SlideShare a Scribd company logo
1 of 10
Download to read offline
IT Acquisition Workshop:
Leveraging EO 13636,
CCA & FITARA to Drive
Down Cyber Risk
 John Weiler, Founder Interoperability
Clearinghouse (ICH), IT-AAC Managing Director
 Emile Monette, Director, Government-wide Cyber
Security, Resilience, and Risk, GSA OGP
 Lev Lesokhin, EVP Strategy & Analytics, CAST
 Richard Spires, CEO Learning Tree, Former
DHS CIO
IT Acquisition Advisory Council
(IT-AAC)
 Consortia of 22 Standards Bodies,
Academia, Think Tanks and Non-
Defense COIs.
 Leading architect of FITARA/NDAA
Section 804
 Direct Conduit to Commercial IT
best practices, innovations and
lessons learned
 Just-in-Time SMEs close the
knowledge and expertise gap
 Leading advocate for Agile
Acquisition Maturity Model
 Critical source applied standards;
Cyber, SDN, SOA, Cloud, IA,
Mobile, ITIL/COBIT, Internet of
Things
Consortium for IT Software
Quality (CISQ)
 OMG Managed Consensus
Standards Body
 Adopted Top CWE and CVE
identified by DHS, MITRE, SEI,
DOD and NIST
 Set up to automate and assure s/w
code quality and cyber
assessments
 Proven model adopted by leading
financial institutions, FFRDCs, and
Federal Contractors
 Leading standard body IT S/W
Quality and Risk Management
March 15, 2016 Copyright © 2016 CISQ. All rights reserved. 3
Cyber Resilience CSF
FITARA Scorecard
 Measurement and discussion in
governance committees goes a
long way to setting behavior
 You can only manage what you
measure. Codify Gate controls that
measure risk/value
Service Level Management
 SLAs that treat software enhancements
and maintenance as a service; track
levels, penalties, credits
 Align SLAs with Mission Outcomes and
Incentives
Transform Acquisition Policy
 Transform IT Acquisition that enable
continuous measurements of risk/value
 Require vendors to provide CISQ
scores/certificate for each release
 Streamline processes that Mission Driven,
Evidenced Based, and Agile
Acceptance criteria
 Measure and demand minimal set of
acceptance criteria for any new
development or modernized systems
 Modernize IT Infrastructure Services
based on commercial design patterns
(14 SOA Services)
What OMB, Congress and Industry Groups have concluded:
1. INDUSTRIAL AGE IT ACQUISITION & ENGINEERING METHODS: Waterfall
design to spec frameworks (DODAF, JCIDS, LISI, NESI) obscures value of
commercial IT standards and solution sets. Current approach results in 80%
failure rates and significant cost overruns leading to FITARA.
2. ILL-EQUIPED IT ACQUISITION ECOSYSTEM: Government PMs and
Acquisition Core lack expertise, experience and knowledge to deal with emerging
Cyber Threats.
3. DECISION AVOIDANCE vs RISK MGT : Agencies lack mature Risk Based
Decision Analytics Frameworks needed to model risks and guide modernization
of legacy stove pipes. Emerging standards of practice are key to change.
4. BARRIERS TO IT INNOVATIONS and BEST PRACTICES: Decision makers
lack access to commercial standards and innovations that drive a $3.9 Trillion
dollar global IT Market (of which the DIB represents less than ½ of 1%). This gap
has lead to creation of Federal Innovation Labs (DHS, DIA, DoC, AF)
State of Federal IT
State of Federal IT/Cyber Ecosystem
Mission Needs:
Value Stream
Analysis:
• Problem ID
• Mission Rqts
• Prioritization
• Constraints
Solution
Architecture
Modeling:
• Selection
• Certification
• Interop Spec
• Openness
Industry
CxOs
Innovators
Vendors/ISVs
SDOs/Labs/
Universities
Align Proven
Capabilities w/
business needs
Model New
Solution
Solution Architecture
Validation
and Demonstrations
Value
Stream
Analysis
Proven
IT Solutions
Vetted
Solution
Architecture
Knowledge
Exchange
Prioritized Business
Requirements
Y
N
N
Y
Validated Past
Performance
Measurable Outcomes
Business Metrics
Solution Set
Evidenced-Based Research
Normalized SVC
Components
Analysis of
Alternatives
Solution Exist?
Service Oriented
Specs and SLAs
COTS Comparative
Analysis, Evidence
Business
Requirements
& Capability
Gaps
Validated Acquisition Strategy,
SLAs & Source Selection Criteria
IT-AAC Communities of Practice
Biz Process
Re-Engineering
InnovationsEvidence
Lessons Learned
Research,
Testing Results
AAM Process
Technology Assessments
Course of Actions
Risk Assessments
Performance
Management
Assessment
• Feasibility
• Service Attributes
• SLAs
• Shared Services
Problem
Statement
