irm304 cdr course manager: denny involved competency leads: 26 (cybersecurity)-denman, 19...

Post on 02-Jan-2016

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

IRM304 CDR

Course Manager: DennyInvolved Competency Leads:26 (Cybersecurity)-Denman, 19 (Measurement)-Denny,

7 (DBS)-Corcoran [Capability Planning],4 (BCA)-Thorne

Summary Description blooms level

ELO 19.2.2.5

ELO 19.2.2.5: Given an Information Resource scenario, make actionable recommendations. (BL 3) 3

ELO 19.2.2.3

ELO 19.2.2.3: Given an Information Resource scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) 4

ELO 19.2.2.8

ELO 19.2.2.8: Adapt and improve the Information Resource measurement process. (BL 3) 3

ELO 19.2.2.2

ELO 19.2.2.2: Given an Information Resource scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)

3

ELO 19.1.2.4

ELO 19.1.2.4: Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) 2

ELO 4.1.1.9 ELO 4.1.1.9: Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5) 5

ELO 26.1.1.7

ELO 26.1.1.7: Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) 5

ELO 26.1.1.3

ELO 26.1.1.3: Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

5

ELO 7.1.1.6 ELO 7.1.1.6: Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

5

ELO 7.1.1.5 ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

5

Scope of Change (10 ELOs)Measurement

5

BCA1

Cybersecurity2

DBS2

Question Yes/No Remarks1 Are action items from PDR complete? Yes2 Are detailed summaries of each module/storyboards complete? No In-Work, Discuss3 Are all identified copyright issues resolved? Yes4 Is all required media (articles, videos etc.) available? No In-Work5 Are draft quizes, tests and associated rubrics complete? No In-Work6 [Is the Transition Strategy Complete] What is the course transition strategy? Yes Per Portfolio Plan and Roadmap7 Is the instructor pilot scheduled? [Who will attend and where?] Yes 23-30 Jan 1589

101112

Outputs Participants RoleCourse Manager Presenter

Updated development roadmap Performance Learning Director Leads reviewPreliminary information posted to blackboard Center Director Approves completionUpdated Course Requirements Document CMRRs ParticipantsUpdated Project Risk Register Department Chairs ObserversUpdated Action Item Register LCIC ISD ParticipantUpdated course schedule Scheduling Observer

Contractor (if assigned) Participant

July 2014 IRM 304

Monday Tuesday Wednesday Thursday Friday

0800-1630 0800-1630 0800-1630 0800-1630 0800-1430

LUNCH

CourseIntroduction

DAU Brief

EnterpriseArchitecture

(1)

Cybersecurity(3)

ITAcquisitionStrategies

(5)

IndustryGuest Speakers

0800-1000System T&E

AndSoftware V&V

(8)

IT-related Project/Program

Management(P/PM)

(4)

Acquisition Planning

Solicitation &Administration of product &

services (6)

InformationSystems

Engineering(7)

EmergingTechnologies

(9)

Capital PlanningAnd InvestmentControl (CPIC)And PortfolioManagement

(2)

Hot TopicInformation

Exchange

CourseGraduation

Policies, Laws & Regulations

Recommended Practices

= Graded Team Exercise

Lesson 3 - Cybersecurity

• Module Lead: Denman (26-Cybersecurity)• 2 ELOs, each Blooms 5; completely replaces

existing lesson objectives.• Assessment: Case• Approach: Develop unique case for each ELO

2 ELOsReplace ALL existing

Objectives

2 ELOsIntegrate/Replace existing Objectives

5 ELOsIntegrate with

existing Objectives

1 ELOIntegrate with

existing Objectives

Unique Case for each ELO

Single case Integrating all ELOs

Single case Integrating allELOs

Single case Integrating all ELOs

26 Cybersecurity

19Measurement

7DBS

4BCA

Denman

Denny

KinnerParker,

Corcoran

Thorne

Bloom5

Bloom2-4

Bloom5

Bloom5

Lesson 3 - As-Is Objectives

• TLO: Given current IT Cybersecurity threats, explain how the risks can be mitigated via acquisition planning to ensure mission success.

• ELOs:– Discuss the Cybersecurity, critical infrastructure protection,

and continuity of operation requirements for mission assurance. (ELO 26.1.1.4) IRM101

– Assess the scope and seriousness of current and emerging Cybersecurity threats to DoD systems. (ELO 26.1.1.2) IRM202

– Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. (ELO 26.1.1.5) IRM101

Existing Objectives map to ELOs allocated to other course(s)

Choose 5 to 7 elements that go into a continuity of

operations plan 26.1.1.4

Given examples of Cybersecurity attack surfaces, identify threats and

threat vectors related to each26.1.1.2

Identify underlying guidance and policies associated with

cybersecurity within the DoD26.1.1.5

Lesson 3 - To-Be Objectives

• TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario and associated acquisition hardware/software documentation, learner will develop Cybersecurity requirements regarding security measures, continuity of operations, and protection of acquisition systems and system content. (BL 6)

• ELOs:– 26.1.1.3 Given a cybersecurity threat, recommend major

activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

– 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

Lesson 3 – Module 1

• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

• Summary– Identify cybersecurity threat– Define a case which integrates the defined threat within a

cybersecurity incident– Develop Superset of activities that aid mitigation of the defined threat– Develop framework for critical thinking to select major activities from

Superset from above– Develop student/group presentation scheme for validation of student

learning!

Instructors

Curriculum Developers

Students

Storyboard – IRM304, Lesson 3, ELO 26.1.1.3

• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

Case

RECOMMEND

Select

Develop CaseTHREAT

Incident

ActivitiesThat aid

MitigationCritical

Thinking

Review, Evaluate

Present

AssessScore

Lesson 3 – Module 2

• 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

• Summary– Identify cybersecurity related IT Acquisition scenario– Define a case which integrates the defined scenario within a

Request for Proposal (RFP) setting– Develop framework for critical thinking to identify, qualify,

and select Cybersecurity related requirements– Develop student/group presentation scheme for validation of

student learning!

Lesson 4 - Project/Program Management

• Module Lead: Denny (19-Measurement)• 5 ELOs, Blooms 2-4• Assessment: Case• Approach: Develop a single comprehensive

case that integrates the 5 objectives; alternately break out the BL 2 objective into single slide meeting that objective

Lesson 4 - Project/Program Management

• Module Lead: Denny (Measurement)

ELO 19.1.2.4 Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2)

ELO 19.2.2.1 Given a scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)

ELO 19.2.2.2 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

ELO 19.2.2.3 Given a scenario, make actionable recommendations. (BL 3)

ELO 19.2.2.4 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

•Major Takeaways• At the enterprise level, there are measurement process differences in

the decision objectives, information needs, analytical techniques, communication structures, scope of application, and implementation complexity.• Project and enterprise performance are interdependent - enterprise

performance is based on the valid aggregation of the performance of multiple programs - the enterprise portfolio.• Enterprise measurement must focus not only on the integrity of the

program source data, but also on the validity of the data and information aggregation structures.• There must be a suitable enterprise information infrastructure

available to support the generation, aggregation, and communication of enterprise measurement results• Enterprise measurement analysis and results interpretation are more

complex

Lesson 5 - Acquisition Strategies

• Module Lead: Corcoran (7-Capability Planning-DBS)

• 2 ELOs, both Blooms 5• Assessment: Case• Approach: Develop a single case that

integrates both objectives

Lesson 5 - As-Is Objectives

• TLO: Given IT an acquisition scenario, advocate current and emerging IT acquisition strategies and recommended practices to ensure mission success.

• ELOs:– Appraise information technology acquisition programmatic

issues and risks. – Assess appropriate information technology acquisition

strategies and recommended practices. – Recommend the applicable statutes, policies, regulations,

guidance, and recommended practices for incorporation into an IT acquisition.

Existing Objectives map to ELOs allocated to other course(s)

?

Lesson 5 - To-Be Objectives• TLO: Given a Department of Defense (DoD) Information Technology

(IT) acquisition scenario, learner will assess whether objectives in planning documents are stated clearly enough to support IT capability development. (BL 5)

• ELOs:– 7.1.1.5 Given a Defense Business System (DBS) Business Case,

determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

– 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Lesson 5 - Acquisition Strategies

• Module Lead: Corcoran (DBS)

ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

ELO 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Lesson 5 – DBS Module

• ELOs• Summary

– Develop a DBS case– Integrate timeline and decision aspects relating to the

Material Development Decision (MDD) and authorization into Engineering and Manufacturing Development (EMD)

– Integrate Business Process Reengineering (BPR) into the case– Describe BPR assessment with regards generating artifacts

that promote confidence in the solution– Establish that timing of the assessment should support

decision making for Milestone B

Lesson 7 - Systems Engineering

• Module Lead: Thorne (4-BCA)• 1 ELO, blooms 5• Assessment: Case• Approach: Generate a single case that

integrates the objectives

Lesson 7 - Systems Engineering

• Module Lead: Thorne (BCA)

ELO 4.1.1.9 Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5)

Lesson 7 – BCA Module

• ELOs• Summary– Develop a DOD BCA case that includes aspects of

Product Support/Sustainment strategy– Establish BCA update process requiring critical

thinking for determining impacts to program strategies.

– Given a BCA checklist, apply it to a product support BCA report

Backup Slides Follow

Competency Lead View

top related