<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Department of Defense &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/department-of-defense/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 19 Dec 2020 05:36:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Department of Defense &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Practice vs Process Maturity: Strengthening Your Cyber Compliance &#038; Risk Program</title>
		<link>https://risk-academy.ru/practice-vs-process-maturity-strengthening-your-cyber-compliance-risk-program/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 19:38:13 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[New Year's Day]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[Academic disciplines]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Contractor]]></category>
		<category><![CDATA[technology investments]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/practice-vs-process-maturity-strengthening-your-cyber-compliance-risk-program/</guid>

					<description><![CDATA[Information security maturity has never been more important. In the wake of the COVID-19 pandemic, the catalyzation of digital transformation and the ripple effects on businesses ensuring a strong cyber [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="hs_cos_wrapper_post_body">
<p>Information security maturity has never been more important. In the wake of the COVID-19 pandemic, the catalyzation of digital transformation and the ripple effects on businesses ensuring a strong cyber security posture and risk management program is essential for the new year. Too often, organizations will turn to technology investments to help enhance their security, however, as technologies have become increasingly capable, we are seeing that there is no way to use technology to protect against human error. Regulations are beginning to reflect this realization; with the Cybersecurity Maturity Model Certification (CMMC) being a landmark standard that incorporates both process and practice maturity when gauging the maturity level of a Department of Defense contractor’s security program.</p>
<h2>Accounting for People and Process as well as Technology</h2>
<p>As we move into a new year, organizations are still working to support the new paradigm of work that the pandemic ushered in. Specifically, security and risk teams have been working to update policies and procedures to support the rapid rise of remote work (a trend on the horizon but much like other trends accelerated by the pandemic,&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/12/practice-vs-process-maturity-strengthening-your-cyber-compliance-risk-program/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DISA Opens Bidding on $11.7B IT Modernization Contract: Top 20</title>
		<link>https://risk-academy.ru/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 01:54:30 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Disa]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[chief information officer]]></category>
		<category><![CDATA[Dana Deasy]]></category>
		<category><![CDATA[Defense Information Systems Agency]]></category>
		<category><![CDATA[single contractor]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[World Geographical Scheme for Recording Plant Distributions]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/</guid>

					<description><![CDATA[The Defense Information Systems Agency will outsource most network management, cybersecurity, and technical services functions serving 22 at Defense Department agencies to a single contractor , according to a final [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p class="">The Defense Information Systems Agency will outsource most network management, cybersecurity, and technical services functions serving 22 at Defense Department agencies to a single contractor , according to a final request for proposals released on Dec. 8.</p>
<p class="">Defense Enclave Services, with its massive scope and implications for the future of the Pentagon’s IT acquisition strategy, is the subject of this week’s Top 20 Opportunities. The contract will have a maximum dollar value of $11.7 billion over a possible 10-year lifespan.</p>
<p class="">DISA officials had planned to release the final RFP in September, but delayed the process to give DOD chief information officer Dana Deasy time to complete a review of the program. The agency intends to evaluate bids throughout the spring and summer of 2021 and make an award decision in the first quarter of fiscal 2022.</p>
<p class="">Potential bidders have until Feb. 8 to respond to the RFP.</p>
<h3 class="">4th Estate Network Modernization</h3>
<p class="">DES will serve as the primary vehicle for the Pentagon’s planned 4th Estate Network Optimization (4ENO) program, referring to the 22 civilian-led agencies, collectively known as the “fourth estate.” They include DISA, the Defense Logistics&#8230;</p>
</div>
<p><a href="https://about.bgov.com/news/disa-opens-bidding-on-11-7b-it-modernization-contract-top-20/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Making software more than &#8216;IT thing&#8217; &#8212; FCW</title>
		<link>https://risk-academy.ru/making-software-more-than-it-thing-fcw/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 03:21:14 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Richie Steamboat]]></category>
		<category><![CDATA[Social Issues]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Lauren C. Williams]]></category>
		<category><![CDATA[Software modernization]]></category>
		<category><![CDATA[Peter Ranks]]></category>
		<category><![CDATA[sure that being good at software]]></category>
		<category><![CDATA[deputy CIO for information enterprise]]></category>
		<category><![CDATA[Queen of FCW]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/making-software-more-than-it-thing-fcw/</guid>

