Difference between revisions of "Joint Capabilities Integration and Development System (JCIDS)"

From
Jump to: navigation, search
m
m
Line 76: Line 76:
 
* Fielded less than 2 years
 
* Fielded less than 2 years
 
* There are three (3) types of of Urgent Needs: 1. Joint Urgent Operational Needs (JUON), 2. Joint Emergent Operational Need (JEON), and 3. Urgent Operational Need (UON)
 
* There are three (3) types of of Urgent Needs: 1. Joint Urgent Operational Needs (JUON), 2. Joint Emergent Operational Need (JEON), and 3. Urgent Operational Need (UON)
* [http://acqnotes.com/acqnote/acquisitions/joint-urgent-operational-need-juon JCIDS Process - Urgent Capability Acquisition] | [https://acqnotes.com/ AcqNotes]
+
* [https://acqnotes.com/acqnote/acquisitions/joint-urgent-operational-need-juon JCIDS Process - Urgent Capability Acquisition] | [https://acqnotes.com/ AcqNotes]
 
** [https://acqnotes.com/wp-content/uploads/2014/09/DoD-Instruction-5000.81-Urgent-Capability-Acquisition-31-Dec-19.pdf DODI 5000.81  Urgent Capability Acquisition  | Office of the Under Secretary of Defense for Acquisition and Sustainment (A&S)]
 
** [https://acqnotes.com/wp-content/uploads/2014/09/DoD-Instruction-5000.81-Urgent-Capability-Acquisition-31-Dec-19.pdf DODI 5000.81  Urgent Capability Acquisition  | Office of the Under Secretary of Defense for Acquisition and Sustainment (A&S)]
 
** [https://acqnotes.com/wp-content/uploads/2014/09/DAU-Urgent-Operational-Needs-7-Jul-2016.pdf Urgent and Emergent Operational Needs and Their Fulfillment (pdf)]
 
** [https://acqnotes.com/wp-content/uploads/2014/09/DAU-Urgent-Operational-Needs-7-Jul-2016.pdf Urgent and Emergent Operational Needs and Their Fulfillment (pdf)]
Line 326: Line 326:
 
* [[Cybersecurity]]
 
* [[Cybersecurity]]
 
* [[Graph#Cybersecurity - Visualization|Cybersecurity - Visualization]]
 
* [[Graph#Cybersecurity - Visualization|Cybersecurity - Visualization]]
* [http://www.dau.edu/tools/Lists/DAUTools/Attachments/20/Cybersecurity%20Black%20Card_Quick%20Reference_April%202019.pdf Cybersecurity Black Card | ] [http://www.dau.edu  Defense Acquisition University (DAU)]
+
* [https://www.dau.edu/tools/Lists/DAUTools/Attachments/20/Cybersecurity%20Black%20Card_Quick%20Reference_April%202019.pdf Cybersecurity Black Card | ] [https://www.dau.edu  Defense Acquisition University (DAU)]
* [http://www.dau.edu/tools/t/Cybersecurity-and-Acquisition-Lifecycle-Integration-Tool-(CALIT) Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT) |] [http://www.dau.edu  Defense Acquisition University (DAU)]
+
* [https://www.dau.edu/tools/t/Cybersecurity-and-Acquisition-Lifecycle-Integration-Tool-(CALIT) Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT) |] [https://www.dau.edu  Defense Acquisition University (DAU)]
* [http://www.dau.edu/library/defense-atl/blog/The-Cybersecurity-and-Acquisition-Life-Cycle-Integration-Tool  The Cybersecurity and Acquisition Life-Cycle Integration Tool | Steve Mills and Tim Denman] ...[http://acqnotes.com/wp-content/uploads/2016/08/The-Cybersecurity-and-Acquisition-Life-Cycle-Integration-Tool-by-Steve-Mills-and-Tim-Denman.pdf (pdf)] - [http://acqnotes.com AcqNotes]
+
* [https://www.dau.edu/library/defense-atl/blog/The-Cybersecurity-and-Acquisition-Life-Cycle-Integration-Tool  The Cybersecurity and Acquisition Life-Cycle Integration Tool | Steve Mills and Tim Denman] ...[https://acqnotes.com/wp-content/uploads/2016/08/The-Cybersecurity-and-Acquisition-Life-Cycle-Integration-Tool-by-Steve-Mills-and-Tim-Denman.pdf (pdf)] - [https://acqnotes.com AcqNotes]
  
 
Understanding what these processes are and how they interact will lead to better acquisition outcomes.  The Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT) provides the user the insight into these supporting processes and the ability to visualize how these processes work together to promote cyber resilient weapon systems.
 
