irm304 cdr course manager: denny involved competency leads: 26 (cybersecurity)-denman, 19...

26
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning], 4 (BCA)-Thorne

Upload: mark-kelly

Post on 02-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

IRM304 CDR

Course Manager: DennyInvolved Competency Leads:26 (Cybersecurity)-Denman, 19 (Measurement)-Denny,

7 (DBS)-Corcoran [Capability Planning],4 (BCA)-Thorne

Page 2: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Summary Description blooms level

ELO 19.2.2.5

ELO 19.2.2.5: Given an Information Resource scenario, make actionable recommendations. (BL 3) 3

ELO 19.2.2.3

ELO 19.2.2.3: Given an Information Resource scenario, analyze the collected IT data with respect to the defined information needs. (BL 4) 4

ELO 19.2.2.8

ELO 19.2.2.8: Adapt and improve the Information Resource measurement process. (BL 3) 3

ELO 19.2.2.2

ELO 19.2.2.2: Given an Information Resource scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)

3

ELO 19.1.2.4

ELO 19.1.2.4: Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2) 2

ELO 4.1.1.9 ELO 4.1.1.9: Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5) 5

ELO 26.1.1.7

ELO 26.1.1.7: Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5) 5

ELO 26.1.1.3

ELO 26.1.1.3: Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

5

ELO 7.1.1.6 ELO 7.1.1.6: Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

5

ELO 7.1.1.5 ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

5

Scope of Change (10 ELOs)Measurement

5

BCA1

Cybersecurity2

DBS2

Page 3: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Question Yes/No Remarks1 Are action items from PDR complete? Yes2 Are detailed summaries of each module/storyboards complete? No In-Work, Discuss3 Are all identified copyright issues resolved? Yes4 Is all required media (articles, videos etc.) available? No In-Work5 Are draft quizes, tests and associated rubrics complete? No In-Work6 [Is the Transition Strategy Complete] What is the course transition strategy? Yes Per Portfolio Plan and Roadmap7 Is the instructor pilot scheduled? [Who will attend and where?] Yes 23-30 Jan 1589

101112

Outputs Participants RoleCourse Manager Presenter

Updated development roadmap Performance Learning Director Leads reviewPreliminary information posted to blackboard Center Director Approves completionUpdated Course Requirements Document CMRRs ParticipantsUpdated Project Risk Register Department Chairs ObserversUpdated Action Item Register LCIC ISD ParticipantUpdated course schedule Scheduling Observer

Contractor (if assigned) Participant

Page 4: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

July 2014 IRM 304

Monday Tuesday Wednesday Thursday Friday

0800-1630 0800-1630 0800-1630 0800-1630 0800-1430

LUNCH

CourseIntroduction

DAU Brief

EnterpriseArchitecture

(1)

Cybersecurity(3)

ITAcquisitionStrategies

(5)

IndustryGuest Speakers

0800-1000System T&E

AndSoftware V&V

(8)

IT-related Project/Program

Management(P/PM)

(4)

Acquisition Planning

Solicitation &Administration of product &

services (6)

InformationSystems

Engineering(7)

EmergingTechnologies

(9)

Capital PlanningAnd InvestmentControl (CPIC)And PortfolioManagement

(2)

Hot TopicInformation

Exchange

CourseGraduation

Policies, Laws & Regulations

Recommended Practices

= Graded Team Exercise

Page 5: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 3 - Cybersecurity

• Module Lead: Denman (26-Cybersecurity)• 2 ELOs, each Blooms 5; completely replaces

existing lesson objectives.• Assessment: Case• Approach: Develop unique case for each ELO

Page 6: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

2 ELOsReplace ALL existing

Objectives

2 ELOsIntegrate/Replace existing Objectives

5 ELOsIntegrate with

existing Objectives

1 ELOIntegrate with

existing Objectives

Unique Case for each ELO

Single case Integrating all ELOs

Single case Integrating allELOs

Single case Integrating all ELOs

26 Cybersecurity

19Measurement

7DBS

4BCA

Denman

Denny

KinnerParker,

Corcoran

Thorne

Bloom5

Bloom2-4

Bloom5

Bloom5

Page 7: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
Page 8: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 3 - As-Is Objectives

• TLO: Given current IT Cybersecurity threats, explain how the risks can be mitigated via acquisition planning to ensure mission success.

• ELOs:– Discuss the Cybersecurity, critical infrastructure protection,

and continuity of operation requirements for mission assurance. (ELO 26.1.1.4) IRM101

– Assess the scope and seriousness of current and emerging Cybersecurity threats to DoD systems. (ELO 26.1.1.2) IRM202

– Recommend the applicable statutes, policies, regulations, guidance, and recommended practices for incorporation into an IT acquisition. (ELO 26.1.1.5) IRM101

Existing Objectives map to ELOs allocated to other course(s)

Choose 5 to 7 elements that go into a continuity of

operations plan 26.1.1.4

Given examples of Cybersecurity attack surfaces, identify threats and

threat vectors related to each26.1.1.2

Identify underlying guidance and policies associated with

cybersecurity within the DoD26.1.1.5

Page 9: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 3 - To-Be Objectives

• TLO: Given a Department of Defense (DoD) Information Technology (IT) acquisition scenario and associated acquisition hardware/software documentation, learner will develop Cybersecurity requirements regarding security measures, continuity of operations, and protection of acquisition systems and system content. (BL 6)

• ELOs:– 26.1.1.3 Given a cybersecurity threat, recommend major

activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

– 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

Page 10: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 3 – Module 1

• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

• Summary– Identify cybersecurity threat– Define a case which integrates the defined threat within a

cybersecurity incident– Develop Superset of activities that aid mitigation of the defined threat– Develop framework for critical thinking to select major activities from

Superset from above– Develop student/group presentation scheme for validation of student

learning!

