This document establishes policies and assigns responsibilities for managing the Department of Defense's cyberspace workforce. It reissues and expands an existing directive on the cyberspace workforce. It authorizes the establishment of a cyberspace workforce management council to ensure the requirements of the directive are met. It also unifies the cyberspace workforce into specific elements to standardize work roles, qualifications, and training requirements, while allowing operational employment to be determined by different DoD components.
Department of Defense Instruction 5143_DUSD Intelligence 24Oct14Tom "Blad" Lindblad
Reissues DoD Directive (DoDD) 5143.01 (Reference (a)) to update the responsibilities and functions, relationships, and authorities of the USD(I), pursuant to the authority vested in the Secretary of Defense (SecDef) by sections 113 and 137 of Title 10, United States Code (U.S.C.) (Reference (b)), and in accordance with section 3001 et seq. of Title 50, U.S.C. (Reference (c)), as well as Public Law 108-458 (Reference (d)), Executive Order (E.O.) 12333 (Reference (e)), and E.O. 13470 (Reference (f)).
Defense Contract Management Agency Social Media Handbookdcmapublicaffairs
The Defense Contract Management Agency's Social Media Handbook is designed to give employees and leadership an introduction to social networking and illustrates the agency's strategy in acheiving success through this means of communication.
Department of Defense Instruction 5143_DUSD Intelligence 24Oct14Tom "Blad" Lindblad
Reissues DoD Directive (DoDD) 5143.01 (Reference (a)) to update the responsibilities and functions, relationships, and authorities of the USD(I), pursuant to the authority vested in the Secretary of Defense (SecDef) by sections 113 and 137 of Title 10, United States Code (U.S.C.) (Reference (b)), and in accordance with section 3001 et seq. of Title 50, U.S.C. (Reference (c)), as well as Public Law 108-458 (Reference (d)), Executive Order (E.O.) 12333 (Reference (e)), and E.O. 13470 (Reference (f)).
Defense Contract Management Agency Social Media Handbookdcmapublicaffairs
The Defense Contract Management Agency's Social Media Handbook is designed to give employees and leadership an introduction to social networking and illustrates the agency's strategy in acheiving success through this means of communication.
Topics in this presentation:
Cybersecurity Procedures Overview, DoDI 8500.01 Training Course Description.
Audience.
Training Objectives.
Training Outline.
Cybersecurity Steps for DoD.
Cybersecurity Risk Management.
Operational Resilience.
Cybersecurity Test and Evaluation.
Integration and Interoperability.
Cyberspace Defense.
Performance Test.
DoD Information Security.
DoD Identity Assurance.
DoD Information Technology.
DoD Cybersecurity Workforce.
Hands On, Workshops and Group Activities.
Sample Workshops and Labs for Cybersecurity Procedures Overview, DoDI 8500.01 Training.
Cybersecurity Procedures Overview, DoDI 8500.01 Training Course Description:
Cybersecurity Procedures Overview, DoDI 8500.01 training gives you a classified approach and step by step procedure to secure your information system based on DoD standard instructions. DoDI 8500.01 is a cybersecurity program to protect and defend DoD information and Information Technology (DoD IT) from prospective cybersecurity threats.
TONEX as a pioneer in security industry for over 15 years is presently reporting the Cybersecurity Procedures Overview, DoDI 8500.01 training which encourages you to comprehend security controls in consistence with laws, directions and arrangements and stretch out security assurance to data frameworks in government organizations and DoD related IT. DoDI 8500.01 applies to all DoD related associations, military divisions, the workplace of the administrator of the joint head of staff (CJCS), barrier offices, DoD field exercises and all other hierarchical substances identified with the DoD.
TONEX as a pioneer in industry and the scholarly community with top notch gatherings, classes, workshops, and solely outlined courses in cybersecurity territory is satisfied to report an entire training on cybersecurity usage for DoD to secure DoD activity, people and associations from dangers.