					<description><![CDATA[Defense Making software more than &#8216;IT thing&#8217; &#13; By Lauren C. Williams Nov 15, 2020 &#13;   Software modernization has a branding problem, and it&#8217;s going to take more than [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article">
<p id="ph_pcontent2_0_KickerText" class="kicker">Defense</p>
<h3 id="ph_pcontent2_0_MainHeading" class="title">Making software more than &#8216;IT thing&#8217;</h3>
<ul id="ph_pcontent2_0_ByAuthor" class="byline">&#13;</p>
<li class="author">By Lauren C. Williams</li>
<li class="date">Nov 15, 2020</li>
<p>&#13;
		</ul>
<div class="remove imageCap">
<img fetchpriority="high" decoding="async" title="Social Issues" height="368" alt="Pentagon photo by Air Force Tech. Sgt. Ned T. Johnston" width="760" src="https://fcw.com/-/media/GIG/EDIT_SHARED/Buildings/Pentagon/pentagon.jpg"/> </div>
<p>Software modernization has a branding problem, and it&#8217;s going to take more than the colloquial culture shift to speed up the Defense Department&#8217;s adoption of modern tech capabilities. </p>
<p>&#8220;Part of the marketing of this is to make sure that being good at software escapes the domain of IT people and really gets thought of in the context of making us more effective at warfighting,&#8221; Peter Ranks, the deputy CIO for information enterprise, told FCW. </p>
<p>&#8220;The real challenge for the leadership, I think, is not to just latch on to the tech piece of this, but to really be willing to dig in and have the sustained focus to kind of impact culture,&#8221; Ranks said. </p>
<p>But the bureaucracy isn&#8217;t built for software&#8217;s rapid development, increased demand and security needs &#8212; something that played a major role during the Defense Department&#8217;s response to tech needs spurred by the pandemic and teleworking. </p>
<div class="ad">
<div id="div-gpt-ad-BOX_1-0005">
<p>      <noscript>&#13;<br />
        &#13;<br />
        <img decoding="async" title="defence department" src="https://pubads.g.doubleclick.net/gampad/ad?iu=/5978/eof.fcw&amp;t=item%253ddf4344d1_c7d3_42a3_90b8_a4347537f15a%26pos%253dBOX_1%26Topic%253dDoD%252cAir_Force%252cOperational_Policy%252cProcurement_Policy%252cOversight%252cIT_Modernization%252cSoftware_Development%252cAgencies%252cPolicy%252cTechnology&amp;sz=300x250|1x1| 580x400|640x481&amp;tile=5&amp;c=123456789" border="0" alt="defence department" />&#13;<br />
        &#13;<br />
      </noscript>
    </div>
</p></div>
<p>&#8220;We&#8217;ve&#8230;</p>
</div>
<p><a href="https://fcw.com/articles/2020/11/15/ranks-software-warfighting-pentagon.aspx">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DOD Must Expand Its Mission-Critical Cybersecurity Focus to Include Connected Weapons</title>
		<link>https://risk-academy.ru/dod-must-expand-its-mission-critical-cybersecurity-focus-to-include-connected-weapons/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 04:01:03 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Government Accountability Office]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[open-source search]]></category>
		<category><![CDATA[weapons systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dod-must-expand-its-mission-critical-cybersecurity-focus-to-include-connected-weapons/</guid>

					<description><![CDATA[As military and defense industry leaders came together in October for the AUSA Annual Meeting &#38; Expo, they learned about the new and innovative systems available to the nation’s military. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>As military and defense industry leaders came together in October for the AUSA Annual Meeting &amp; Expo, they learned about the new and innovative systems available to the nation’s military. Many of these systems will be smart, connected weapons, which give our fighters a greater advantage on the battlefield. But they also pose serious cybersecurity risks that must be addressed. </p>
<p>Indeed, in a report released by the Government Accountability Office nearly two years ago, it was revealed that DOD security researchers gained access to nearly all major weapons systems currently in use and under development. Once, because the system was still using the default password visible through an open-source search. In another instance, researchers were able to disable an entire weapons system without detection, later to learn the system crashed so often on its own that it was difficult for officials to detect a breach. Perhaps most concerning is that one test team found that only one of 20 previously identified vulnerabilities had been fixed. </p>
<p>These are shocking lapses in cyber hygiene that could have real-world consequences. These weaknesses should not be difficult to address; changing the&#8230;</p>
</div>
<p><a href="https://www.nextgov.com/ideas/2020/11/dod-must-expand-its-mission-critical-cybersecurity-focus-include-connected-weapons/169963/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Supply Chain Cybersecurity: What You Need to Consider</title>
		<link>https://risk-academy.ru/supply-chain-cybersecurity-what-you-need-to-consider/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 24 Oct 2020 18:08:23 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[NIST Cybersecurity Framework]]></category>
		<category><![CDATA[National Initiative for Cybersecurity Education]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[United States Department of Defense]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/supply-chain-cybersecurity-what-you-need-to-consider/</guid>