Page 11: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Instructors

Curriculum Developers

Students

Storyboard – IRM304, Lesson 3, ELO 26.1.1.3

• 26.1.1.3 Given a cybersecurity threat, recommend major activities that aid in the mitigation of a cybersecurity incident related to that threat.(BL 5)

Case

RECOMMEND

Select

Develop CaseTHREAT

Incident

ActivitiesThat aid

MitigationCritical

Thinking

Review, Evaluate

Present

AssessScore

Page 12: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 3 – Module 2

• 26.1.1.7 Given an IT acquisition scenario, recommend cybersecurity related requirements that go into a request for proposal (RFP) (BL 5)

• Summary– Identify cybersecurity related IT Acquisition scenario– Define a case which integrates the defined scenario within a

Request for Proposal (RFP) setting– Develop framework for critical thinking to identify, qualify,

and select Cybersecurity related requirements– Develop student/group presentation scheme for validation of

student learning!

Page 13: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 4 - Project/Program Management

• Module Lead: Denny (19-Measurement)• 5 ELOs, Blooms 2-4• Assessment: Case• Approach: Develop a single comprehensive

case that integrates the 5 objectives; alternately break out the BL 2 objective into single slide meeting that objective

Page 14: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 4 - Project/Program Management

• Module Lead: Denny (Measurement)

ELO 19.1.2.4 Explain how the program IT measurement process can be extended to support enterprise level decision information needs.(BL 2)

ELO 19.2.2.1 Given a scenario, collect and process measurement and context relevant IT management and technical data. (BL 3)

ELO 19.2.2.2 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

ELO 19.2.2.3 Given a scenario, make actionable recommendations. (BL 3)

ELO 19.2.2.4 Given a scenario, analyze the collected IT data with respect to the defined information needs. (BL 4)

Page 15: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

•Major Takeaways• At the enterprise level, there are measurement process differences in

the decision objectives, information needs, analytical techniques, communication structures, scope of application, and implementation complexity.• Project and enterprise performance are interdependent - enterprise

performance is based on the valid aggregation of the performance of multiple programs - the enterprise portfolio.• Enterprise measurement must focus not only on the integrity of the

program source data, but also on the validity of the data and information aggregation structures.• There must be a suitable enterprise information infrastructure

available to support the generation, aggregation, and communication of enterprise measurement results• Enterprise measurement analysis and results interpretation are more

complex

Page 16: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 5 - Acquisition Strategies

• Module Lead: Corcoran (7-Capability Planning-DBS)

• 2 ELOs, both Blooms 5• Assessment: Case• Approach: Develop a single case that

integrates both objectives

Page 17: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 5 - As-Is Objectives

• TLO: Given IT an acquisition scenario, advocate current and emerging IT acquisition strategies and recommended practices to ensure mission success.

• ELOs:– Appraise information technology acquisition programmatic

issues and risks. – Assess appropriate information technology acquisition

strategies and recommended practices. – Recommend the applicable statutes, policies, regulations,

guidance, and recommended practices for incorporation into an IT acquisition.

Existing Objectives map to ELOs allocated to other course(s)

?

Page 18: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 5 - To-Be Objectives• TLO: Given a Department of Defense (DoD) Information Technology

(IT) acquisition scenario, learner will assess whether objectives in planning documents are stated clearly enough to support IT capability development. (BL 5)

• ELOs:– 7.1.1.5 Given a Defense Business System (DBS) Business Case,

determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

– 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Page 19: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 5 - Acquisition Strategies

• Module Lead: Corcoran (DBS)

ELO 7.1.1.5 Given a Defense Business System (DBS) Business Case, determine if at the Materiel Development Decision point the manager would authorize continuation into Engineering Development Phase. (BL 5)

ELO 7.1.1.6 Given a Defense Business System (DBS) Business Case, determine if the BPR assessment process provides clear documentation of the business need and confidence that the solution meets the need prior to approval/certification of funds. (BL 5)

Page 20: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 5 – DBS Module

• ELOs• Summary

– Develop a DBS case– Integrate timeline and decision aspects relating to the

Material Development Decision (MDD) and authorization into Engineering and Manufacturing Development (EMD)

– Integrate Business Process Reengineering (BPR) into the case– Describe BPR assessment with regards generating artifacts

that promote confidence in the solution– Establish that timing of the assessment should support

decision making for Milestone B

Page 21: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 7 - Systems Engineering

• Module Lead: Thorne (4-BCA)• 1 ELO, blooms 5• Assessment: Case• Approach: Generate a single case that

integrates the objectives

Page 22: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 7 - Systems Engineering

• Module Lead: Thorne (BCA)

ELO 4.1.1.9 Given a scenario, update a sample BCA for impact on the Product Support/Sustainment strategy. (BL 5)

Page 23: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Lesson 7 – BCA Module

• ELOs• Summary– Develop a DOD BCA case that includes aspects of

Product Support/Sustainment strategy– Establish BCA update process requiring critical

thinking for determining impacts to program strategies.

– Given a BCA checklist, apply it to a product support BCA report

Page 24: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Backup Slides Follow

Page 25: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
Page 26: IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],

Competency Lead View