Audience:
2-day course designed for:
IT professionals in the DoD organizations
Airforce and Military Personnel in charge of cybersecurity
DoD employees and contractors or service providers
All DoD personnel in charge of information assurance
Authorizing official representatives, chief information officers, senior information assurance officers, information system owners or certifying authorities
Employees of federal agencies and the intelligence community
Assessors, assessment team members, auditors, inspectors or program managers of information technology area
Any individual looking for information assurance implementation for a company based on recent DoD and NIST policies
Information system owners, information owners, business owners, and information system security managers
Request more information.
Cybersecurity Procedures Overview, DoDI 8500.01
https://www.tonex.com/training-courses/cybersecurity-procedures-overview-dodi-8500-01/
DoDAF architecture example using a functional “thread” of Search and Rescue (SAR) concept
Provides an architectural example of DoDAF 2.0 in Action using a real world construct
Shows how architectural analysis can answer SAR Program Management questions.
Department of Defense INSTRUCTION NUMBER 5000.02 Jan.docxsimonithomas47935
Department of Defense
INSTRUCTION
NUMBER 5000.02
January 7, 2015
USD(AT&L)
SUBJECT: Operation of the Defense Acquisition System
References: See References
1. PURPOSE. This instruction:
a. In accordance with the authority in DoD Directive 5000.01 (Reference (a)), reissues the
interim DoD Instruction 5000.02 (Reference (b)) to update established policy for the
management of all acquisition programs in accordance with Reference (a), the guidelines of
Office of Management and Budget Circular A-11 (Reference (c)), and References (d) through
(ce).
b. Authorizes Milestone Decision Authorities (MDAs) to tailor the regulatory requirements
and acquisition procedures in this instruction to more efficiently achieve program objectives,
consistent with statutory requirements and Reference (a).
2. APPLICABILITY. This instruction applies to OSD, the Military Departments, the Office of
the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the
Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD
Field Activities, and all other organizational entities within the DoD (referred to collectively in
this instruction as the “DoD Components”).
3. POLICY. The overarching management principles and mandatory policies that govern the
Defense Acquisition System are described in Reference (a). This instruction provides the
detailed procedures that guide the operation of the system.
4. RESPONSIBILITIES
a. Defense Acquisition Executive (DAE). The DAE is the Under Secretary of Defense for
Acquisition, Technology, and Logistics (USD(AT&L)). The DAE will act as the MDA for
Major Defense Acquisition Programs (MDAPs) and Major Automated Information System
(MAIS) programs. In accordance with Table 1 in Enclosure 1 of this instruction, the DAE may
DoDI 5000.02, January 7, 2015
2
delegate authority to act as the MDA to the head of a DoD Component, who may further
delegate the authority to the Component Acquisition Executive (CAE). The DAE may also
delegate MDA authority to another OSD official as the DAE considers appropriate.
b. MDA. The MDA will establish procedures for assigned programs using this instruction
as guidance. MDAs should limit mandatory procedures applicable to all assigned programs so as
to not exceed the requirements for MDAPs or MAIS programs and other acquisition programs
governed by this instruction or DoD Directive 5000.01 (Reference (a)). MDAs should tailor
regulatory procedures in the document consistent with sound business practice and the risks
associated with the product being acquired.
c. Heads of the DoD Components. The DoD Component Head will implement the
procedures in this instruction and Reference (a). Component-required procedures will not
exceed those specified in this instruction. When necessary, waivers or requests for exceptions to
the provisions of this instructio.
Topics in this presentation:
Cybersecurity Procedures Overview, DoDI 8500.01 Training Course Description.
Audience.
Training Objectives.
Training Outline.
Cybersecurity Steps for DoD.
Cybersecurity Risk Management.
Operational Resilience.
Cybersecurity Test and Evaluation.
Integration and Interoperability.
Cyberspace Defense.
Performance Test.
DoD Information Security.
DoD Identity Assurance.
DoD Information Technology.
DoD Cybersecurity Workforce.
Hands On, Workshops and Group Activities.
Sample Workshops and Labs for Cybersecurity Procedures Overview, DoDI 8500.01 Training.
Cybersecurity Procedures Overview, DoDI 8500.01 Training Course Description:
Cybersecurity Procedures Overview, DoDI 8500.01 training gives you a classified approach and step by step procedure to secure your information system based on DoD standard instructions. DoDI 8500.01 is a cybersecurity program to protect and defend DoD information and Information Technology (DoD IT) from prospective cybersecurity threats.