Capability
Analysis
Capability
Prioritization
Solution
Determination
Economic
Analysis
Roadmap Risk Dashboard
Assessment
AAM Tools
P
h
a
s
e
1
P
h
a
s
e
2
P
h
a
s
e
3
Feasibility
Assessment
March 15, 2016 7Copyright © 2016 CISQ. All rights reserved.
Acquisition Assurance Method
5e Provide support for client type – Remote 3
5f Provide support for client type – Unmanaged 5
125 6 Support SBC storage strategy
6a Provide server-side storage of System data and/or system images 1
6b Provide server-side storage of enterprise data 1
6c Provide server-side storage of user data and/or system images 1
6d Provide server-side storage of user application 1
6e Provide server-side storage of enterprise data application 1
125 7 Support Infrastructure Requirements
7a Maintain current bandwidth/network loads (min 10 GB to max 100GB user profiles,
100 MB to the desktop)
1
7b Provide consistent capability, whether rich or thin, with differing capabilities based
on Active Directory rights/groups
1
7d Provide support for the Common Access Card (CAC)/DOD Public Key
Infrastructure (PKI) logon
1
150 8 Improved Manageability
8a Provide for remote manageability of desktop 1
8b Provide support for all business and mission applications, including bandwidth
sensitive applications
4
8c Provide for a client computing environment solution that scales over the AF
enterprise
1
8d Allow use of a diverse mix of hardware end devices in a heterogeneous
environment
1
8e Increase IT service availability to the mobile/pervasive user 2
150 9 Provide the same user experience (irrespective of client; rich or thin
client).
1
Strategic Business Rqt’s Functional Capabilities Capability Prioritization
Solution Determination Feasibility Assessments Economic Analysis/TCO/ROI)
An Incremental Approach to IT Acquisition
March 15, 2016 8Copyright © 2016 CISQ. All rights reserved.
Standard, Objective Measurement Creates Visibility
Outsourcer TQI Reliability
Performance
Efficiency Security Maintainability
VENDOR 1 2.59 3.16 2.34 3.01 1.99
VENDOR 2 2.81 2.78 2.78 3.12 2.34
VENDOR 3 2.59 1.67 3.54 2.98 1.76
VENDOR 4 3.06 3.12 3.11 2.79 3.11
VENDOR 5 2.83 2.56 2.88 3.03 2.56
VENDOR 6 2.90 3.76 2.89 2.97 2.55
Scorecard the Service Providers
Monitor Performance Over Time
March 15, 2016 9Copyright © 2016 CISQ. All rights reserved.
Critical Service Level Matrix
Application
Name
Tier 1 Metrics (Critical
Service Levels)
At Risk
Multiplier Risk Allocation
At Risk
Amount
OMS 30%
Total Quality Index 50% $15,000
Critical Violations 30% $9,000
Application Pain Violations 20% $6,000
100% $30,000
CRM 10%
Total Quality Index 30% $3,000
Critical Violations 30% $3,000
Application Pain Violations 40% $4,000
100% $10,000
AMSS
20%Total Quality Index 50% $10,000
Critical Violations 30% $6,000
Application Pain Violations 20% $4,000
100% $20,000
SDP
20%Total Quality Index 50% $10,000
Critical Violations 30% $6,000
Application Pain Violations 20% $4,000
100% $20,000
Enabler
20%Total Quality Index 50% $10,000
Critical Violations 30% $6,000
Application Pain Violations 20% $4,000
100% $20,000
At Risk Amount and Allocation of Risk
$1,000,000
100%
Total Billing Per Release :
Total Risk Pooler:
Total At Risk Amount (10% of Bill) : $100,000
10% is for example
Amount service provider has at risk
on this individual Service Level
is 30% * 50% * $100K = $15,000
 Anytime there is a default, the
at risk amount will be applied
 Incentive is given to service
provide equivalent to the at
risk amount if they exceed the
Expected Service Level by 5%
of the delta between the then
current Expected and
Perfection
 Credits / Incentives are settled
at the Annual Reset
March 15, 2016 1Copyright © 2016 CISQ. All rights reserved.
Next Steps
• Establish Evidenced Based COTS/OSS Assessment Processes
• Ensure you have access to vendor-delivered code
• Let your key sourcing partners know you’re using CISQ and AAM
analytics
• Partner with the IT-AAC and CISQ to introduce software analytics into
contractual relationships
POTENTIAL DEPLOYMENT ROADMAP
Start 6 months 6-12 months
Roll out source
code static
analysis
measurement
Collect initial set
of metrics
Socialize metrics
with vendors
Roll out
scorecarding
program
Include
scorecards in
management
meetings with
vendors
Introduce service
levels into MSAs
Select key
applications for
SLAs
Use internal
baseline for
project
acceptance
criteria

