Cyber T&E policy and guidance is being modernized to keep pace with the DoD acquisition objectives stated in the DoDI 5000.01:
- Simplify Acquisition Policy
- Tailor Acquisition Approaches
- Empower Program Managers
- Conduct Data Driven Analysis
- Actively Manage Risk
- Emphasize Sustainment
This webinar training will provide a brief introduction to the DoD’s iterative cyber T&E approach superseding the six phases.
- This webinar training will cover the following topics:
- Iterative Cyber T&E Methodology
- Cyber T&E Strategy and the Integrated Decision Support Key (IDSK)
- Activities for Scoping Iterative Cyber T&E:
- Cyber Requirements, Mission Based Cyber Risk Assessments, Threat Characterization, Attack Surface Characterization, Using Cyber T&E
- Security Verification, Cooperative, and Adversarial Testing