Understanding what these processes are and how they interact will lead to better acquisition outcomes.  The Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT) provides the user the insight into these supporting processes and the ability to visualize how these processes work together to promote cyber resilient weapon systems.
  
<img src="http://www.dau.edu/library/defense-atl/PublishingImages/DAU_Defense%20ATL_Cybersecurity%20Acquisition%20Life-Cycle%20Integration%20Tool%20Figure%201_20170828.jpg" width="1000">
+
<img src="https://www.dau.edu/library/defense-atl/PublishingImages/DAU_Defense%20ATL_Cybersecurity%20Acquisition%20Life-Cycle%20Integration%20Tool%20Figure%201_20170828.jpg" width="1000">
  
http://www.csiac.org/wp-content/uploads/2020/10/2020-10-09-csiac-policy-chart-e1602511053113.jpg  [http://dodiac.dtic.mil/wp-content/uploads/2020/08/ia-policychart-30-July-20-DoDIN.pdf DOD Cybersecurity Policy Chart | Cyber Security & Information Systems Information Analysis Center] ...[http://www.csiac.org/resources/the-dod-cybersecurity-policy-chart/changelog/ Changelog]
+
https://www.csiac.org/wp-content/uploads/2020/10/2020-10-09-csiac-policy-chart-e1602511053113.jpg  [https://dodiac.dtic.mil/wp-content/uploads/2020/08/ia-policychart-30-July-20-DoDIN.pdf DOD Cybersecurity Policy Chart | Cyber Security & Information Systems Information Analysis Center] ...[https://www.csiac.org/resources/the-dod-cybersecurity-policy-chart/changelog/ Changelog]
  
  
  
* [http://acqnotes.com/wp-content/uploads/2014/09/DoD-Instruction-5000.02-The-Defense-Acquisition-System-10-Aug-17-Change-3.pdf DODI 5000.02T - Operation of the Defense Acquisition System, Enclosure 14; Cybersecurity in the Defense Acquisition System]
+
* [https://acqnotes.com/wp-content/uploads/2014/09/DoD-Instruction-5000.02-The-Defense-Acquisition-System-10-Aug-17-Change-3.pdf DODI 5000.02T - Operation of the Defense Acquisition System, Enclosure 14; Cybersecurity in the Defense Acquisition System]
* [http://acqnotes.com/acqnote/careerfields/information-assurance Information Technology - Cybersecurity] | [http://acqnotes.com AcqNotes]
+
* [https://acqnotes.com/acqnote/careerfields/information-assurance Information Technology - Cybersecurity] | [https://acqnotes.com AcqNotes]
** [http://www.acqnotes.com/wp-content/uploads/2014/09/PM-Guidebook-for-Integrating-Cybersecurity-RMF-into-System-Acquisition-Lifecycle-Sep-2015.pdf Guidance on Cybersecurity Implementation in Acquisition Programs (pdf)]   
+
** [https://www.acqnotes.com/wp-content/uploads/2014/09/PM-Guidebook-for-Integrating-Cybersecurity-RMF-into-System-Acquisition-Lifecycle-Sep-2015.pdf Guidance on Cybersecurity Implementation in Acquisition Programs (pdf)]   
** [http://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf?ver=2019-02-26-101520-300 DODI 8510.01 - Risk Management Framework (RMF) for DOD Information Technology (IT) (pdf)]
+
** [https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf?ver=2019-02-26-101520-300 DODI 8510.01 - Risk Management Framework (RMF) for DOD Information Technology (IT) (pdf)]
** [http://www.acqnotes.com/wp-content/uploads/2014/09/PM-Guidebook-for-Integrating-Cybersecurity-RMF-into-System-Acquisition-Lifecycle-Sep-2015.pdf PM Guidebook for Integrating Cybersecurity RMF into System Acquisition Lifecycle (pdf) – Sep 2015]
+
** [https://www.acqnotes.com/wp-content/uploads/2014/09/PM-Guidebook-for-Integrating-Cybersecurity-RMF-into-System-Acquisition-Lifecycle-Sep-2015.pdf PM Guidebook for Integrating Cybersecurity RMF into System Acquisition Lifecycle (pdf) – Sep 2015]
* [http://www.dau.edu/cop/test/DAU%20Sponsored%20Documents/Cybersecurity-Test-and-Evaluation-Guidebook-Version2-change-1.pdf Cybersecurity Test and Evaluation Guidebook (pdf)] - [http://www.dau.edu  Defense Acquisition University (DAU)]
+
* [https://www.dau.edu/cop/test/DAU%20Sponsored%20Documents/Cybersecurity-Test-and-Evaluation-Guidebook-Version2-change-1.pdf Cybersecurity Test and Evaluation Guidebook (pdf)] - [https://www.dau.edu  Defense Acquisition University (DAU)]
* [http://acqnotes.com/acqnote/careerfields/cybersecurity-strategy Intelligence & Security - Cybersecurity Strategy] ...The strategy is created and maintained by the Program Office and appended to the Program Protection Plan (PPP). It’s required for all ACAT level programs.
+
* [https://acqnotes.com/acqnote/careerfields/cybersecurity-strategy Intelligence & Security - Cybersecurity Strategy] ...The strategy is created and maintained by the Program Office and appended to the Program Protection Plan (PPP). It’s required for all ACAT level programs.
** [http://www.acqnotes.com/wp-content/uploads/2014/09/DoD-CIO-Cybersecurity-Strategy-Outline-and-Guidance-10-Nov-15-1.pdf DoD CIO Cybersecurity Strategy Outline and Guidance (pdf) – 10 Nov 15]
+
** [https://www.acqnotes.com/wp-content/uploads/2014/09/DoD-CIO-Cybersecurity-Strategy-Outline-and-Guidance-10-Nov-15-1.pdf DoD CIO Cybersecurity Strategy Outline and Guidance (pdf) – 10 Nov 15]
* [http://acqnotes.com/acqnote/careerfields/program-protection-plan Intelligence & Security - Program Protection Plan (PPP)] | [http://acqnotes.com AcqNotes]
+
* [https://acqnotes.com/acqnote/careerfields/program-protection-plan Intelligence & Security - Program Protection Plan (PPP)] | [https://acqnotes.com AcqNotes]
** [http://www.acqnotes.com/Attachments/Program%20Protection%20Plan%20Outline%20and%20Guidance.doc  Outline (doc)]
+
** [https://www.acqnotes.com/Attachments/Program%20Protection%20Plan%20Outline%20and%20Guidance.doc  Outline (doc)]
** [http://acqnotes.com/wp-content/uploads/2014/09/Program-Protection-Plan-PPP-Template-v3.2-Jul-11.docx  Template (doc)]
+
** [https://acqnotes.com/wp-content/uploads/2014/09/Program-Protection-Plan-PPP-Template-v3.2-Jul-11.docx  Template (doc)]
** [http://www.dau.edu/guidebooks/_layouts/15/WopiFrame.aspx?sourcedoc=/guidebooks/Shared%20Documents/Chapter%209%20Program%20Protection.pdf&action=default Defense Acquisition Guidebook (DAG) Chapter 9 (pdf)] ...provides guidance for the system security engineering (SSE) discipline and [[Defense|Department of Defense (DOD)]] program protection for defense acquisition programs. The program manager (PM) and the systems engineer (SE) should use DAG
+
** [https://www.dau.edu/guidebooks/_layouts/15/WopiFrame.aspx?sourcedoc=/guidebooks/Shared%20Documents/Chapter%209%20Program%20Protection.pdf&action=default Defense Acquisition Guidebook (DAG) Chapter 9 (pdf)] ...provides guidance for the system security engineering (SSE) discipline and [[Defense|Department of Defense (DOD)]] program protection for defense acquisition programs. The program manager (PM) and the systems engineer (SE) should use DAG
* [http://acqnotes.com/acqnote/careerfields/system-security-engineering Intelligence & Security - System Security Engineering (SSE)] | [http://acqnotes.com AcqNotes]  ...Systems Security Engineering (SSE) is an element of Systems Engineering (SE) that applies scientific and engineering principles in a standardized, repeatable, and efficient manner to identify security vulnerabilities, requirements, and methods of verifications that minimize risks.  SSE delivers systems that satisfy stakeholder security needs for weapon system operation in today’s cyber-contested environments.
+
* [https://acqnotes.com/acqnote/careerfields/system-security-engineering Intelligence & Security - System Security Engineering (SSE)] | [https://acqnotes.com AcqNotes]  ...Systems Security Engineering (SSE) is an element of Systems Engineering (SE) that applies scientific and engineering principles in a standardized, repeatable, and efficient manner to identify security vulnerabilities, requirements, and methods of verifications that minimize risks.  SSE delivers systems that satisfy stakeholder security needs for weapon system operation in today’s cyber-contested environments.
** [http://acqnotes.com/wp-content/uploads/2020/08/USAF-Weapon-System-PP-and-SSE-Guidebook-v2.0.pdf Program Protection/Systems Security Engineering Guidebook (pdf) 12 Mar 20]
+
** [https://acqnotes.com/wp-content/uploads/2020/08/USAF-Weapon-System-PP-and-SSE-Guidebook-v2.0.pdf Program Protection/Systems Security Engineering Guidebook (pdf) 12 Mar 20]
** [http://www.dau.edu/Lists/Events/Attachments/129/12-11-2018%20Integrated%20Cybersecurity2_VLamolinara.pdf Integrated Program Protection | Steve Kern and Vincent Lamolinara (pdf)] - [http://www.dau.edu  Defense Acquisition University (DAU)]
+
** [https://www.dau.edu/Lists/Events/Attachments/129/12-11-2018%20Integrated%20Cybersecurity2_VLamolinara.pdf Integrated Program Protection | Steve Kern and Vincent Lamolinara (pdf)] - [https://www.dau.edu  Defense Acquisition University (DAU)]
 
