<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>defence department &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/defence-department/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 12 Dec 2020 01:54:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>defence department &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DISA Opens Bidding on $11.7B IT Modernization Contract: Top 20</title>
		<link>https://risk-academy.ru/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 01:54:30 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[World Geographical Scheme for Recording Plant Distributions]]></category>
		<category><![CDATA[Disa]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[chief information officer]]></category>
		<category><![CDATA[Dana Deasy]]></category>
		<category><![CDATA[Defense Information Systems Agency]]></category>
		<category><![CDATA[single contractor]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/</guid>

					<description><![CDATA[The Defense Information Systems Agency will outsource most network management, cybersecurity, and technical services functions serving 22 at Defense Department agencies to a single contractor , according to a final [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p class="">The Defense Information Systems Agency will outsource most network management, cybersecurity, and technical services functions serving 22 at Defense Department agencies to a single contractor , according to a final request for proposals released on Dec. 8.</p>
<p class="">Defense Enclave Services, with its massive scope and implications for the future of the Pentagon’s IT acquisition strategy, is the subject of this week’s Top 20 Opportunities. The contract will have a maximum dollar value of $11.7 billion over a possible 10-year lifespan.</p>
<p class="">DISA officials had planned to release the final RFP in September, but delayed the process to give DOD chief information officer Dana Deasy time to complete a review of the program. The agency intends to evaluate bids throughout the spring and summer of 2021 and make an award decision in the first quarter of fiscal 2022.</p>
<p class="">Potential bidders have until Feb. 8 to respond to the RFP.</p>
<h3 class="">4th Estate Network Modernization</h3>
<p class="">DES will serve as the primary vehicle for the Pentagon’s planned 4th Estate Network Optimization (4ENO) program, referring to the 22 civilian-led agencies, collectively known as the “fourth estate.” They include DISA, the Defense Logistics&#8230;</p>
</div>
<p><a href="https://about.bgov.com/news/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Making software more than &#8216;IT thing&#8217; &#8212; FCW</title>
		<link>https://risk-academy.ru/making-software-more-than-it-thing-fcw/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 03:21:14 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[deputy CIO for information enterprise]]></category>
		<category><![CDATA[Queen of FCW]]></category>
		<category><![CDATA[Richie Steamboat]]></category>
		<category><![CDATA[Social Issues]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Lauren C. Williams]]></category>
		<category><![CDATA[Software modernization]]></category>
		<category><![CDATA[Peter Ranks]]></category>
		<category><![CDATA[sure that being good at software]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/making-software-more-than-it-thing-fcw/</guid>

					<description><![CDATA[Defense Making software more than &#8216;IT thing&#8217; &#13; By Lauren C. Williams Nov 15, 2020 &#13;   Software modernization has a branding problem, and it&#8217;s going to take more than [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article">
<p id="ph_pcontent2_0_KickerText" class="kicker">Defense</p>
<h3 id="ph_pcontent2_0_MainHeading" class="title">Making software more than &#8216;IT thing&#8217;</h3>
<ul id="ph_pcontent2_0_ByAuthor" class="byline">&#13;</p>
<li class="author">By Lauren C. Williams</li>
<li class="date">Nov 15, 2020</li>
<p>&#13;
		</ul>
<div class="remove imageCap">
<img fetchpriority="high" decoding="async" title="Social Issues" height="368" alt="Pentagon photo by Air Force Tech. Sgt. Ned T. Johnston" width="760" src="https://fcw.com/-/media/GIG/EDIT_SHARED/Buildings/Pentagon/pentagon.jpg"/> </div>
<p>Software modernization has a branding problem, and it&#8217;s going to take more than the colloquial culture shift to speed up the Defense Department&#8217;s adoption of modern tech capabilities. </p>
<p>&#8220;Part of the marketing of this is to make sure that being good at software escapes the domain of IT people and really gets thought of in the context of making us more effective at warfighting,&#8221; Peter Ranks, the deputy CIO for information enterprise, told FCW. </p>
<p>&#8220;The real challenge for the leadership, I think, is not to just latch on to the tech piece of this, but to really be willing to dig in and have the sustained focus to kind of impact culture,&#8221; Ranks said. </p>
<p>But the bureaucracy isn&#8217;t built for software&#8217;s rapid development, increased demand and security needs &#8212; something that played a major role during the Defense Department&#8217;s response to tech needs spurred by the pandemic and teleworking. </p>
<div class="ad">
<div id="div-gpt-ad-BOX_1-0005">
<p>      <noscript>&#13;<br />
        &#13;<br />
        <img decoding="async" title="defence department" src="https://pubads.g.doubleclick.net/gampad/ad?iu=/5978/eof.fcw&amp;t=item%253ddf4344d1_c7d3_42a3_90b8_a4347537f15a%26pos%253dBOX_1%26Topic%253dDoD%252cAir_Force%252cOperational_Policy%252cProcurement_Policy%252cOversight%252cIT_Modernization%252cSoftware_Development%252cAgencies%252cPolicy%252cTechnology&amp;sz=300x250|1x1| 580x400|640x481&amp;tile=5&amp;c=123456789" border="0" alt="defence department" />&#13;<br />
        &#13;<br />
      </noscript>
    </div>
</p></div>
<p>&#8220;We&#8217;ve&#8230;</p>
</div>
<p><a href="https://fcw.com/articles/2020/11/15/ranks-software-warfighting-pentagon.aspx">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pentagon easing pandemic travel restrictions</title>
		<link>https://risk-academy.ru/pentagon-easing-pandemic-travel-restrictions/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 14:54:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[adequate health care services]]></category>
		<category><![CDATA[Michael Horowitz]]></category>
		<category><![CDATA[travel restrictions]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[mobile device]]></category>
		<category><![CDATA[Department of Justice]]></category>
		<category><![CDATA[Pandemic Response Accountability Committee]]></category>
		<category><![CDATA[pandemic travel restrictions]]></category>
		<category><![CDATA[acting chairman]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/pentagon-easing-pandemic-travel-restrictions/</guid>

					<description><![CDATA[﻿ To listen to the Federal Newscast on your phone or mobile device, subscribe in PodcastOne or Apple Podcasts. The best listening experience on desktop can be found using Chrome, Firefox or Safari. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><iframe src="https://www.podcastone.com/episodewidget?episodeID=a8093ec4-92cc-40bb-8011-11924fb12276&amp;logo=true" width="100%" height="70" frameborder="0" scrolling="no"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span></iframe></p>
<p><em>To listen to the Federal Newscast on your phone or mobile device, subscribe in PodcastOne or Apple Podcasts. The best listening experience on desktop can be found using Chrome, Firefox or Safari.</em></p>
<ul>
<li>The Defense Department is steadily lifting the travel restrictions it imposed in response to COVID-19. This week’s update from the Pentagon shows just over half of the military’s worldwide installations are now in the “green” category — meaning servicemembers can move to and from those bases without special permission. Four bases were added to the unrestricted list in the past week. DoD considers several factors in deciding whether to change an installation’s status, including whether adequate health care services are available at the base and conditions in the local community.</li>
</ul>
<ul>
<li>Inspectors general on the Pandemic Response Accountability Committee warn a job well done tracking about $3 trillion in coronavirus spending still means billions in fraud. The committee’s acting chairman Michael Horowitz says only 1% of fraudulent spending would rival the Justice Department’s annual budget. He says current indicators suggest that the actual level of misspent funds&#8230;</li>
</ul>
</div>
<p><a href="https://federalnewsnetwork.com/federal-newscast/2020/09/pentagon-easing-pandemic-travel-restrictions/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DoD CIO attempts to remove non-technical obstacles to digital transformation</title>
		<link>https://risk-academy.ru/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 18:05:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Dana Deasy]]></category>
		<category><![CDATA[Mass media in the United States]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Magazines]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[software acquisition policy]]></category>
		<category><![CDATA[chief information officer]]></category>
		<category><![CDATA[Defense Department]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/</guid>