					<description><![CDATA[As companies and organizations evaluate their attack surface, they know to look at their own systems and infrastructure to defend against threats and manage vulnerabilities. However, what about their critical [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="layout-" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>As companies and organizations evaluate their attack surface, they know to look at their own systems and infrastructure to defend against threats and manage vulnerabilities. However, what about their critical partners and the supply chain? With up to 80% of cyber-attacks now beginning in the supply chain, breaches at even the smallest vendors can have big consequences for enterprise level operations. The problem of supply chain cybersecurity has become so pressing that the United States Department of Defense is rolling out the Cybersecurity Maturity Model Certification (CMMC) as a means to help secure the defense industry. Prime contractors and subcontractors will have to achieve CMMC compliance to do business as part of a DoD contract. The Primes are also expected to take a greater responsibility to ensure that subcontractors are implementing the appropriate security practices and compliance with the DoD standard.</p>
<p>One problem in securing the supply chain is where the organizational responsibility lies. Many different departments of an enterprise work with the supply chain and other critical partners, but there’s no one person or team held accountable.</p>
<p>Corporate legal may&#8230;</p>
</div>
<p><a href="https://www.infosecurity-magazine.com/blogs/supply-chain-cybersecurity/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DoD study suggests it’s very hard to contract COVID-19 on an airplane</title>
		<link>https://risk-academy.ru/dod-study-suggests-its-very-hard-to-contract-covid-19-on-an-airplane/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 12:39:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[U . S . Transportation]]></category>
		<category><![CDATA[U.S. Transportation Command]]></category>
		<category><![CDATA[reporter]]></category>
		<category><![CDATA[Defense Advanced Projects Research Agency]]></category>
		<category><![CDATA[unnecessary travel]]></category>
		<category><![CDATA[Scott Maucione]]></category>
		<category><![CDATA[Jared Serbu]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dod-study-suggests-its-very-hard-to-contract-covid-19-on-an-airplane/</guid>

					<description><![CDATA[The DoD Reporter’s Notebook is a weekly summary of personnel, acquisition, technology and management stories that may have fallen below your radar during the past week, but are nonetheless important. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><i data-stringify-type="italic">The DoD Reporter’s Notebook is a weekly summary of personnel, acquisition, technology and management stories that may have fallen below your radar during the past week, but are nonetheless important. It’s compiled and published each Monday by Federal News Network DoD reporters </i><i data-stringify-type="italic">Jared Serbu</i><i data-stringify-type="italic"> and </i><i data-stringify-type="italic">Scott Maucione</i><i data-stringify-type="italic">.</i></p>
<h2>DoD’s in-air, on ground testing indicates commercial aircraft present low risk for COVID transmission</h2>
<p>In the midst of pandemic, all available evidence shows it’s a very good idea to keep oneself away from large gatherings of other people and to avoid unnecessary travel. But if you really need to go somewhere, it’s extraordinarily unlikely that you’ll contract the virus during a plane flight.</p>
<p>That’s according to a just-finished study by U.S. Transportation Command and the Defense Advanced Projects Research Agency, which officials say is the largest study of airborne particles in airplanes that’s ever been conducted.</p>
<p>Defense officials launched the research to help determine the risks of moving service members and their families aboard contracted commercial aircraft — most commonly&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/dod-reporters-notebook-jared-serbu/2020/10/dod-study-suggests-its-very-hard-to-contract-covid-19-on-an-airplane/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Kratos Announces Cybersecurity Maturity Model Certification (CMMC) Advisory Services</title>
		<link>https://risk-academy.ru/kratos-announces-cybersecurity-maturity-model-certification-cmmc-advisory-services/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 02:14:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[pre-certification advisory services]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[SAN DIEGO]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[remediation services]]></category>
		<category><![CDATA[advisory services]]></category>
		<category><![CDATA[Kratos Defense & Security Solutions Inc.]]></category>
		<category><![CDATA[Mark Williams]]></category>
		<category><![CDATA[operational consulting services]]></category>
		<category><![CDATA[National Security Solutions]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/kratos-announces-cybersecurity-maturity-model-certification-cmmc-advisory-services/</guid>

