• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD AND HOMELAND SECURITY UPDATE

December 24, 2014 by

18 Dec 14. DoD releases new federated cloud procurement policy. Defense agency CIOs now have more power to buy cloud services under a new memo that gives component agencies authority to act as their own brokers, rather than going through the Defense Information Systems Agency. Acting DoD CIO Terry Halvorsen has said he wants to speed up the cloud acquisition process among the department’s many component agencies and military branches. The move to federate responsibility for the process is intended to do just that, while maintaining a level of security necessary for defense operations. There will still be oversight, as agencies must complete a Business Case Analysis (BCA) prior to each acquisition using the guidelines set forth in an October DoD memo. Both the component agency CIO and DoD CIO must sign off on the BCA before the purchase is finalized. Minimum security standards will follow the Federal Risk Authorization and Management Program (FedRAMP). DoD is working on a policy guide for sensitive unclassified data expected to be released Jan. 7. The security guide will require cloud providers to submit evidence to DISA that their services can handle sensitive information securely. If a product meets the security requirements, DISA will issue a provisional authorization. Component agency CIOs will then use the BCA and information in the provisional authorization to make decisions on cloud purchases. “This is a great outcome,” said Carmen Krueger, senior vice president and general manager for cloud operations at SAP National Security Services (SAP NS2). “The Department of Defense is a very large organization and the services have historically had some level of autonomy in information technology choices but with that key umbrella of security protocols that they have to follow.” Krueger noted the provisional authorizations will work in much the same way that civilian cloud providers use authority to operate accreditation. Like an ATO, provisional authorization will give component agencies assurance that the provider meets the baseline requirements without having to duplicate the process at each agency. (Source: C4ISR & Networks)

21 Dec 14. DISA PEO-MA is seeking information for potential sources with competencies in the following two areas: (1) engineering and development services to support cyber analytic development for DISA and the Department of Defense (DoD) on DISA’s Cyber Situational Awareness Analytic Cloud (CSAAC), and/or (2) a Commercial Off the Shelf (COTS) product or suite of products to stage data for rapid presentation to external users (both human and machine) and to enable users to tailor visualizations of analyzed data. These tools are commonly known as Business Intelligence (BI) tools. These analytics and BI capabilities will be deployed alongside other third party analytics from Federal and DoD Services and Agencies in order to support increased situational awareness and computer network defensive capabilities for a variety of stakeholders. The vendor will be required to provide analytics and visualization widget (either BI or Ozone Widget, as required) engineering, BI licensing and BI integration, certification and accreditation, and program management/administrative support closely integrated with cutting-edge research and development capabilities.
Contract Number: HC1028-08-D-2015-0005
Contract Type: FFP, CPFF
Incumbent and their size: ManTech International Corporation (Large)
Method of previous acquisition: Full and open competition
Contract Number: HC1028-13-A-0013-0004
Contract Type: FFP
Incumbent and their size: Foxhole Technology (Small)
Method of previous acquisition: Full and open competition
The current efforts provide a NetOps architecture and implementation strategy for a unified and highly secure management environment that results in the creation of new, and improvement of existing, Situational Awareness (SA) capabilities that cross organizational and system boundaries for the Warfight

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT