U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. Communities of Practice
  3. Cybersecurity
CommentCommunity

Cybersecurity

This Community will be sunsetting soon, but please check out this location for information on Cybersecurity Training at DAU 

Members

Views

Pinned Content

Community Contacts

COMMUNITY / Cybersecurity
Tim Denman - Community Leader
COMMUNITY / Cybersecurity
Stephanie Thomaston - Community Leader

Feed / Cybersecurity

Resource / Cybersecurity
Tools & Training
View Resource

Tools and Training 

​Our mission is to provide proactive, adaptive and relevant cybersecurity training and consulting for the DoD acquisition workforce. Below is some of our offering. If you are looking for more specialized offerings feel free to contact us at [email protected] 

CREATED:
September 1, 2023
BY:
LAST MODIFIED:
September 18, 2023
BY:
DOCUMENT ID:
CONTRIBUTION TYPE:
CONTENT TYPE:
Resource / Cybersecurity
Trending
View Resource

Day of Cyber Flyer v2.jpg

​Charts from Day of Cyber, 20 Feb 2019

1. DoD T&E Guidelines

3. Mission Based Cyber Risk Assessments

4. PM ITTS Cyber Brief

5. Day of Cyber DevSecOps 

 

 

 

 

CREATED:
September 1, 2023
BY:
LAST MODIFIED:
September 18, 2023
BY:
DOCUMENT ID:
CONTRIBUTION TYPE:
CONTENT TYPE:
Resource / Cybersecurity
Policies and Guidance
View Resource

image depicting reference libraryReference Library

Following are links to Cybersecurity policies:

Other Cybersecurity guidance:

Additional Cybersecurity resources:

CREATED:
September 1, 2023
BY:
LAST MODIFIED:
September 1, 2023
BY:
DOCUMENT ID:
CONTRIBUTION TYPE:
CONTENT TYPE:
Resource / Cybersecurity
Training and Continuous Learning
View Resource

DAU provides a number of current learning opportunities and is continuously updating its cybersecurity acquisition training across all functional areas of the Defense Acquisition Workforce.

Workshops: 

Cyber Table Top WSS 007

The workshop introduces and applies the Cyber Table Top (CTT) mission-based cyber risk assessment (MBCRA) method to help discover cyber vulnerabilities, gauge their risk, propose mitigations and inform other competencies, documents and events across the DoD acquisition lifecycle. The workshop will establish an understanding of the threat and “thinking like a Hacker”; provide a “wheel of access” methodology to identify and diagram surface-attack characteristics; include cross-competency personnel, including users, to identify and prioritize cyber-attacks / vulnerabilities in a Red / Blue / White Team “wargame” mission scenario; and provide a construct to characterizes and report risk and mitigations in order to design and maintain cyber resilient systems and personnel in the acquisition and operational phases of an Information or Platform weapons system

The course provides hands on laboratory exploration of adversarial cyber threats to DOD networks and weapon systems. No previous experience in cybersecurity is necessary. Students will learn and execute (in the lab environment) basic offensive cyber techniques, develop system requirements to defeat the threats, implement countermeasures and assess countermeasures effectiveness. Two days are spent on enterprise network attacks and security countermeasures and one day is spent working with an unmanned aerial system simulator which is representative of currently fielded DOD unmanned weapon systems. The inclusion of offensive techniques training for DoD weapon systems differentiates this workshop from similar training provided in the commercial sector.
CREATED:
September 1, 2023
BY:
LAST MODIFIED:
September 1, 2023
BY:
DOCUMENT ID:
CONTRIBUTION TYPE:
CONTENT TYPE:

Discussions / Cybersecurity

Cyber Resilient Weapon System Body of Knowledge (CRWS-BoK) V3.0 released!
0 Replies
View Discussion
QUESTION SCENARIO
QUESTION

I'm reaching out on behalf of the OUSD(R&E) CRWS-BoK team to inform you that version 3.0 of the CRWS-BoK portal (www.crws-bok.org) has been released! Please see the official press release for more info: https://www.cto.mil/news/crws_bok_v3.

SCENARIO
Technology Area Protection Plans in DoDI 5000.83
0 Replies
View Discussion
QUESTION SCENARIO
QUESTION

Discussion on current policy on Technology Area Protection Plans and Science and Technology (S&T) Protection Plans (STPP). Discussion includes new S&T protection updates to the DAU ACQ 160 course.