* Cyber Threat Analysis
 
* Cyber Threat Analysis
** [http://acqnotes.com/acqnote/careerfields/validated-online-lifecycle-threat-volt Intelligence & Security - Validated Online Lifecycle Threat (VOLT)] ...The VOLT Reports involve the application of threat modules, and are to be written to articulate the relevance of each module to a specific acquisition program or planned capability. Note: The STAR was replaced by the VOLT
+
** [https://acqnotes.com/acqnote/careerfields/validated-online-lifecycle-threat-volt Intelligence & Security - Validated Online Lifecycle Threat (VOLT)] ...The VOLT Reports involve the application of threat modules, and are to be written to articulate the relevance of each module to a specific acquisition program or planned capability. Note: The STAR was replaced by the VOLT
* [http://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520039p.pdf DODI 5200.39, Critical Program Information (CPI) Identification and Protection Within Research, Development, Test and Evaluation (RDT&E) (pdf)]  
+
* [https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520039p.pdf DODI 5200.39, Critical Program Information (CPI) Identification and Protection Within Research, Development, Test and Evaluation (RDT&E) (pdf)]  
* [http://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520044p.pdf DODI 5200.44, Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) (pdf)]
+
* [https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/520044p.pdf DODI 5200.44, Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) (pdf)]
  
 
{|<!-- T -->
 
{|<!-- T -->
Line 377: Line 377:
  
 
= Insights =
 
= Insights =
* [http://section809panel.org/media/updates/ 3 Volumes | Advisory Panel on Streamlining and Codifying Acquisition Regulations aka Section 809 Panel]  
+
* [https://section809panel.org/media/updates/ 3 Volumes | Advisory Panel on Streamlining and Codifying Acquisition Regulations aka Section 809 Panel]  
  
 
{|<!-- T -->
 
{|<!-- T -->
Line 410: Line 410:
 