TONEX as a pioneer in security industry for over 15 years is presently reporting the Cybersecurity Procedures Overview, DoDI 8500.01 training which encourages you to comprehend security controls in consistence with laws, directions and arrangements and stretch out security assurance to data frameworks in government organizations and DoD related IT. DoDI 8500.01 applies to all DoD related associations, military divisions, the workplace of the administrator of the joint head of staff (CJCS), barrier offices, DoD field exercises and all other hierarchical substances identified with the DoD.
TONEX as a pioneer in industry and the scholarly community with top notch gatherings, classes, workshops, and solely outlined courses in cybersecurity territory is satisfied to report an entire training on cybersecurity usage for DoD to secure DoD activity, people and associations from dangers.
Audience:
2-day course designed for:
IT professionals in the DoD organizations
Airforce and Military Personnel in charge of cybersecurity
DoD employees and contractors or service providers
All DoD personnel in charge of information assurance
Authorizing official representatives, chief information officers, senior information assurance officers, information system owners or certifying authorities
Employees of federal agencies and the intelligence community
Assessors, assessment team members, auditors, inspectors or program managers of information technology area
Any individual looking for information assurance implementation for a company based on recent DoD and NIST policies
Information system owners, information owners, business owners, and information system security managers
Request more information.
Cybersecurity Procedures Overview, DoDI 8500.01
https://www.tonex.com/training-courses/cybersecurity-procedures-overview-dodi-8500-01/
DoDAF architecture example using a functional “thread” of Search and Rescue (SAR) concept
Provides an architectural example of DoDAF 2.0 in Action using a real world construct
Shows how architectural analysis can answer SAR Program Management questions.
Department of Defense INSTRUCTION NUMBER 5000.02 Jan.docxsimonithomas47935
Department of Defense
INSTRUCTION
NUMBER 5000.02
January 7, 2015
USD(AT&L)
SUBJECT: Operation of the Defense Acquisition System
References: See References
1. PURPOSE. This instruction:
a. In accordance with the authority in DoD Directive 5000.01 (Reference (a)), reissues the
interim DoD Instruction 5000.02 (Reference (b)) to update established policy for the
management of all acquisition programs in accordance with Reference (a), the guidelines of
Office of Management and Budget Circular A-11 (Reference (c)), and References (d) through
(ce).
b. Authorizes Milestone Decision Authorities (MDAs) to tailor the regulatory requirements
and acquisition procedures in this instruction to more efficiently achieve program objectives,
consistent with statutory requirements and Reference (a).
2. APPLICABILITY. This instruction applies to OSD, the Military Departments, the Office of
the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the
Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD
Field Activities, and all other organizational entities within the DoD (referred to collectively in
this instruction as the “DoD Components”).
3. POLICY. The overarching management principles and mandatory policies that govern the
Defense Acquisition System are described in Reference (a). This instruction provides the
detailed procedures that guide the operation of the system.
4. RESPONSIBILITIES
a. Defense Acquisition Executive (DAE). The DAE is the Under Secretary of Defense for
Acquisition, Technology, and Logistics (USD(AT&L)). The DAE will act as the MDA for
Major Defense Acquisition Programs (MDAPs) and Major Automated Information System
(MAIS) programs. In accordance with Table 1 in Enclosure 1 of this instruction, the DAE may
DoDI 5000.02, January 7, 2015
2
delegate authority to act as the MDA to the head of a DoD Component, who may further
delegate the authority to the Component Acquisition Executive (CAE). The DAE may also
delegate MDA authority to another OSD official as the DAE considers appropriate.
b. MDA. The MDA will establish procedures for assigned programs using this instruction
as guidance. MDAs should limit mandatory procedures applicable to all assigned programs so as
to not exceed the requirements for MDAPs or MAIS programs and other acquisition programs
governed by this instruction or DoD Directive 5000.01 (Reference (a)). MDAs should tailor
regulatory procedures in the document consistent with sound business practice and the risks
associated with the product being acquired.
c. Heads of the DoD Components. The DoD Component Head will implement the
procedures in this instruction and Reference (a). Component-required procedures will not
exceed those specified in this instruction. When necessary, waivers or requests for exceptions to
the provisions of this instructio.
“Registered Apprenticeship has tremendous opportunity to help millions of individuals—and women in particular—to get the training and supports they need to enter and be successful in the burgeoning health and long-term care workforce. Jobs in this sector are growing exponentially and Registered Apprenticeship programs can help communities to meet this demand while simultaneously providing economic opportunities for individuals.”
~Robyn Stone, Executive Director, Institute for the Future of Aging Services, American Association for Homes and Services for the Aging
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Canadian Immigration Tracker March 2024 - Key SlidesAndrew Griffith
Highlights
Permanent Residents decrease along with percentage of TR2PR decline to 52 percent of all Permanent Residents.
March asylum claim data not issued as of May 27 (unusually late). Irregular arrivals remain very small.
Study permit applications experiencing sharp decrease as a result of announced caps over 50 percent compared to February.
Citizenship numbers remain stable.
Slide 3 has the overall numbers and change.
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
Up the Ratios Bylaws - a Comprehensive Process of Our Organizationuptheratios
Up the Ratios is a non-profit organization dedicated to bridging the gap in STEM education for underprivileged students by providing free, high-quality learning opportunities in robotics and other STEM fields. Our mission is to empower the next generation of innovators, thinkers, and problem-solvers by offering a range of educational programs that foster curiosity, creativity, and critical thinking.
At Up the Ratios, we believe that every student, regardless of their socio-economic background, should have access to the tools and knowledge needed to succeed in today's technology-driven world. To achieve this, we host a variety of free classes, workshops, summer camps, and live lectures tailored to students from underserved communities. Our programs are designed to be engaging and hands-on, allowing students to explore the exciting world of robotics and STEM through practical, real-world applications.
Our free classes cover fundamental concepts in robotics, coding, and engineering, providing students with a strong foundation in these critical areas. Through our interactive workshops, students can dive deeper into specific topics, working on projects that challenge them to apply what they've learned and think creatively. Our summer camps offer an immersive experience where students can collaborate on larger projects, develop their teamwork skills, and gain confidence in their abilities.
In addition to our local programs, Up the Ratios is committed to making a global impact. We take donations of new and gently used robotics parts, which we then distribute to students and educational institutions in other countries. These donations help ensure that young learners worldwide have the resources they need to explore and excel in STEM fields. By supporting education in this way, we aim to nurture a global community of future leaders and innovators.
Our live lectures feature guest speakers from various STEM disciplines, including engineers, scientists, and industry professionals who share their knowledge and experiences with our students. These lectures provide valuable insights into potential career paths and inspire students to pursue their passions in STEM.
Up the Ratios relies on the generosity of donors and volunteers to continue our work. Contributions of time, expertise, and financial support are crucial to sustaining our programs and expanding our reach. Whether you're an individual passionate about education, a professional in the STEM field, or a company looking to give back to the community, there are many ways to get involved and make a difference.
We are proud of the positive impact we've had on the lives of countless students, many of whom have gone on to pursue higher education and careers in STEM. By providing these young minds with the tools and opportunities they need to succeed, we are not only changing their futures but also contributing to the advancement of technology and innovation on a broader scale.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Many ways to support street children.pptxSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2024: The FAR - Federal Acquisition Regulations, Part 36
2015 dodd
1. Department of Defense
DIRECTIVE
NUMBER 8140.01
August 11, 2015
DoD CIO
SUBJECT: Cyberspace Workforce Management
References: See Enclosure 1
1. PURPOSE. This directive:
a. Reissues and renumbers DoD Directive (DoDD) 8570.01 (Reference (a)) to update and
expand established policies and assigned responsibilities for managing the DoD cyberspace
workforce.
b. Authorizes establishment of a DoD cyberspace workforce management council to ensure
that the requirements of this directive are met. The council will be comprised of representatives
from the Offices of the DoD Chief Information Officer (DoD CIO), Under Secretary of Defense
for Personnel and Readiness (USD(P&R)), Under Secretary of Defense for Policy (USD(P)),
Under Secretary of Defense for Intelligence (USD(I)), the Joint Staff, the Director, National
Security Agency/Chief, Central Security Service (DIRNSA/CHCSS), and other DoD
Components.
c. Unifies the overall cyberspace workforce and establishes specific workforce elements
(cyberspace effects, cybersecurity, and cyberspace information technology (IT)) to align, manage
and standardize cyberspace work roles, baseline qualifications, and training requirements. This
directive does not address operational employment of the work roles. Operational employment
of the cyberspace workforce will be determined by the Joint Staff, Combatant Commands, and
other DoD Components to address mission requirements.
2. APPLICABILITY. This directive applies to OSD, the Military Departments, the Office of
the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands,
the Office of the Inspector General of the Department of Defense (IG DoD), the Defense
Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred
to collectively in this directive as the “DoD Components”).
2. DoDD 8140.01, August 11, 2015
2
3. POLICY. It is DoD policy that:
a. The DoD maintains a total force management perspective to provide qualified cyberspace
government civilian and military personnel to identified and authorized positions, augmented
where appropriate by contracted services support. These personnel function as an integrated
workforce with complementary skill sets to provide an agile, flexible response to DoD
requirements.
b. The appropriate mix of military and government civilian positions and contracted support
designated to perform cyberspace work roles is determined in accordance with DoD Instruction
(DoDI) 1100.22 (Reference (b)).
c. Civilian, military, and contracted support personnel assigned to perform cyberspace work
roles must meet qualification standards established in supporting issuances, in addition to other
existing workforce qualification and training requirements assigned to billets and position
requirements (e.g., acquisition, intelligence, communications). DoD Component contracting
officials apply subpart 239.71 of the Defense Federal Acquisition Regulation Supplement
(Reference (c)) for contracted support designated to perform cyberspace workforce work roles.
d. DoD Component compliance with this directive is monitored via authoritative manpower
and personnel systems as an element of mission readiness and as a management review item.
Compliance with requirements of this directive must be included in DoD and DoD Component-
level inspection programs and readiness reporting.
e. Nothing in this directive replaces or infringes the responsibilities, functions, or authorities
of the DoD Component heads or other OSD officials as prescribed by law or Executive order,
assigned in chartering DoDDs, or detailed in other DoD policy issuances or, as applicable, in
Director of National Intelligence policy issuances.
f. All authorized users of DoD IT receive initial cybersecurity and information assurance
awareness orientation as a condition of access, and thereafter must complete annual
cybersecurity and information assurance refresher awareness.
4. RESPONSIBILITIES. See Enclosure 2.
5. RELEASABILITY. Cleared for public release. This directive is available on the Internet
from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
3. DoDD 8140.01, August 11, 2015
3
6. EFFECTIVE DATE. This directive is effective August 11, 2015.
Robert O. Work
Deputy Secretary of Defense
Enclosures
1. References
2. Responsibilities
Glossary
4. DoDD 8140.01, August 11, 2015
ENCLOSURE 14
ENCLOSURE 1
REFERENCES
(a) DoD Directive 8570.01, “Information Assurance (IA) Training, Certification, and
Workforce Management,” August 15, 2004, as amended (hereby cancelled)
(b) DoD Instruction 1100.22, “Policy and Procedures for Determining Workforce Mix,”
April 12, 2010
(c) Defense Federal Acquisition Regulation Supplement, Subpart 239.71, “Security and Privacy
for Computer Systems,” June 21, 2010, as amended
(d) DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21, 2014
(e) DoD Directive 8000.01, “Management of the Department of Defense Information
Enterprise,” February 10, 2009
(f) DoD Directive 1100.4, “Guidance for Manpower Management,” February 12, 2005
(g) DoD Manual 8910.01, Volume 1, “DoD Information Collections Manual: Procedures for
DoD Internal Information Collections,” June 30, 2014
(h) U.S. Office of Personnel Management Memorandum for Chief Human Capital Officers,
“Fact Sheet on Certification and Certificate Programs,” August 13, 2008
(i) DoD Directive 5505.13E, “DoD Executive Agent (EA) for the DoD Cyber Crime Center
(DC3),” March 1, 2010
(j) Section 1702 of Title 10, United States Code
(k) DoD Directive 5134.01, “Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)),” December 9, 2005, as amended
(l) DoD Directive 1322.18, “Military Training,” January 13, 2009