DAU Event - Acquisition Topics: Technology Area Protection Plans

SCENARIO

Events / Cybersecurity

No content available.

Announcements / Cybersecurity

Community Announcement / Cybersecurity
The Cloud Computing (CC) Security Requirements Guide (SRG) updated Version 1 Rev. 4
View Announcement

The Cloud Computing (CC) Security Requirements Guide (SRG) outlines the security model by which DoD will leverage cloud computing, along with the security controls and requirements necessary for using cloud-based solutions.

The CC SRG applies to DoD-provided cloud services and those provided by a contractor on behalf of the department, i.e., a commercial cloud service provider or integrator.

Here is where you can see the updates. 

Community Announcement / Cybersecurity
First Cyber Training Range Session for 2022
View Announcement

​First Cyber training range for 2022.

Register by Tue, Jan 4, 2022, 8:00 AM

WSS 010 Cyber Training Range Session

Location

Virtual - Eastern Standard Time EST

Start Time

1/11/2022 8:00 AM

End Time

1/13/2022 5:00 PM

Description

The course provides hands on laboratory exploration of adversarial cyber threats to DOD networks and weapon systems. No previous experience in cybersecurity is necessary. Students will learn and execute (in the lab environment) basic offensive cyber techniques, develop system requirements to defeat the threats, implement countermeasures and assess countermeasures effectiveness. Two days are spent on enterprise network attacks and security countermeasures and one day is spent working with an unmanned aerial system simulator which is representative of currently fielded DOD unmanned weapon systems. The inclusion of offensive techniques training for DoD weapon systems differentiates this workshop from similar training provided in the commercial sector.

All Day Event

 

Recurrence

 

Event Type

Training

Event Materials

WSS 010 Cyber Training Range Session Registration

Community Announcement / Cybersecurity
Guidance on Federal Information Security and Privacy Management Requirements
View Announcement

On December 6th the White House published  M-22-05 Fiscal Year 2021-2022 Guidance on Federal Information Security and Privacy Management Requirements 


One of the tenets to guide the reform of performance management under FISMA, is moving to a zero trust architecture.  The zero trust security goals are expected  by the end of Fiscal Year (FY) 2024. These goals have 5 pillars: Identity, Devices, Networks, Application & Workload, and Data. 


Other tenets that were listed to  guide the reform of performance management under FISMA are: ground truth testing,  observable security outcomes,  and  automation. 

Fiscal Year 2021-2022 Guidance on Federal Information Security and Privacy Management Requirements (whitehouse.gov)

Community Announcement / Cybersecurity
CMMC 2.0
View Announcement

8 CFR Chapter 2. Cybersecurity Maturity Model Certification (CMMC) 2.0 Updates and Way Forward. 

Chris Newborn - Cybersecurity Enterprise Team (CET) CISSP, GSTRT, GISP, GSLC Professor, Cybersecurity Defense 

Approximately three weeks ago, DoD announced a major change to the Cybersecurity Maturity Model Certification (CMMC) program.

 

As a result of receiving more than 850 public comments in response to the interim DFARS rule, DoD initiated an internal review March 2021 of CMMC. This review resulted in ''CMMC 2.0,'' which updates the program structure and the requirements to streamline and improve implementation of the CMMC program.

 

Per the Federal Registry Notice dated 17 Nov 2021 (enclosed), the changes reflected in the CMMC 2.0 framework will be implemented through the rulemaking process. DoD will pursue rulemaking in both: (1) Title 32 of the Code of Federal Regulations (CFR); and, (2) title 48 CFR, to establish CMMC 2.0 program requirements and implement any needed changes to the CMMC program content in 48 CFR.

 

"... Until the CMMC 2.0 changes become effective through both the title 32 CFR and title 48 CFR rulemaking processes, the Department will suspend the CMMC Piloting efforts, and will not approve inclusion of a CMMC requirement in DoD solicitations. The CMMC 2.0 program requirements will not be mandatory until the title 32 CFR rulemaking is complete, and the CMMC program requirements have been implemented as needed into acquisition regulation through title 48 rulemaking ..."