More Related Content

What's hot

Cloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 ResearchCloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 ResearchRugby7277
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Nicole Pellegrino
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...West Monroe Partners
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 

What's hot (17)

Cloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 ResearchCloud Computing 28 Oct09 Research
Cloud Computing 28 Oct09 Research
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
CSA Standards Development Summary
CSA Standards Development SummaryCSA Standards Development Summary
CSA Standards Development Summary
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Why CSA Australia
Why CSA AustraliaWhy CSA Australia
Why CSA Australia
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 

Similar to Cyber Resilience Summit Briefing

Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitiveCisco Canada
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ - Consortium for IT Software Quality
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarBill Wong
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Finalrjt01
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Kevin Neal
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Microsoft Technet France
 
Rightsizing with Cloud Services
Rightsizing with Cloud ServicesRightsizing with Cloud Services
Rightsizing with Cloud ServicesJim Kaskade
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slidesharepapdev
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 

Similar to Cyber Resilience Summit Briefing (20)

Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Final
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
Fujitsu Scanners and Hyland Software Webinar Delivering Automation In The Len...
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
 
Rightsizing with Cloud Services
Rightsizing with Cloud ServicesRightsizing with Cloud Services
Rightsizing with Cloud Services
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 

More from John Weiler

IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITJohn Weiler
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016John Weiler
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
INSA_ IT-AAC MOU
INSA_ IT-AAC MOUINSA_ IT-AAC MOU
INSA_ IT-AAC MOUJohn Weiler
 
It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012John Weiler
 
IT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT ReformsIT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT ReformsJohn Weiler
 
OSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionOSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionJohn Weiler
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011John Weiler
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 

More from John Weiler (12)

IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in IT
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016
 
Lungren Letter
Lungren LetterLungren Letter
Lungren Letter
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
OSD letter
OSD letterOSD letter
OSD letter
 
INSA_ IT-AAC MOU
INSA_ IT-AAC MOUINSA_ IT-AAC MOU
INSA_ IT-AAC MOU
 
It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012
 
IT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT ReformsIT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT Reforms
 
OSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionOSD ATL class on Agile Acquisition
OSD ATL class on Agile Acquisition
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 

Recently uploaded

call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 

Recently uploaded (20)

