U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. Blogs
  3. Several Excellent DAU Cybersecurity Resources

Several Excellent DAU Cybersecurity Resources

Awhile back (last year, actually), I shared a blog post entitled New Cybersecurity Training Available in which I shared information about the first of many planned DAU learning assets on this…

Several Excellent DAU Cybersecurity Resources

Breadcrumb

  1. Home
  2. Blogs
  3. Several Excellent DAU Cybersecurity Resources
Black background with gray photo icon
Bill Kobren

Awhile back (last year, actually), I shared a blog post entitled New Cybersecurity Training Available in which I shared information about the first of many planned DAU learning assets on this vitally important topic. A year later, wanted to call your attention to several additional interdisciplinary cybersecurity resources that are available for the defense acquisition workforce.

 

The first of these learning assets is the Cybersecurity Community of Practice (CoP), available on the DAU Acquisition Community Connection. The second is an article from the May-June 2016 edition of Defense AT&L Magazine entitled Cybersecurity: The Road Ahead for Defense Acquisition. Still another is the new Cybersecurity & Acquisition Lifecycle Integration Tool (CATLIT), an excellent resource from our cybersecurity colleagues here at DAU. As the CATLIT site indicates, “effective integration of cybersecurity into the DoD acquisition lifecycle encompasses several different processes, including:

 

·         DoDI 5000.02 Operation of the Defense Acquisition System

·         DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT)

·         Cybersecurity Test and Evaluation

·         Program Protection

·         System Security Engineering (SSE)

 

Understanding what these processes are and how they interact will lead to better acquisition outcomes. The Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT) provides the user the ability to visualize how these processes work together.” An important side note: because the CALIT is PowerPoint® based, make sure you place the tool in ‘Slide Show’ (Presentation) mode in order to take advantage of its full capabilities. The CALIT site also contains with a short overview video to help get you started.