 

As a reminder, contracting officers are required to following the Interim Rule; Defense Federal Acquisition Regulation Supplement: Assessing Contractor Implementation of Cybersecurity Requirements (DFARS Case 2019-D041), that amends DFARS subpart 204.73, Safeguarding Covered Defense Information and Cyber Incident Reporting, and implements the NIST SP 800-171 DoD Assessment Methodology.

 

The coverage in the subpart directs contracting officers to verify in Supplier Performance Risk System (SPRS) that an offeror has a current NIST SP 800-171 DoD Assessment on record, prior to contract award, if the offeror is required to implement NIST SP 800-171 pursuant to DFARS clause 252.204-7012. The contracting officer is also directed to include a new DFARS provision 252.204-7019, Notice of NIST SP 800-171 DoD Assessment Requirements, and a new DFARS clause 252.204-7020, NIST SP 800-171 DoD Assessment Requirements, in solicitations and contracts including solicitations using FAR part 12 procedures for the acquisition of commercial items, except for solicitations solely for the acquisition of COTS items.

Please contact Chris Newborn If you have any questions.

[email protected]

[email protected]

Community Announcement / Cybersecurity
NSA and CISA provide cybersecurity guidance for 5G cloud infrastructures
View Announcement

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA)  published cybersecurity guidance to securely build and configure cloud infrastructures in support of 5G.


To read more information check out:NSA and CISA provide cybersecurity guidance for 5G cloud infrastructures Press Release 

Community Announcement / Cybersecurity
Great Power Competition: China Awareness
View Announcement

​During this time we see China's effort to become the leading global power. In order to protect security, Americans need to guarantee an advantage. It is extremely imperative to concentration on this effort to focus on China as it grows to our number one cyber threat to national security. 

For more information take a look at this article: Great Power Competition

Community Announcement / Cybersecurity
DAU News: DAU Cyber Enterprise Team Provides New Training Options
View Announcement

Here is an article written by Matt Sablan, DAU Public Affairs,  highlighting the DAU Cyber Enterprise Team and its training offerings. 

Community Announcement / Cybersecurity
Building a Community for Zero Trust Adoption: The Journey to Cybersecurity Excellence
View Announcement
Introduction:
In the world of cybersecurity, zero trust has emerged as a critical discipline. Just as martial arts require discipline and training, zero trust demands a similar approach. Tim Denman, the lead director for the cybersecurity enterprise team at Defense Acquisition University, is at the forefront of this discipline, often referred to as the "ninja" of zero trust. Denman's efforts to create a training program and foster a community for zero trust adoption within the Department of Defense (DoD) have been instrumental. In a recent symposium, Denman shared his vision, emphasizing the importance of training, cultural change, and collaboration. Let's delve into the highlights of his insightful presentation.
The Power of Community:
Denman's success in creating a training program and building connections within the zero-trust community has greatly benefited the DoD. Through his diligent efforts, Denman has connected like-minded professionals, experts, and thought leaders to form a consortium of ideas. This collaborative network is facilitating the adoption and acceleration of zero trust across the DoD by the end of fiscal year 2027. Furthermore, this community aims to support other organizations in their journey towards implementing zero trust.
Addressing Culture:
During his presentation, Denman stressed the significance of addressing organizational culture alongside strategy. Citing the famous quote by Laszlo Bock, "Culture eats strategy for breakfast," Denman emphasized that no matter how well-crafted a strategy may be, without addressing cultural aspects, its effectiveness is compromised. Training and awareness play a pivotal role in shaping culture. Denman outlined a comprehensive plan consisting of three levels of training: basic awareness, deep technical training, and a practitioner workshop. This approach ensures a well-rounded and holistic understanding of zero trust principles within the DoD.
Training Program Highlights:
Denman provided an overview of the training program being developed for zero trust adoption. The basic awareness level, already underway, aims to provide foundational knowledge to a large number of DoD personnel. An executive-level course on joint knowledge online serves as a valuable resource for senior leaders. Moving into deeper technical training, online webinars and additional courses are being developed to enhance expertise and practical skills. The practitioner workshop, led by Paul Shaw, focuses on hands-on application of zero trust principles and has yielded positive results during several pilot runs. Moreover, Denman revealed an exciting addition to the training program—a chief engineer's workshop that simulates successful zero trust implementation. These workshops aim to equip engineers and architects with the essential concepts of zero trust and enable the creation of prototype segmentation.
The Journey Continues:
Denman concluded his presentation by expressing his gratitude to the symposium attendees and highlighting the intention to make this event an annual occurrence. He emphasized that zero trust adoption is an ongoing journey rather than a final destination. Regular touchpoints and continuous refinement of ideas are crucial for success. Denman also emphasized that while resources are important, having the right people in the right place at the right time and a strong will to overcome challenges are equally essential for cultural change and zero trust adoption.
Conclusion:
Tim Denman's instrumental role in creating a community for zero trust adoption within the DoD is commendable. By emphasizing training, fostering cultural change, and facilitating collaboration, Denman has set the stage for the successful implementation of zero trust principles across the DoD. The comprehensive training program, consisting of multiple levels and hands-on workshops, demonstrates the commitment to equipping personnel with the necessary knowledge and skills. As organizations embark on their own zero trust journeys, Denman's approach serves as an inspiration to leverage collective expertise, overcome challenges, and continuously refine strategies to achieve cybersecurity excellence.