<youtube>8brx82EAFZU</youtube>
 
<youtube>8brx82EAFZU</youtube>
 
<b>Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis
 
<b>Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis
</b><br>The Mitchell Institute for Aerospace Studies  Read the report here: https://bit.ly/31WPlha  Slides from presentation available here: http://bit.ly/31Unb6x  To support and see more of this content, like this video and subscribe to the Mitchell Institute’s channel. The Mitchell Institute for Aerospace Studies held a live virtual rollout of its latest report Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis by Lt Gen (Ret) David A. Deptula, Dean of the Mitchell Institute, and Douglas A. Birkey, Executive Director of the Mitchell Institute. The two authors hosted a panel discussion on the need to adopt cost-per-effect assessments across the Department of Defense as the preferred measure of merit in evaluating weapon system choices. They were joined on the panel by Dr. Bill LaPlante, Senior VP and General Manager for MITRE Corporation's National Security Sector, and Brig Gen David Harris, Director of the Air Force Warfighting Integration Capability (AFWIC) and Deputy Chief of Staff for Strategy, Integration, and Requirements.
+
</b><br>The Mitchell Institute for Aerospace Studies  Read the report here: https://bit.ly/31WPlha  Slides from presentation available here: https://bit.ly/31Unb6x  To support and see more of this content, like this video and subscribe to the Mitchell Institute’s channel. The Mitchell Institute for Aerospace Studies held a live virtual rollout of its latest report Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis by Lt Gen (Ret) David A. Deptula, Dean of the Mitchell Institute, and Douglas A. Birkey, Executive Director of the Mitchell Institute. The two authors hosted a panel discussion on the need to adopt cost-per-effect assessments across the Department of Defense as the preferred measure of merit in evaluating weapon system choices. They were joined on the panel by Dr. Bill LaPlante, Senior VP and General Manager for MITRE Corporation's National Security Sector, and Brig Gen David Harris, Director of the Air Force Warfighting Integration Capability (AFWIC) and Deputy Chief of Staff for Strategy, Integration, and Requirements.
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->

Revision as of 11:31, 15 February 2023

Youtube search... ...Google search


Integrated Product Support Implementation Roadmap ...List ... Timeline ... Alternate

Adaptive Acquisition Framework (AAF)

The AAF is a major advancement for modern defense acquisition. It is more than a policy update. It is policy re-envisioned and restructured in a framework that encourages critical thinking by program managers in selecting and tailoring the best suited approach or pathway for a particular acquisition. It facilitates more rapid delivery to the point of need. The AAF acquisition pathways provide opportunities for MDAs/DAs and PMs to develop acquisition strategies and employ acquisition processes that match the characteristics of the capability being acquired.



5000.02 Hybrid Program Model A (Hardware Dominant) ...


Adaptive Acquisition Framework Methods (Pathways)

Urgent Capability Acquisition (UCA) 5000.81

Need identified by Commanders involved in an ongoing contingency operation or emergent need.

Middle-Tier Acquisition (MTA) 5000.84

Programs that are intended to be completed in a period of 2-5 years via two acquisition pathways.

Major Capability Acquisition (MCA) 5000.85

Execute to the standard defense acquisition model with modifications.

Software Acquisition

To facilitate rapid and iterative delivery of software capability to the user.

Defense Business Systems (DBS) 5000.75

Business systems are information systems that are operated by, for, or on behalf of the DOD.

Acquisition of Services 5000.74

Acquisition of contracted services from private sector entities by or for the DOD.

Prototyping & Experiments

Early Prototyping 3201.01

Technology or capability that is being matured by the research laboratories.

10 USC 2373: Procurement for Experimental Purposes: Rapid acquisition tool for fielding and testing new capabilities

Overview of the Adaptive Acquisition Framework with Stacy Cummings
Feb. 20, 2020, Stacy Cummings, Principal Deputy Assistant Secretary of Defense for Acquisition Enablers, delivers an overview of the DOD's new Adaptive Acquisition Framework as part of the annual Acquisition Update held at the DAU campus in Huntsville, Ala. During the hour-long presentation, Cummings addressed some of the monumental changes that the framework brings to DOD acquisition policy. The session also provided a look at the six new acquisition pathways programs can use to add flexibility and speed to their strategies.