					<description><![CDATA[For Defense Department chief information officer Dana Deasy, digital transformation was never just about the cloud. This is why making the Air Force’s dev/sec/ops program, known as Platform One, a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><iframe src="https://www.podcastone.com/episodewidget?episodeID=e8299f99-744f-423c-aa4c-e33bdee83c0b&amp;logo=true" width="100%" height="70" frameborder="0" scrolling="no"></iframe></p>
<p>For Defense Department chief information officer Dana Deasy, digital transformation was never just about the cloud.</p>
<p>This is why making the Air Force’s dev/sec/ops program, known as Platform One, a DoDwide enterprisewide service is an important milestone.</p>
<figure id="attachment_2194544" style="width: 500px" class="wp-caption alignleft"><img loading="lazy" decoding="async" title="defence department" src="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg" class="wp-image-2194544 size-full" alt="defence department" width="500" height="335" srcset="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg 500w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-300x200.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-423x282.jpg 423w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-260x174.jpg 260w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-170x114.jpg 170w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-360x240.jpg 360w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-180x120.jpg 180w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-90x60.jpg 90w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-280x187.jpg 280w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-455x305.jpg 455w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-130x87.jpg 130w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-179x120.jpg 179w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-299x200.jpg 299w" sizes="auto, (max-width: 500px) 100vw, 500px"/><noscript><img loading="lazy" decoding="async" title="Department of Defense" class="wp-image-2194544 size-full" src="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg" alt="Department of Defense" width="500" height="335" srcset="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg 500w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-300x200.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-423x282.jpg 423w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-260x174.jpg 260w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-170x114.jpg 170w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-360x240.jpg 360w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-180x120.jpg 180w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-90x60.jpg 90w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-280x187.jpg 280w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-455x305.jpg 455w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-130x87.jpg 130w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-179x120.jpg 179w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-299x200.jpg 299w" sizes="auto, (max-width: 500px) 100vw, 500px"/></noscript><figcaption class="wp-caption-text">Dana Deasy is the DoD chief information officer.</figcaption></figure>
<p>Deasy said Platform One will make it easier for the military services and defense agencies to modernize applications.</p>
<p>“My office recently designated one of the most mature dev/sec/ops platforms within the department, the Air Force Platform One, as an enterprise service which has the effect of making this capability broadly-available across the DoD. That designation also links directly into the software acquisition policy released by Acquisition and Sustainment that encourages both the uses of dev/sec/ops and adoption of existing enterprise services,” Deasy said during a briefing with reporters on July 30. “While we tend to focus on technology when we talk about software, it is important to acknowledge that progress is delivering — delivering capability more rapidly will depend as much on non-technical enablers such as changes to acquisition policy, cyber risk&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/it-modernization/2020/08/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing the supply chain at its most vulnerable: The reseller channel</title>
		<link>https://risk-academy.ru/securing-the-supply-chain-at-its-most-vulnerable-the-reseller-channel/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 29 Jul 2020 22:38:10 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Reseller]]></category>
		<category><![CDATA[Chain]]></category>
		<category><![CDATA[supply chains]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Sales]]></category>
		<category><![CDATA[Supply chain management]]></category>
		<category><![CDATA[Freight transport]]></category>
		<category><![CDATA[large original equipment manufacturers]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/securing-the-supply-chain-at-its-most-vulnerable-the-reseller-channel/</guid>

					<description><![CDATA[From cyber hackers to counterfeit products, phishing, ransomware and theft of intellectual property, agencies face significant cyber threats from their supply chains. There is growing concern focused on the reseller [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>From cyber hackers to counterfeit products, phishing, ransomware and theft of intellectual property, agencies face significant cyber threats from their supply chains. There is growing concern focused on the reseller channel, an often vulnerable link. In too many cases, agencies are trusting without verifying and opening the door to potential threats.</p>
<p>As the last mile in federal supply chains, the channel manages an enormous amount of federal data, including Controlled Unclassified Information (CUI). While large original equipment manufacturers (OEMs) have vigorous supply chain practices, and some resellers will have all the required controls in place, other resellers do not have the resources to combat threats in the reseller channel. Adversaries exploit the reseller because it is the most cost effective opportunity, and vulnerabilities with small resellers are often magnified, resulting in a disruption in the entirety of a supply chain.</p>
<p>Consider, there are thousands of small resellers selling to federal agencies, the Defense Department, and the Intelligence Community. The barrier to entry is low. There is also often intense economic pressure to sell products, regardless&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/commentary/2020/07/securing-the-supply-chain-at-its-most-vulnerable-the-reseller-channel/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pentagon’s Enterprise DevSecOps Initiative Presents an Ambitious Model for the Future of Software</title>
		<link>https://risk-academy.ru/pentagons-enterprise-devsecops-initiative-presents-an-ambitious-model-for-the-future-of-software/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 17:08:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[chief software officer]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[Nicolas Chaillan]]></category>
		<category><![CDATA[first chief software officer]]></category>
		<category><![CDATA[sound products]]></category>
		<category><![CDATA[software production]]></category>
		<category><![CDATA[Secretary of Defense for Acquisition and Sustainment]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/pentagons-enterprise-devsecops-initiative-presents-an-ambitious-model-for-the-future-of-software/</guid>

