apply a cost estimation methodology to recommend appropriate strategies for budget execution within the legislation and guidance of PPBE. Apply a cost estimation methodology to the analysis of an acquisition program to determine the status of budget execution throughout the acquisition life cycle, Explain the DoD Systems Engineering Process in the context of an IT/SW Development. Given a DoD acquisition scenario, apply laws and DoD directives to ensure successful IT systems management throughout the acquisition life cycle. Given a description of an IT acquisition need, assess documentation to ensure specific information provides a clear understanding of the intended IT acquisition objectives from program outset. Identify relevant considerations that influence the acquisition lifecycle of a software-reliant system. Practicum 2

4 Today you will learn to (1 of 2):
Given a scenario, identify program IT decision information requirements. Create a set of program IT measures that are linked to the program decision information requirements. Apply the measurement results to support IT program decisions. Identify risks inherent to Information Technology (IT) system acquisition. Apply the five components of the DoD Risk Management Process Model to a given IT acquisition scenario Apply the Program Protection Plan to an IT Acquisition Scenario. Given an IT acquisition scenario, choose the appropriate controls for a system based on confidentiality, integrity, or availability requirements. Practicum 2

5 Acquisition Activities Review
Lesson Plan Acquisition Activities Review Joint Training and Maintenance System (JTAMS) Introduction We will use JTAMS throughout both weeks as we walk the Defense Acquisition Life-Cycle for Information Technology software intensive Systems (IT/SIS) Marching Orders Practicum 2 March 2014

6 Technology Maturation and Risk Reduction
PURPOSE: to reduce technology, engineering, integration, and life cycle cost risk to the point that a decision to contract for EMD can be made with confidence in successful program execution for development, production, and sustainment ENTER: MDA approved materiel solution and Acquisition Strategy, initial major program documentation and funding in the FYDP ACTIVITIES: Competitive prototyping of critical subsystems, SE Trade-off analysis, develop contracting strategy, conduct Capability Development Document (CDD) Validation conduct Preliminary Design Review (PDR), conduct Development Request For Proposal (RFP) Release Decision, begin source selection for Engineering Manufacturing Development (EMD) EXIT: Demonstration that risks have been adequately mitigated to support a commitment to design for production, Validated capability requirements, full funding in the Future Year Defense Plan (FYDP), and compliance with affordability goals for production and sustainment Practicum 2

7 Milestone B MDA approves*: Program Initiation (for most programs)
Entry into EMD Acquisition Program Baseline LRIP quantities Exit criteria for next phase Type of Contract Milestone B Certification (10 USC 2366b) Acquisition Decision Memorandum Practicum 2

8 JRATS/JTAMS Update Lesson Plan Status Acquisition Activities Review
Marching Orders Practicum 2 March 2014

9 JRATS and JTAMS Update Joint Reconnaissance and Targeting System (JRATS) Congrats, we passed Milestone A! Please see the Milestone A ADM in your Job Aids. We are now getting ready for Milestone B. First, we need to understand our requirements, create a build-to performance specification (System-Sub-System Specification (SSS)), create a Software Requirements Specifications (SRS) that supports the SSS, and an Interface Requirements Specification (IRS) that is the basis for our Allocated Baseline. Our Focus will be on understanding the requirements and risks of a pre-milestone B JTAMS You will analyze Requirements documents Identify risks Practicum 2

10 Practicum 2 Timeline Practicum 2 10 10

11 Joint Training and Maintenance System (JTAMS) Increment 1 Government Roadmap Schedule
Practicum 2 11

12 Marching Orders Lesson Plan Status Acquisition Activities Review
JRATS/JTAMS Update Marching Orders Practicum 2 March 2014

13 Practicum 2 Instructions
Each team will develop the practicum solution slide package using the templated slides provided, the given scenario and the artifacts, and the Job Aids folder. All slides will be submitted to the instructors electronically (Blackboard/Shared Drive) and hard copy (printed 2 slides per page and double sided) Each team will designate a PM and Deputy PM to present the results of the analysis prepared by the team. The student templates identify specific slides to be included in the formal student presentation . You will have 1.5 hours for research and development of the practicum solution. The PM and Deputy PM will have 5 minutes each to present their designated slides. Practicum 2 March 2014 13

14 Scope of Presentation During this exercise, each team will be required to perform Level II Information Technology/Software Acquisition Management tasks that would typically be conducted in a government program office. PM DPM: Presentation Intro/Overview Requirements Analysis JTAMS PDSS Risk Assessment Measurement Analysis Presentation Intro/Overview Revised Cost Analysis Program Protection Plan Analysis Security Control Analysis Summary/ Recommendations – PM and DPM All slides will be submitted to the instructors electronically (Blackboard/Shared Drive) and hard copy (printed 2 slides per page and double sided) See the file “Practicum 2 Situation and applicable artifacts” See the Student Template Slides for the practicum requirements Practicum 2

15 Marching Orders Remember, you are members of the JTAMS PMO – you must select a PM and DPM. Go to your Student CD and open the folder for this Practicum. Start by reading “Practicum 2 Situation and applicable artifacts” found in the Practicum 2 folder and by reviewing artifacts or tools found in the Job Aids Time Event Misc Practicum Intro Instructor Research and prepare analysis* Student teams 1415 Submit entire analysis Submit electronically on BB or shared drive AND hard copy Student PM/DPM Presentations Students present slides by team IAW the slide templates Instructor Wrap up *Allow time to ensure the presenters are familiar with the material Practicum 2 March 2014 15

16 Today we learned to (1 of 2):
Given an IT/SIS acquisition program, apply a cost estimation methodology to recommend appropriate strategies for budget execution within the legislation and guidance of PPBE. Apply a cost estimation methodology to the analysis of an acquisition program to determine the status of budget execution throughout the acquisition life cycle, Explain the DoD Systems Engineering Process in the context of an IT/SW Development. Given a DoD acquisition scenario, apply laws and DoD directives to ensure successful IT systems management throughout the acquisition life cycle. Given a description of an IT acquisition need, assess documentation to ensure specific information provides a clear understanding of the intended IT acquisition objectives from program outset. Identify relevant considerations that influence the acquisition lifecycle of a software-reliant system. Practicum 2

17 Today we learned to (2 of 2):
Given a scenario, identify program IT decision information requirements. Create a set of program IT measures that are linked to the program decision information requirements. Apply the measurement results to support IT program decisions. Identify risks inherent to Information Technology (IT) system acquisition. Apply the five components of the DoD Risk Management Process Model to a given IT acquisition scenario Apply the Program Protection Plan to an IT Acquisition Scenario. Given an IT acquisition scenario, choose the appropriate controls for a system based on confidentiality, integrity, or availability requirements. Practicum 2


Download ppt "ISA 201 Intermediate Information Systems Acquisition"

Similar presentations


Ads by Google