Presentation is loading. Please wait.

Presentation is loading. Please wait.

Threat Systems Management Office (TSMO)

Similar presentations


Presentation on theme: "Threat Systems Management Office (TSMO)"— Presentation transcript:

1 Threat Systems Management Office (TSMO)
Cybersecurity Threat Systems Management Office (TSMO) The objective of the Program Metrics Review is a review of program/product execution at the O-5 Product Manager level. The data used to support the review is provided by the Product Office. There should not be a requirement for a Product Office to generate any additional data to support this review. Briefer: Mr. Brad Thomason Title: Acting Director Date: 25 Jul 2018 /Phone: UNCLASSIFIED//FOUO

2 Cybersecurity Test and Evaluation Functions & Tasks
UNCLASSIFIED//FOUO Cybersecurity Test and Evaluation Functions & Tasks Compile list of cybersecurity and resiliency requirements • Prepare for cybersecurity T&E Events Develop the initial DEF Identify supporting cybersecurity T&E resources Develop the initial OT evaluation framework Align RMF activities with the TEMP Plan and schedule an MBCRA • Plan for cybersecurity T&E Develop cybersecurity T&E strategy Review PPP, System Engineering Plan Intelligence analysis Identify the cyber-attack surface Examine system architecture, components, and data flows Analyze and decompose system mission Map mission dependencies Analyze the attack surface Characterize the cyber threat Examine cyber effects on the system and mission Develop cyber kill chain Perform or update MBCRA Document results and update test planning and artifacts Document results of cyber-attack surface analysis in a cyber-attack surface analysis report Prepare for Phase 3 and Phase 4 cybersecurity DT&E events Formulate test strategy Plan CVI Test Activities Develop cybersecurity test objectives Contractor testing Plan test events Document test plans Plan cyber test infrastructure Integrate system testing • Conduct CVI events and document results Obtain reports Cybersecurity evaluation Update mission-based cyber risk assessment • Prepare for Phase 4 adversarial cybersecurity DT&E event Update cyber threat assessment and kill chain analysis Plan adversarial DT&E Develop test objectives Define metrics Identify resources Develop rules of engagement Define process and test cases Plan integrated tests Document test plans Finalize preparation of test infrastructure Conduct TRR Review threat assessments (e.g. VOLT) Review red team personnel assignment Conduct adversarial cybersecurity DT&E Perform ACD events Obtain reports Cybersecurity evaluation Exit criteria for cybersecurity DT&E Plan CVPA Coordinate with a cybersecurity vulnerability assessment team Execute CVPA Document results Plan adversarial assessment • Coordinate with the OTA team • Execute the adversarial assessment • Document results Threat objectives based mission impact assessment of capability World-class operators and infrastructure Event planning, coordination, deconfliction, and reporting Blue Team Red Team

3 Securing the Information Environment
UNCLASSIFIED//FOUO Securing the Information Environment

4 UNCLASSIFIED//FOUO Thoughts on Way Ahead Expand test philosophy to evaluate information pathways Compromise of Mission vs Compromise of System NDAA Section 1647 Up Front Analysis of Mission CVPA on Operational Networks Persistent Red Team

5 UNCLASSIFIED//FOUO Questions


Download ppt "Threat Systems Management Office (TSMO)"

Similar presentations


Ads by Google