Risk Management Framework Requirements
Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?
Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?
Is there an overarching Wi-Fi program for the U.S. Air Force?
What is the state of cyber technical ranges, and what current software tools are used at each range?
Cyber T&E policy and guidance is being modernized to keep pace with the DoD acquisition objectives stated in the DoDI 5000.01: Simplify Acquisition Policy Tailor Acquisition Approaches Empower Program Managers Conduct Data Driven Analysis Actively…
The Department of the Air Force (DAF) Systems Security Engineering (SSE) Cyber Guidebook (SSECG) is intended to assist Program Offices in performing Cybersecurity, Cyber Resiliency and Cyber Survivability analyses required to protect our National Security…
In 2015, the DepSecDef (DSD) directed the Joint Staff to develop a Cybersecurity Key Performance Parameter (KPP). The tasking was a response to the Director of Operational Test & Evaluation (OT&E) highlighting multiple weapon systems…
This year’s RSA Conference theme is “Stronger Together.” It’s expected to host more than 3000 attendees and will emphasize topics such as DevSecOps and Cloud Security. Some key speakers will include: Rob Duhart Jr. –…
This free workshop, hosted by Sandia National Labs, will discuss three technical questions related to current software capabilities, threats, and gaps. What are the technical impediments to an aspirational future state in which the nation…
The Rocky Mountain Chapter of AFCEA is honored to once again invite you to our annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness…