irm304 cdr course manager: denny involved competency leads: 26 (cybersecurity)-denman, 19...
TRANSCRIPT
IRM304 CDR
Course Manager: DennyInvolved Competency Leads:26 (Cybersecurity)-Denman, 19 (Measurement)-Denny,
7 (DBS)-Corcoran [Capability Planning],4 (BCA)-Thorne
Summary Description blooms level
ELO 19.2.2.5
ELO 19.2.2.5: Given an Information Resource scenario, make actionable recommendations. (BL 3) 3
ELO 19.2.2.3
ELO 19.2.2.3: Given an Information Resource scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) 4
ELO 19.2.2.8
ELO 19.2.2.8: Adapt and improve the Information Resource measurement process. (BL 3) 3
ELO 19.2.2.2
ELO 19.2.2.2: Given an Information Resource scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)
3
ELO 19.1.2.4
ELO 19.1.2.4: Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) 2
ELO 4.1.1.9 ELO 4.1.1.9: Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5) 5
ELO 26.1.1.7
ELO 26.1.1.7: Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) 5
ELO 26.1.1.3
ELO 26.1.1.3: Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)
5
ELO 7.1.1.6 ELO 7.1.1.6: Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)
5
ELO 7.1.1.5 ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)
5
Scope of Change (10 ELOs)Measurement
5
BCA1
Cybersecurity2
DBS2
Question Yes/No Remarks1 Are action items from PDR complete? Yes2 Are detailed summaries of each module/storyboards complete? No In-Work, Discuss3 Are all identified copyright issues resolved? Yes4 Is all required media (articles, videos etc.) available? No In-Work5 Are draft quizes, tests and associated rubrics complete? No In-Work6 [Is the Transition Strategy Complete] What is the course transition strategy? Yes Per Portfolio Plan and Roadmap7 Is the instructor pilot scheduled? [Who will attend and where?] Yes 23-30 Jan 1589
101112
Outputs Participants RoleCourse Manager Presenter
Updated development roadmap Performance Learning Director Leads reviewPreliminary information posted to blackboard Center Director Approves completionUpdated Course Requirements Document CMRRs ParticipantsUpdated Project Risk Register Department Chairs ObserversUpdated Action Item Register LCIC ISD ParticipantUpdated course schedule Scheduling Observer
Contractor (if assigned) Participant
July 2014 IRM 304
Monday Tuesday Wednesday Thursday Friday
0800-1630 0800-1630 0800-1630 0800-1630 0800-1430
LUNCH
CourseIntroduction
DAU Brief
EnterpriseArchitecture
(1)
Cybersecurity(3)
ITAcquisitionStrategies
(5)
IndustryGuest Speakers
0800-1000System T&E
AndSoftware V&V
(8)
IT-related Project/Program
Management(P/PM)
(4)
Acquisition Planning
Solicitation &Administration of product &
services (6)
InformationSystems
Engineering(7)
EmergingTechnologies
(9)
Capital PlanningAnd InvestmentControl (CPIC)And PortfolioManagement
(2)
Hot TopicInformation
Exchange
CourseGraduation
Policies, Laws & Regulations
Recommended Practices
= Graded Team Exercise
Lesson 3 - Cybersecurity
• Module Lead: Denman (26-Cybersecurity)• 2 ELOs, each Blooms 5; completely replaces
existing lesson objectives.• Assessment: Case• Approach: Develop unique case for each ELO
2 ELOsReplace ALL existing
Objectives
2 ELOsIntegrate/Replace existing Objectives
5 ELOsIntegrate with
existing Objectives
1 ELOIntegrate with
existing Objectives
Unique Case for each ELO
Single case Integrating all ELOs
Single case Integrating allELOs
Single case Integrating all ELOs
26 Cybersecurity
19Measurement
7DBS
4BCA
Denman
Denny
KinnerParker,
Corcoran
Thorne
Bloom5
Bloom2-4
Bloom5
Bloom5
Lesson 3 - As-Is Objectives
• TLO: Given current IT Cybersecurity threats, explain how the risks can be mitigated via acquisition planning to ensure mission success.
• ELOs:– Discuss the Cybersecurity, critical infrastructure protection,
and continuity of operation requirements for mission assurance. (ELO 26.1.1.4) IRM101
– Assess the scope and seriousness of current and emerging Cybersecurity threats to DoD systems. (ELO 26.1.1.2) IRM202
– Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. (ELO 26.1.1.5) IRM101
Existing Objectives map to ELOs allocated to other course(s)
Choose 5 to 7 elements that go into a continuity of
operations plan 26.1.1.4
Given examples of Cybersecurity attack surfaces, identify threats and
threat vectors related to each26.1.1.2
Identify underlying guidance and policies associated with
cybersecurity within the DoD26.1.1.5
Lesson 3 - To-Be Objectives
• TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario and associated acquisition hardware/software documentation, learner will develop Cybersecurity requirements regarding security measures, continuity of operations, and protection of acquisition systems and system content. (BL 6)
• ELOs:– 26.1.1.3 Given a cybersecurity threat, recommend major
activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)
– 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)
Lesson 3 – Module 1
• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)
• Summary– Identify cybersecurity threat– Define a case which integrates the defined threat within a
cybersecurity incident– Develop Superset of activities that aid mitigation of the defined threat– Develop framework for critical thinking to select major activities from
Superset from above– Develop student/group presentation scheme for validation of student
learning!
Instructors
Curriculum Developers
Students
Storyboard – IRM304, Lesson 3, ELO 26.1.1.3
• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)
Case
RECOMMEND
Select
Develop CaseTHREAT
Incident
ActivitiesThat aid
MitigationCritical
Thinking
Review, Evaluate
Present
AssessScore
Lesson 3 – Module 2
• 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)
• Summary– Identify cybersecurity related IT Acquisition scenario– Define a case which integrates the defined scenario within a
Request for Proposal (RFP) setting– Develop framework for critical thinking to identify, qualify,
and select Cybersecurity related requirements– Develop student/group presentation scheme for validation of
student learning!
Lesson 4 - Project/Program Management
• Module Lead: Denny (19-Measurement)• 5 ELOs, Blooms 2-4• Assessment: Case• Approach: Develop a single comprehensive
case that integrates the 5 objectives; alternately break out the BL 2 objective into single slide meeting that objective
Lesson 4 - Project/Program Management
• Module Lead: Denny (Measurement)
ELO 19.1.2.4 Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2)
ELO 19.2.2.1 Given a scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)
ELO 19.2.2.2 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)
ELO 19.2.2.3 Given a scenario, make actionable recommendations. (BL 3)
ELO 19.2.2.4 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)
•Major Takeaways• At the enterprise level, there are measurement process differences in
the decision objectives, information needs, analytical techniques, communication structures, scope of application, and implementation complexity.• Project and enterprise performance are interdependent - enterprise
performance is based on the valid aggregation of the performance of multiple programs - the enterprise portfolio.• Enterprise measurement must focus not only on the integrity of the
program source data, but also on the validity of the data and information aggregation structures.• There must be a suitable enterprise information infrastructure
available to support the generation, aggregation, and communication of enterprise measurement results• Enterprise measurement analysis and results interpretation are more
complex
Lesson 5 - Acquisition Strategies
• Module Lead: Corcoran (7-Capability Planning-DBS)
• 2 ELOs, both Blooms 5• Assessment: Case• Approach: Develop a single case that
integrates both objectives
Lesson 5 - As-Is Objectives
• TLO: Given IT an acquisition scenario, advocate current and emerging IT acquisition strategies and recommended practices to ensure mission success.
• ELOs:– Appraise information technology acquisition programmatic
issues and risks. – Assess appropriate information technology acquisition
strategies and recommended practices. – Recommend the applicable statutes, policies, regulations,
guidance, and recommended practices for incorporation into an IT acquisition.
Existing Objectives map to ELOs allocated to other course(s)
?
Lesson 5 - To-Be Objectives• TLO: Given a Department of Defense (DoD) Information Technology
(IT) acquisition scenario, learner will assess whether objectives in planning documents are stated clearly enough to support IT capability development. (BL 5)
• ELOs:– 7.1.1.5 Given a Defense Business System (DBS) Business Case,
determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)
– 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)
Lesson 5 - Acquisition Strategies
• Module Lead: Corcoran (DBS)
ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)
ELO 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)
Lesson 5 – DBS Module
• ELOs• Summary
– Develop a DBS case– Integrate timeline and decision aspects relating to the
Material Development Decision (MDD) and authorization into Engineering and Manufacturing Development (EMD)
– Integrate Business Process Reengineering (BPR) into the case– Describe BPR assessment with regards generating artifacts
that promote confidence in the solution– Establish that timing of the assessment should support
decision making for Milestone B
Lesson 7 - Systems Engineering
• Module Lead: Thorne (4-BCA)• 1 ELO, blooms 5• Assessment: Case• Approach: Generate a single case that
integrates the objectives
Lesson 7 - Systems Engineering
• Module Lead: Thorne (BCA)
ELO 4.1.1.9 Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5)
Lesson 7 – BCA Module
• ELOs• Summary– Develop a DOD BCA case that includes aspects of
Product Support/Sustainment strategy– Establish BCA update process requiring critical
thinking for determining impacts to program strategies.
– Given a BCA checklist, apply it to a product support BCA report
Backup Slides Follow
Competency Lead View