Adaptive Acquisition Framework: Software Pathway
In this round table discussion, senior DOD leaders and experts from the field discuss the interim software policy that is part of the new Adaptive Acquisition Framework. Based largely on the SWAP Report Line of Effort A1, released by the Defense Innovation Board, the policy establishes a new acquisition pathway for software that prioritize continuous integration and delivery of working software in a secure manner, with continuous oversight from automated analytics. Moderator: Dr. Jeff Boleng, Special Assistant for Software Acquisition. Panel members: a. Stacy Cummings, Principal Deputy Assistant Secretary of Defense/ Acquisition Enablers, OUSD A-S b. Carmela Rice, OUSD A-S c. Robert Borka, Director, Navy Acquisition Policy, DASN APB d. Maj Zachary McCarty, Program Manager, F-22 Pipeline Operations.

Thinking Differently: Cybersecurity and the Adaptive Acquisition Framework
NavalX

Adaptive Acquisition Framework: Software Authority to Operate
Authority to Operate Reciprocity between Programs, Services and Agencies. Moderator: Dr. Jeff Boleng, Senior Advisor for Software Acquisition Roundtable. Panelists: Mr. Leo Garciga, U.S. Army, Director of Information Management, HQDA-DCS-G2 Mr. Chris Cleary, Navy Chief Information Security Officer (CISO) and Director of the DON CIO Cybersecurity Directorate Ms. Lonye Ford, HAF RSRC MGMT.

Overview



Click: JCIDS Process Flow Chart (pdf)

Defense Acquisition University (DAU)

The Defense Acquisition System in 7 Minutes
Provides an overview of the Defense Acquisition System, focusing on phases, milestones, and decision points.

The Acquisition Moment: Defense Acquisition Explained with S'mores
Defense acquisition is complex. That doesn't mean it's impossible to understand. Learn how Warfighter needs flow through the acquisition process and its various milestones through the lens of making s'mores.

1 Defense Acquisition System Overview
DAU Professor Matt Ambrose provides an overview of the Defense Acquisition System as described in the Department of Defense Instruction 5000.02, Operation of the Defense Acquisition System.

2 Materiel Solution Analysis Phase Overview
DAU Professor Matt Ambrose provides an overview of the Materiel Solution Analysis Phase of the Defense Acquisition System as described in the Department of Defense Instruction 5000.02, Operation of the Defense Acquisition System.

3 Technology Maturation & Risk Reduction Phase Overview
DAU Professor Matt Ambrose provides an overview of the Technology Maturation & Risk Reduction Phase of the Defense Acquisition System as described in the Department of Defense Instruction 5000.02, Operation of the Defense Acquisition System.

Defense Acquisition Categories
Defense Acquisition U professor Matt Ambrose provides a top-level description of Acquisition Categories (ACATs) used in the U.S. Department of Defense and the role such categories play in the management of acquisition programs. Ambrose also discusses the differences between weapon system and automated information system categories and provides an explanation of what makes a system a Major Defense Acquisition Program (MDAP) or a Major Automated Information System (MAIS). The DODI 5000.02 and Milestone Documentation Identification tool (MDID) are referred to for further exploration of the topic and practical application.

AcqNotes Videos

DOD Acquisition Process
AcqNotes The Defense Acquisition Process July 16, 2017

DOD JCIDS Process Overview
AcqNotes Nov 4, 2012

PPBE Process Overview
AcqNotes This tutorial provides an overview of the Programming, Planning, Budgeting and Execution (PPBE) Process. Nov 12, 2012

Acquisition Categories (ACAT)
Jan 9, 2013

U.S. Army

F102 Joint and Army Capability Development JCIDS AY17
Delta Group

F102 Joint and Army Capability Development JCIDS AY17
Delta Group

F100 CGSC JCIDS
James Kennedy Supplemental instruction video for the JCIDS class within the CGSC F100 How the Army Runs block of instruction.

CGSC F100 Course Review
James Kennedy This video provides a review of the F100 course at CGSC explaining the Force Management Module and using a simulated case study to explain all the F100 processes in one presentation.