Resources / Cybersecurity

Community Resource / Cybersecurity
Tools & Training

Tools and Training 

​Our mission is to provide proactive, adaptive and relevant cybersecurity training and consulting for the DoD acquisition workforce. Below is some of our offering. If you are looking for more specialized offerings feel free to contact us at [email protected] 

CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 18, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Trending

Day of Cyber Flyer v2.jpg

​Charts from Day of Cyber, 20 Feb 2019

1. DoD T&E Guidelines

3. Mission Based Cyber Risk Assessments

4. PM ITTS Cyber Brief

5. Day of Cyber DevSecOps 

 

 

 

 

CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 18, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Policies and Guidance

image depicting reference libraryReference Library

Following are links to Cybersecurity policies:

Other Cybersecurity guidance:

Additional Cybersecurity resources:

CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 1, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Training and Continuous Learning

DAU provides a number of current learning opportunities and is continuously updating its cybersecurity acquisition training across all functional areas of the Defense Acquisition Workforce.

Workshops: 

Cyber Table Top WSS 007

The workshop introduces and applies the Cyber Table Top (CTT) mission-based cyber risk assessment (MBCRA) method to help discover cyber vulnerabilities, gauge their risk, propose mitigations and inform other competencies, documents and events across the DoD acquisition lifecycle. The workshop will establish an understanding of the threat and “thinking like a Hacker”; provide a “wheel of access” methodology to identify and diagram surface-attack characteristics; include cross-competency personnel, including users, to identify and prioritize cyber-attacks / vulnerabilities in a Red / Blue / White Team “wargame” mission scenario; and provide a construct to characterizes and report risk and mitigations in order to design and maintain cyber resilient systems and personnel in the acquisition and operational phases of an Information or Platform weapons system

The course provides hands on laboratory exploration of adversarial cyber threats to DOD networks and weapon systems. No previous experience in cybersecurity is necessary. Students will learn and execute (in the lab environment) basic offensive cyber techniques, develop system requirements to defeat the threats, implement countermeasures and assess countermeasures effectiveness. Two days are spent on enterprise network attacks and security countermeasures and one day is spent working with an unmanned aerial system simulator which is representative of currently fielded DOD unmanned weapon systems. The inclusion of offensive techniques training for DoD weapon systems differentiates this workshop from similar training provided in the commercial sector.
CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 1, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Testimonials

Testimonials 

Our mission is to provide proactive, adaptive and relevant cybersecurity training and consulting for the DoD acquisition workforce. Below are testimonials of our offerings. If you are looking for more specialized offerings feel free to contact us at [email protected]. 

CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 1, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Calendar
View Resource
Community Resource / Cybersecurity
CyberRSSFeeds


image depicting TrendingWhat's Trending

Welcome to the DAU Cybersecurity News Center. 

CREATED:
September 1, 2023
BY:
Content Author No Reply
LAST MODIFIED:
September 1, 2023
BY:
Content Author No Reply
View Resource
Community Resource / Cybersecurity
Cybersecurity Community Homepage
View Resource

Documents / Cybersecurity

No content available.
To participate in this community, you must be registered. Join Now