					<description><![CDATA[Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here. SAN DIEGO, Sept. 16, 2020 (GLOBE NEWSWIRE) &#8212; Kratos Defense &#38; Security Solutions, Inc. (Nasdaq: KTOS), a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<hr/>
<p><i>Get inside Wall Street with <b>StreetInsider Premium</b>. Claim your 1-week free trial here.</i></p>
<hr/>
<p><meta http-equiv="Content-Type" content="text/html; charset=utf-8"/></p>
<p align="justify">SAN DIEGO, Sept. 16, 2020 (GLOBE NEWSWIRE) &#8212; Kratos Defense &amp; Security Solutions, Inc. (Nasdaq: KTOS), a leading National Security Solutions provider, announced today that it is offering CMMC pre-certification advisory services to commercial organizations and Department of Defense (DoD) contractors seeking CMMC compliance. CMMC advisory services currently include strategic and operational consulting services, gap assessment and remediation services, and documentation services.</p>
<p align="justify">As Mark Williams, Vice President, Kratos Cybersecurity Services explained: “Unlike most organizations offering CMMC Advisory services, Kratos is one of the first and largest FedRAMP third party assessment organizations (3PAO), is a member of the Defense Industrial Base (DIB) and sells to the DoD.  As a result, we have a unique understanding and insight into how CMMC requirements impact DIB organizations and what can/should be done to satisfy these requirements.” FedRAMP is a U.S. government-wide certification program in which all cloud service providers (CSPs) must be authorized to provide cloud services&#8230;</p>
</div>
<p><a href="https://www.streetinsider.com/Globe+Newswire/Kratos+Announces+Cybersecurity+Maturity+Model+Certification+%28CMMC%29+Advisory+Services/17363017.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CMMC is good for business</title>
		<link>https://risk-academy.ru/cmmc-is-good-for-business/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 15 Aug 2020 21:15:52 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Association for Data and Cyber Governance]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Labor]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[government networks]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[Gone]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cmmc-is-good-for-business/</guid>

					<description><![CDATA[Gone are the days when Cybersecurity Maturity Model Certification (CMMC) was the issue keeping us up at night. Now that COVID-19 coverage has overtaken the news cycle and upended government [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Gone are the days when Cybersecurity Maturity Model Certification (CMMC) was the issue keeping us up at night. Now that COVID-19 coverage has overtaken the news cycle and upended government and businesses alike, it has been hard to focus on anything else but coronavirus. But, according to the Department of Defense (DoD), the show must go on despite the disruption coronavirus has caused to the workforce. In fact, CMMC milestones and deadlines are still being executed on a tight clip.</p>
<p>Many already viewed the process of trying to meet or assess their level of compliance as a financial burden which is now compounded by operating with a largely remote workforce. However, in light of increased cyber attacks against government networks and the private sector, implementing CMMC requirements – especially now – may actually be a blessing. CMMC requires government contractors to achieve certain cybersecurity standards in order to qualify for contract awards. But these standards are also designed to protect the networks of government contractors too regardless of the goods or services they provide to the Defense Industrial Base (DIB).</p>
<p>In reality, the much anticipated CMMC is good&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/commentary/2020/08/cmmc-is-good-for-business/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DoD CIO attempts to remove non-technical obstacles to digital transformation</title>
		<link>https://risk-academy.ru/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 18:05:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Dana Deasy]]></category>
		<category><![CDATA[Mass media in the United States]]></category>
		<category><![CDATA[defence department]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Magazines]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[software acquisition policy]]></category>
		<category><![CDATA[chief information officer]]></category>
		<category><![CDATA[Defense Department]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/</guid>