Resource Management
James Kennedy This video supports the CGSC F100 Force Management Core Curriculum block of instruction.

F100 - Fiscal Stewardship
James Kennedy This lesson is designed to supplement the CGSC F100 Force Management.

Cybersecurity & Acquisition Lifecycle Integration

Understanding what these processes are and how they interact will lead to better acquisition outcomes. The Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT) provides the user the insight into these supporting processes and the ability to visualize how these processes work together to promote cyber resilient weapon systems.

2020-10-09-csiac-policy-chart-e1602511053113.jpg DOD Cybersecurity Policy Chart | Cyber Security & Information Systems Information Analysis Center ...Changelog


Cybersecurity in the Defense Acquisition System
Software Engineering Institute | Carnegie Mellon University Watch Mark Sherman in this SEI Cyber Minute as he discusses "Enclosure 14 and Cybersecurity in the Defense Acquisition System."

Cybersecurity and Acquisition Lifecycle Integration Tool: Preview
Defense Acquisition University Cybersecurity affects every aspect of defense acquisition. Learn how to integrate proven practices in cybersecurity into the lifecycle of your acquisition program.

Insights

How to create a capability model
Raj Ramesh The capability model is one of the foundational models to understand the capabilities of the enterprise. It is often used as the basis of other analyses such as process analysis, spend analysis, prioritization of work, etc. So it behooves the enterprise to create and have one capability model that is common for the whole enterprise. How do you start this exercise? In this video, I explain precisely that. Background Music attribution:: Across the Room - YouTube - Letter Box Here's what I can do to help you. I speak on the topics of architecture and AI, help you integrate AI into your organization, educate your team on what AI can or cannot do, and make things simple enough that you can take action from your new knowledge. I work with your organization to understand the nuances and challenges that you face, and together we can understand, frame, analyze, and address challenges in a systematic way so you see improvement in your overall business, is aligned with your strategy, and most importantly, you and your organization can incrementally change to transform and thrive in the future. If any of this sounds like something you might need, please reach out to me at dr.raj.ramesh@topsigma.com, and we'll get back in touch within a day. Thanks for watching my videos and for subscribing. www.topsigma.com www.linkedin.com/in/rajramesh

SERC TALKS: ’Mission Engineering’: Systems of Systems Engineering in Context
Today most organizational or societal capabilities rely on a mix of material and non-material ‘systems’ working together to achieve desired outcomes – to achieve their ‘mission’. Organizations typically define mission statements about why they exist – their “reason for being” -- and they use these mission statements as the basis for planning actions and investments. Government or religious organizations often form ‘mission’ teams to achieve a set of goals to share ideas or conduct negotiations. Space and defense organizations commonly refer to planned actions to achieve objectives as their ‘missions’ - e.g. US NASA Apollo mission to the moon. In most cases these include a set of objectives and a plan of actions to achieve these objectives. Recently US Defense has started to apply systems engineering concepts and practices to missions in what is being termed ‘Mission Engineering” - the deliberate planning, analyzing, organizing, and integrating of current and emerging operational and system capabilities to achieve desired mission effects. In this presentation Dr. Dahmann will discuss the motivation for employing systems approaches to mission capabilities as an extension and a broader context for application of systems of systems engineering. BIO: Dr. Judith Dahmann is a Technical Fellow at the MITRE Corporation Center and the capability lead for Systems of Systems (SoS). Dr. Dahmann is the MITRE project leader for SE Technical Support to OUSD R&E supporting mission engineering (ME) activities and the application of digital engineering to ME. She was the technical lead for development of the DOD guide for systems engineering of systems of systems (SoS) and the project lead for ISO 21839, a international standard on ‘SoS Considerations Throughout the System Life Cycle’. Dr. Dahmann is also the task lead for a set of Defense Advanced Research Projects Agency (DARPA) SoS programs investigating advanced technology approaches to complex SoS challenges. Dr. Dahmann is an INCOSE Fellow and the co-chair of the INCOSE Systems of Systems Working Group and the co-chair of the NDIA SE Division SoS Committee. She teaches Enterprise SE as an adjunct faculty member of the Johns Hopkins University in the Systems Engineering Program for Engineering Professionals. Presented on August 5, 2020

