Search for tag: "cyberspace"

Echo - Delivering Cyber Defensive Capabilities at the Speed of Relevance to the Warfighter

In this Echo episode of "Acquisition Practices Worth Emulating" LTC Scott Helmore explains how the Army can respond to new cyber threats and have fielded solutions within 30 days. I…

From  Ivan Teper 0 likes 107 plays 0  

Echo - Taking an ACAT 1 program from an idea without staffing or funding to delivering the first product in 18 months.

In this Echo episode of "Acquisition Practices Worth Emulating" COL Rich Haggerty discusses how his team when charged with an ACAT 1 program without either defined requirements, staffing…

From  Ivan Teper 1 likes 123 plays 0  

ISA201 Lesson 8 Cybersecurity

ISA201 Lesson 8 Cybersecurity video for Pre-Part A.

From  Robert Skertic 0 likes 293 plays 0  

A New Approach to Cyber Software Assurance

Roy Wilson discusses Cyber Software Assurance.

From  Tim Denman 0 likes 205 plays 0  

NAVAIR Cyber Controls.v2 (Basic Small - WEB MBL (H264-600))

NAVAIR Cyber Warfare Tech Director - 3 min video on NIST 800-53 security controls tailoring and assessment

From  Roy Wilson 0 likes 79 plays 0  

Cybersecurity in Program Acquisition - Dr Chris D'Ascenzo, DAU Professor of Program Management

DSMC Faculty Brown Bag by Dr Chris D'Ascenzo 19 October 2017 Chris provides an update on current topics in cybersecurity for DOD program managers. This includes an overview of current attacks…

From  Ivan Teper 0 likes 154 plays 0  

Protecting DoD's Unclassified Info - Part 1

First Video in a 3-Part Series on Protecting DoD's Unclassified Information.

From  Media Archive 0 likes 758 plays 0  

Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)

This video provides an overview of the Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT).

From  Media Archive 0 likes 2,046 plays 0  


2nd version of NAVAIR Cyber Controls Video with Dr. Burke

From  Paul Willard 0 likes 252 plays 0  

Hirsch Research Paper Competition 2017

Waelchli: Lecture / Announcement in Hirsch Research Paper Competition for 2017. Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics, George C. Wilamowski,…

From  Larrie Ferreiro 0 likes 45 plays 0  

Cyber Security/Risk Mgmt Framework (RMF)

Cyber Security/Risk Mgmt Framework (RMF), DAU Coordinator - Mr. Tim Denman; Instructor - Mr. Tim Denman, DAU

From  Media Archive 1 likes 401 plays 1  

President's Opening Remarks 2016 DAU Training Symposium

DAU President, Jim Wolsey, provides opening remarks to the 2016 DAU Training Symposium.

From  Sam Parks 0 likes 44 plays 0