					<description><![CDATA[For Defense Department chief information officer Dana Deasy, digital transformation was never just about the cloud. This is why making the Air Force’s dev/sec/ops program, known as Platform One, a [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><iframe src="https://www.podcastone.com/episodewidget?episodeID=e8299f99-744f-423c-aa4c-e33bdee83c0b&amp;logo=true" width="100%" height="70" frameborder="0" scrolling="no"></iframe></p>
<p>For Defense Department chief information officer Dana Deasy, digital transformation was never just about the cloud.</p>
<p>This is why making the Air Force’s dev/sec/ops program, known as Platform One, a DoDwide enterprisewide service is an important milestone.</p>
<figure id="attachment_2194544" style="width: 500px" class="wp-caption alignleft"><img decoding="async" title="defence department" src="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg" class="wp-image-2194544 size-full" alt="defence department" width="500" height="335" srcset="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg 500w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-300x200.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-423x282.jpg 423w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-260x174.jpg 260w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-170x114.jpg 170w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-360x240.jpg 360w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-180x120.jpg 180w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-90x60.jpg 90w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-280x187.jpg 280w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-455x305.jpg 455w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-130x87.jpg 130w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-179x120.jpg 179w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-299x200.jpg 299w" sizes="(max-width: 500px) 100vw, 500px"/><noscript><img loading="lazy" decoding="async" title="Department of Defense" class="wp-image-2194544 size-full" src="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg" alt="Department of Defense" width="500" height="335" srcset="https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD.jpg 500w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-300x200.jpg 300w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-423x282.jpg 423w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-260x174.jpg 260w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-170x114.jpg 170w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-360x240.jpg 360w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-180x120.jpg 180w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-90x60.jpg 90w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-280x187.jpg 280w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-455x305.jpg 455w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-130x87.jpg 130w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-179x120.jpg 179w, https://federalnewsnetwork.com/wp-content/uploads/2018/12/dana-deasy_DoD-299x200.jpg 299w" sizes="auto, (max-width: 500px) 100vw, 500px"/></noscript><figcaption class="wp-caption-text">Dana Deasy is the DoD chief information officer.</figcaption></figure>
<p>Deasy said Platform One will make it easier for the military services and defense agencies to modernize applications.</p>
<p>“My office recently designated one of the most mature dev/sec/ops platforms within the department, the Air Force Platform One, as an enterprise service which has the effect of making this capability broadly-available across the DoD. That designation also links directly into the software acquisition policy released by Acquisition and Sustainment that encourages both the uses of dev/sec/ops and adoption of existing enterprise services,” Deasy said during a briefing with reporters on July 30. “While we tend to focus on technology when we talk about software, it is important to acknowledge that progress is delivering — delivering capability more rapidly will depend as much on non-technical enablers such as changes to acquisition policy, cyber risk&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/it-modernization/2020/08/dod-cio-attempts-to-remove-non-technical-obstacles-to-digital-transformation/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defense Contractors: What’s Next with CMMC?</title>
		<link>https://risk-academy.ru/defense-contractors-whats-next-with-cmmc/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 11:00:56 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[Contractor]]></category>
		<category><![CDATA[official]]></category>
		<category><![CDATA[Abel Vandegrift]]></category>
		<category><![CDATA[Katie Arrington]]></category>
		<category><![CDATA[online conferences]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/defense-contractors-whats-next-with-cmmc/</guid>

					<description><![CDATA[The Cybersecurity Maturity Model Certification (CMMC) program is supposed to shore up cybersecurity across the DoD’s 300,000+ contractor base. Authentic8’s Abel Vandegrift discusses the progress the Pentagon and other stakeholders [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
</p>
<div class="intro-text">
<p><em>The Cybersecurity Maturity Model Certification (CMMC) program is supposed to shore up cybersecurity across the DoD’s 300,000+ contractor base. Authentic8’s Abel Vandegrift discusses the progress the Pentagon and other stakeholders have made over the past few months.</em></p>
</div>
<p>Since the start of the pandemic, DoD official Katie Arrington, the acquisition office’s CISO and the public face of the DoD’s effort, has kept in close touch with Defense Industrial Base (DIB) stakeholders via online conferences to provide continual updates and clarifications.</p>
<p>The CMMC program will require all DoD contractors to undergo assessment and third-party certification<sup>[1]</sup> of their cybersecurity posture to be awarded a DoD contract. The tiered certification program includes five levels corresponding to the sensitivity of the controlled unclassified information (CUI) a contractor will handle under a particular contract.</p>
<h2>Accreditation Body in Place, Assessor Certification Underway</h2>
<p>Rolling out the requirements will be a slow and measured process. The DoD has handpicked the first 10 requests for information (RFIs) that will include CMMC requirements, scheduled to appear in October after the official acquisition rule is changed. The requests for proposals (RFPs) will follow later this year, and the first contract awards are expected in&#8230;</p>
</div>
<p><a href="http://feedproxy.google.com/~r/CorporateComplianceInsights/~3/eTk5TgFQqtQ/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