call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 

Cyber Resilience Summit Briefing

  • 1. IT Acquisition Workshop: Leveraging EO 13636, CCA & FITARA to Drive Down Cyber Risk  John Weiler, Founder Interoperability Clearinghouse (ICH), IT-AAC Managing Director  Emile Monette, Director, Government-wide Cyber Security, Resilience, and Risk, GSA OGP  Lev Lesokhin, EVP Strategy & Analytics, CAST  Richard Spires, CEO Learning Tree, Former DHS CIO
  • 2. IT Acquisition Advisory Council (IT-AAC)  Consortia of 22 Standards Bodies, Academia, Think Tanks and Non- Defense COIs.  Leading architect of FITARA/NDAA Section 804  Direct Conduit to Commercial IT best practices, innovations and lessons learned  Just-in-Time SMEs close the knowledge and expertise gap  Leading advocate for Agile Acquisition Maturity Model  Critical source applied standards; Cyber, SDN, SOA, Cloud, IA, Mobile, ITIL/COBIT, Internet of Things Consortium for IT Software Quality (CISQ)  OMG Managed Consensus Standards Body  Adopted Top CWE and CVE identified by DHS, MITRE, SEI, DOD and NIST  Set up to automate and assure s/w code quality and cyber assessments  Proven model adopted by leading financial institutions, FFRDCs, and Federal Contractors  Leading standard body IT S/W Quality and Risk Management
  • 3. March 15, 2016 Copyright © 2016 CISQ. All rights reserved. 3 Cyber Resilience CSF FITARA Scorecard  Measurement and discussion in governance committees goes a long way to setting behavior  You can only manage what you measure. Codify Gate controls that measure risk/value Service Level Management  SLAs that treat software enhancements and maintenance as a service; track levels, penalties, credits  Align SLAs with Mission Outcomes and Incentives Transform Acquisition Policy  Transform IT Acquisition that enable continuous measurements of risk/value  Require vendors to provide CISQ scores/certificate for each release  Streamline processes that Mission Driven, Evidenced Based, and Agile Acceptance criteria  Measure and demand minimal set of acceptance criteria for any new development or modernized systems  Modernize IT Infrastructure Services based on commercial design patterns (14 SOA Services)
  • 4. What OMB, Congress and Industry Groups have concluded: 1. INDUSTRIAL AGE IT ACQUISITION & ENGINEERING METHODS: Waterfall design to spec frameworks (DODAF, JCIDS, LISI, NESI) obscures value of commercial IT standards and solution sets. Current approach results in 80% failure rates and significant cost overruns leading to FITARA. 2. ILL-EQUIPED IT ACQUISITION ECOSYSTEM: Government PMs and Acquisition Core lack expertise, experience and knowledge to deal with emerging Cyber Threats. 3. DECISION AVOIDANCE vs RISK MGT : Agencies lack mature Risk Based Decision Analytics Frameworks needed to model risks and guide modernization of legacy stove pipes. Emerging standards of practice are key to change. 4. BARRIERS TO IT INNOVATIONS and BEST PRACTICES: Decision makers lack access to commercial standards and innovations that drive a $3.9 Trillion dollar global IT Market (of which the DIB represents less than ½ of 1%). This gap has lead to creation of Federal Innovation Labs (DHS, DIA, DoC, AF) State of Federal IT
  • 5. State of Federal IT/Cyber Ecosystem
  • 6. Mission Needs: Value Stream Analysis: • Problem ID • Mission Rqts • Prioritization • Constraints Solution Architecture Modeling: • Selection • Certification • Interop Spec • Openness Industry CxOs Innovators Vendors/ISVs SDOs/Labs/ Universities Align Proven Capabilities w/ business needs Model New Solution Solution Architecture Validation and Demonstrations Value Stream Analysis Proven IT Solutions Vetted Solution Architecture Knowledge Exchange Prioritized Business Requirements Y N N Y Validated Past Performance Measurable Outcomes Business Metrics Solution Set Evidenced-Based Research Normalized SVC Components Analysis of Alternatives Solution Exist? Service Oriented Specs and SLAs COTS Comparative Analysis, Evidence Business Requirements & Capability Gaps Validated Acquisition Strategy, SLAs & Source Selection Criteria IT-AAC Communities of Practice Biz Process Re-Engineering InnovationsEvidence Lessons Learned Research, Testing Results AAM Process Technology Assessments Course of Actions Risk Assessments Performance Management Assessment • Feasibility • Service Attributes • SLAs • Shared Services Problem Statement Capability Analysis Capability Prioritization Solution Determination Economic Analysis Roadmap Risk Dashboard Assessment AAM Tools P h a s e 1 P h a s e 2 P h a s e 3 Feasibility Assessment