Graphs in Government: Achieving Total Cost Visibility for the U.S. Army
Maximizing cost visibility is a common goal for large organizations, including the United States Department of Defense. The United States Army is required to track operating and support costs for weapon systems including weapons definition, force structure, inventory, requisitions, maintenance, ammunition and more. That equates to a vast amount of data and growing data management complexities. To address these challenges and achieve total cost visibility, the Army adopted the Neo4j graph database to create, manage, and analyze data relationships across the logistics community. In this webinar, Jason Zagalsky, Federal Account Manager at Neo4j, will provide a brief overview of Neo4j and Graphs In Government, followed by Preston Hendrickson, Principal Systems Analyst at CALIBRE Systems, describing how modernizing its cost tracking system gave the Army the cost visibility needed to meet DOD objectives

Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis
The Mitchell Institute for Aerospace Studies Read the report here: https://bit.ly/31WPlha Slides from presentation available here: https://bit.ly/31Unb6x To support and see more of this content, like this video and subscribe to the Mitchell Institute’s channel. The Mitchell Institute for Aerospace Studies held a live virtual rollout of its latest report Resolving America’s Defense Strategy-Resource Mismatch: The Case for Cost-Per-Effect Analysis by Lt Gen (Ret) David A. Deptula, Dean of the Mitchell Institute, and Douglas A. Birkey, Executive Director of the Mitchell Institute. The two authors hosted a panel discussion on the need to adopt cost-per-effect assessments across the Department of Defense as the preferred measure of merit in evaluating weapon system choices. They were joined on the panel by Dr. Bill LaPlante, Senior VP and General Manager for MITRE Corporation's National Security Sector, and Brig Gen David Harris, Director of the Air Force Warfighting Integration Capability (AFWIC) and Deputy Chief of Staff for Strategy, Integration, and Requirements.

Changing Software Acquisition in DOD - Roundtable with the Defense Innovation Board
Defense Acquisition University (Changing DOD's Software Acquisition Strategy, Workforce, Culture, and Metrics- A roundtable discussion with members of the Defense Innovation Board hosted by Dr. Jeff Boleng, Office of the Secretary of Defense.)

Accelerating the Delivery of Weapon and Embedded System Software
Defense Acquisition University Dr. Jeff Boleng, Special Advisor for Software Acquisition, to the Under Secretary of Defense for Acquisition and Sustainment, held a roundtable with the Defense Innovation Board (DIB) to discuss how DOD can “shift left” and optimize the long tail of weapons software certification (e.g., weapons safety, flight safety, nuclear surety, cyber security, etc.) and testing (e.g., Developmental, Operational, Live Fire). On a modern battlefield and in a future war, DOD may need to change complex software every day as a necessary factor for winning. “Shift left” and adopting private-sector, modern software development practices, will be key to accelerating software-based capabilities to weapon systems and the Warfighter.

Center for Strategic & International Studies

Understanding Acquisition
Center for Strategic & International Studies While defense acquisition is notoriously complex, understanding the basic structure of the acquisition process provides insight on the key factors to making defense acquisition successful. This video gives an overview of how the acquisition process works, the volume of people, time, and money that goes into making it function, and how this plays out in both simple purchases and complex weapons programs.

Supporting Global Integration: The Joint Staff Approach to Air and Missile Defense
Center for Strategic & International Studies As the United States shifts its focus to the near-peer threat, it must prepare to defend and counter sophisticated air and missile threats. The Joint Staff and the Joint Integrated Air and Missile Defense Organization (JIAMDO) works to coordinate these functions. Within the Department of Defense, JIAMDO is chartered to develop and integrate sensors, weapons, command and control systems, and the concepts to employ them in the air and missile defense mission area. It operates in support of both the Chairman of the Joint Chiefs of Staff and U.S. Strategic Command. The CSIS Missile Defense Project cordially invites you to two panel discussions featuring current and past JIAMDO leaders, to discuss the organization's history, mission, and future opportunities.