					<description><![CDATA[Nicolas Chaillan has his work cut out for him. His title alone—chief software officer for the Air Force—bears the weight of an entire concept, where the talents of specialists in [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Nicolas Chaillan has his work cut out for him. His title alone—chief software officer for the Air Force—bears the weight of an entire concept, where the talents of specialists in development, security and operations, are fused to make and maintain more sound products faster, and his supervisors want him to produce 100,000 people from his mold within a year. </p>
<p>“I was the first chief software officer. I don&#8217;t think there&#8217;s any others yet,” Chaillan said. “When I first started, we had dozens of teams doing all that work in disparate and uncoordinated environments.” </p>
<p>Chaillan is now also co-lead for the Defense Department’s Enterprise DevSecOps initiative. He spoke with <em>Nextgov </em>about the effort, which got its start back in August 2018 while he was at the Office of the Secretary of Defense for Acquisition and Sustainment.</p>
<p>In a traditional stepped “waterfall” model of software production and use, tasks associated with security and operations—such as testing and maintenance—are at the bottom end. The concept of DevSecOps puts them on an even plane with the design and coding phases of the process. With all these intrinsically linked activities happening at the same&#8230;</p>
</div>
<p><a href="https://www.nextgov.com/cybersecurity/2020/07/pentagons-enterprise-devsecops-initiative-presents-ambitious-model-future-software/167177/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US Cybercom virtual war game girds against increased threats, IT News, ET CIO</title>
		<link>https://risk-academy.ru/us-cybercom-virtual-war-game-girds-against-increased-threats-it-news-et-cio/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 11:32:50 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Rear Adm. John Mauger]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[U.S. Cyber Command]]></category>
		<category><![CDATA[John Mauger]]></category>
		<category><![CDATA[online threats]]></category>
		<category><![CDATA[U.S. military cyber official]]></category>
		<category><![CDATA[Coast Guard]]></category>
		<category><![CDATA[control systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/us-cybercom-virtual-war-game-girds-against-increased-threats-it-news-et-cio/</guid>

					<description><![CDATA[Foreign hackers are taking advantage of the coronavirus pandemic to undermine institutions and threaten critical infrastructure, a top U.S. military cyber official said Thursday. The comments from Coast Guard Rear [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>Foreign hackers are taking advantage of the coronavirus pandemic to undermine institutions and threaten critical infrastructure, a top U.S. military cyber official said Thursday.</p>
<p>The comments from Coast Guard Rear Adm. John Mauger of U.S. Cyber Command came a day after Defense Department officials briefed reporters on virtual war games that digital combatants from U.S. and allied militaries have been holding to sharpen their abilities to counter online threats with real-world impact.</p>
<p>&#8220;We&#8217;ve seen increased adversary activity&#8221; since the pandemic began, Mauger said on a conference call, declining to discuss the threat in more specific detail. &#8220;We&#8217;re one part of the whole of government effort to defend our democracy in this complex cyber environment.&#8221;</p>
<p>On Wednesday, Cybercom offered reporters a window into what it described as its largest virtual training exercise to date &#8211; in this case, a simulated attack on an airfield&#8217;s control systems and fuel depots. Attackers tried to plant malware and gain access through phishing while defenders hunted for the intruders and their tools.</p>
<p>The Defense Department has hosted similar training exercises in previous years for its own fighters, as well as&#8230;</p>
</div>
<p><a href="https://cio.economictimes.indiatimes.com/news/digital-security/us-cybercom-virtual-war-game-girds-against-increased-threats/76641493">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Senate Defense bill would eliminate DoD’s chief management officer</title>
		<link>https://risk-academy.ru/senate-defense-bill-would-eliminate-dods-chief-management-officer/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 15:27:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Joint Information Environment]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Senate]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[chief management officer]]></category>
		<category><![CDATA[Senate Armed Services Committee]]></category>
		<category><![CDATA[James I. Finley]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/senate-defense-bill-would-eliminate-dods-chief-management-officer/</guid>