  • 7. March 15, 2016 7Copyright © 2016 CISQ. All rights reserved. Acquisition Assurance Method 5e Provide support for client type – Remote 3 5f Provide support for client type – Unmanaged 5 125 6 Support SBC storage strategy 6a Provide server-side storage of System data and/or system images 1 6b Provide server-side storage of enterprise data 1 6c Provide server-side storage of user data and/or system images 1 6d Provide server-side storage of user application 1 6e Provide server-side storage of enterprise data application 1 125 7 Support Infrastructure Requirements 7a Maintain current bandwidth/network loads (min 10 GB to max 100GB user profiles, 100 MB to the desktop) 1 7b Provide consistent capability, whether rich or thin, with differing capabilities based on Active Directory rights/groups 1 7d Provide support for the Common Access Card (CAC)/DOD Public Key Infrastructure (PKI) logon 1 150 8 Improved Manageability 8a Provide for remote manageability of desktop 1 8b Provide support for all business and mission applications, including bandwidth sensitive applications 4 8c Provide for a client computing environment solution that scales over the AF enterprise 1 8d Allow use of a diverse mix of hardware end devices in a heterogeneous environment 1 8e Increase IT service availability to the mobile/pervasive user 2 150 9 Provide the same user experience (irrespective of client; rich or thin client). 1 Strategic Business Rqt’s Functional Capabilities Capability Prioritization Solution Determination Feasibility Assessments Economic Analysis/TCO/ROI) An Incremental Approach to IT Acquisition
  • 8. March 15, 2016 8Copyright © 2016 CISQ. All rights reserved. Standard, Objective Measurement Creates Visibility Outsourcer TQI Reliability Performance Efficiency Security Maintainability VENDOR 1 2.59 3.16 2.34 3.01 1.99 VENDOR 2 2.81 2.78 2.78 3.12 2.34 VENDOR 3 2.59 1.67 3.54 2.98 1.76 VENDOR 4 3.06 3.12 3.11 2.79 3.11 VENDOR 5 2.83 2.56 2.88 3.03 2.56 VENDOR 6 2.90 3.76 2.89 2.97 2.55 Scorecard the Service Providers Monitor Performance Over Time
  • 9. March 15, 2016 9Copyright © 2016 CISQ. All rights reserved. Critical Service Level Matrix Application Name Tier 1 Metrics (Critical Service Levels) At Risk Multiplier Risk Allocation At Risk Amount OMS 30% Total Quality Index 50% $15,000 Critical Violations 30% $9,000 Application Pain Violations 20% $6,000 100% $30,000 CRM 10% Total Quality Index 30% $3,000 Critical Violations 30% $3,000 Application Pain Violations 40% $4,000 100% $10,000 AMSS 20%Total Quality Index 50% $10,000 Critical Violations 30% $6,000 Application Pain Violations 20% $4,000 100% $20,000 SDP 20%Total Quality Index 50% $10,000 Critical Violations 30% $6,000 Application Pain Violations 20% $4,000 100% $20,000 Enabler 20%Total Quality Index 50% $10,000 Critical Violations 30% $6,000 Application Pain Violations 20% $4,000 100% $20,000 At Risk Amount and Allocation of Risk $1,000,000 100% Total Billing Per Release : Total Risk Pooler: Total At Risk Amount (10% of Bill) : $100,000 10% is for example Amount service provider has at risk on this individual Service Level is 30% * 50% * $100K = $15,000  Anytime there is a default, the at risk amount will be applied  Incentive is given to service provide equivalent to the at risk amount if they exceed the Expected Service Level by 5% of the delta between the then current Expected and Perfection  Credits / Incentives are settled at the Annual Reset
  • 10. March 15, 2016 1Copyright © 2016 CISQ. All rights reserved. Next Steps • Establish Evidenced Based COTS/OSS Assessment Processes • Ensure you have access to vendor-delivered code • Let your key sourcing partners know you’re using CISQ and AAM analytics • Partner with the IT-AAC and CISQ to introduce software analytics into contractual relationships POTENTIAL DEPLOYMENT ROADMAP Start 6 months 6-12 months Roll out source code static analysis measurement Collect initial set of metrics Socialize metrics with vendors Roll out scorecarding program Include scorecards in management meetings with vendors Introduce service levels into MSAs Select key applications for SLAs Use internal baseline for project acceptance criteria