					<description><![CDATA[Just a little more than two years after the Pentagon complied with a Congressional mandate to create a new senior position to focus on business management and reform, lawmakers appear [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Just a little more than two years after the Pentagon complied with a Congressional mandate to create a new senior position to focus on business management and reform, lawmakers appear fully prepared to abandon the idea.</p>
<p>The Senate’s version of the 2021  National Defense Authorization Act, released by the Senate Armed Services Committee on Tuesday, includes provisions would eliminate the position of Defense Department chief management officer. If enacted, it would follow through on an intention Congress expressed in last year’s bill, when lawmakers included language opining that DoD has “faced significant structural challenges in implementing the Chief Management Officer position since its inception.”</p>
<p>The inception wasn’t all that long ago. Congress created the CMO’s office in the 2017 NDAA, making it the Pentagon’s third-highest ranking position, and it didn’t take effect until February of 2018.</p>
<p>Even so, the office is viewed “nearly unanimously” as having not met Congress’ intent of driving lasting and meaningful business reforms throughout the military services and Defense agencies, according to a Congressionally-directed study the Defense Business&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/defense-main/2020/06/senate-defense-bill-would-eliminate-dods-chief-management-officer/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 25 Cyber Execs to Watch in 2020: Coalfire Federal&#8217;s Bill Malone</title>
		<link>https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-coalfire-federals-bill-malone/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 17 May 2020 23:00:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[President]]></category>
		<category><![CDATA[Coalfire]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Federal Risk and Authorization Management Program]]></category>
		<category><![CDATA[The Washington Post]]></category>
		<category><![CDATA[Bill Malone Bill Malone]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Bill Malone]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-25-cyber-execs-to-watch-in-2020-coalfire-federals-bill-malone/</guid>

					<description><![CDATA[Bill Malone, Coalfire Federal Under President Bill Malone’s leadership, Coalfire Federal in 2019 completed the successful transition from an 8(a)/small business to a large cybersecurity services provider. Coalfire Federal grew [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="post-208464">
<p>	<!-- .post-header --></p>
<div class="post-content post-dynamic">
<div id="attachment_208225" style="width: 299px" class="wp-caption alignleft"><img loading="lazy" decoding="async" title="President" aria-describedby="caption-attachment-208225" class=" wp-image-208225" src="https://washingtonexec.com/wp-content/uploads/2020/05/Bill-Malone.jpg" alt="President" width="289" height="212"/></p>
<p id="caption-attachment-208225" class="wp-caption-text">Bill Malone, Coalfire Federal</p>
</div>
<p><span style="font-weight: 400;">Under President Bill Malone’s leadership, Coalfire Federal in 2019 completed the successful transition from an 8(a)/small business to a large cybersecurity services provider. Coalfire Federal grew 20%, achieved its ISO 20000 certification to go along with its IS0 9001/27001 and CMMI III and was named to the Top Workplaces for 2019 by The Washington Post.</span></p>
<p><span style="font-weight: 400;">As a Federal Risk and Authorization Management Program third-party assessment organization, Coalfire continued to support the ever-growing cloud services provider market and to advise federal clients on cloud security.</span></p>
<p><b>Why Watch:</b></p>
<p><span style="font-weight: 400;">Coalfire Federal’s top priority in 2020 is to leverage its multiframework experience to become one of the first accredited 3PAOs in the Defense Department’s emerging Cybersecurity Maturity Model Certification program. The Pentagon’s priority now is to safeguard every mission and to ensure security in every vendor along its supply chain, including the largest industrial contractors and the smallest administrative and support firms, Malone noted in a recent GCN </span><span style="font-weight: 400;">article</span><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">“With the move to the cloud, mission-critical priorities must be&#8230;</span></p>
</div>
</div>
<p><a href="https://washingtonexec.com/2020/05/top-25-cyber-execs-to-watch-in-2020-coalfire-federals-bill-malone/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