(m) DoD Instruction 3115.11, “DoD Intelligence Human Capital Management Operations,”
January 22, 2009, as amended
(n) DoD Instruction 3305.09, “DoD Cryptologic Training,” June 13, 2013
(o) DoD Directive 5111.1, “Under Secretary of Defense for Policy (USD(P)),” December 8,
1999
(p) DoD Instruction 1336.05, “Automated Extract of Active Duty Military Personnel Records,”
July 28, 2009, as amended
(q) DoD 7730.54-M, Volume 1, “Reserve Components Common Personnel Data System
(RCCPDS): Reporting Procedures,” May 25, 2011, as amended
(r) DoD Instruction 1444.02, Volume 4, “Data Submission Requirements for DoD Civilian
Personnel: Workforce and Address Dynamic Records,” November 5, 2013
(s) DoD Directive 7730.65, “Department of Defense Readiness Reporting System (DRRS),”
May 11, 2015
(t) DoD Instruction 8500.01, “Cybersecurity,” March 14, 2014
(u) Joint Publication 1-02, “Department of Defense Dictionary of Military and Associated
Terms,” current edition
(v) Committee on National Security Systems Instruction Number 4009, “National Information
Assurance (IA) Glossary,” April 26, 2010, as amended
(w) DoD Directive 5124.02, “Under Secretary of Defense for Personnel and Readiness
(USD(P&R)),” June 23, 2008
5. DoDD 8140.01, August 11, 2015
ENCLOSURE 25
ENCLOSURE 2
RESPONSIBILITIES
1. DoD CIO. In addition to responsibilities in section 9 of this enclosure, the DoD CIO:
a. Oversees management of DoD cyberspace IT and cybersecurity workforce elements of the
DoD cyberspace workforce in accordance with DoDDs 5144.02 (Reference (d)) and 8000.01
(Reference (e)).
b. In collaboration with the USD(P&R) and DoD Component heads, establishes appropriate
workforce management requirements and personnel qualifications standards for the DoD
cybersecurity and cyberspace IT workforce(s) pursuant to References (d) and (e) and in
accordance with DoDD 1100.4 (Reference (f)).
c. Collaborates with the USD(P&R), USD(P), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
d. Collaborates with the USD(P&R) and the DoD Component heads to establish metrics to
monitor and validate compliance with this directive as an element of mission readiness in
accordance with the procedures of Volume 1 of DoD Manual 8910.01 (Reference (g)).
e. Establishes criteria and processes for selecting certification programs as defined by the
Office of Personnel Management Memorandum (Reference (h)) for the cybersecurity and
cyberspace IT workforces in accordance with References (d) and (e).
f. In coordination with the CJCS, establishes academic programs at the National Defense
University’s Information Resources Management College to educate leaders in IT, information
resources management, and cybersecurity requirements and capabilities.
g. Collaborates with appropriate stakeholders to develop requirements and provide guidance
and oversight to DoD Cyber Crime Center (DC3) in support of training and qualification
development for digital forensics in accordance with DoDD 5505.13E (Reference (i)).
2. DIRECTOR, DEFENSE INFORMATION SYSTEMS AGENCY (DISA). In addition to
responsibilities in section 9 of this enclosure and under the authority, direction, and control of the
DoD CIO, the Director, DISA:
a. Provides access to current techniques, requirements, and knowledge resources to support
development of personnel performing work roles in DoD cybersecurity and cyberspace IT
workforces.
6. DoDD 8140.01, August 11, 2015
ENCLOSURE 26
b. Provides training materials, content, products, assessment tools, and methodologies
related to DoD IT and cybersecurity policies, concepts, procedures, tools, techniques, and
systems.
c. Provides shareable methodology and tools, to include timeline and implementation
guidance, to DoD Components to establish and measure effectiveness of cybersecurity awareness
and training programs.
d. Incorporates cyberspace IT workforce and cybersecurity workforce qualification and
management requirements into DoD and DoD Component inspection programs.
3. USD(AT&L). In addition to responsibilities in section 9 of this enclosure, the USD(AT&L):
a. In coordination with the DoD CIO and applicable DoD Component heads, establishes the
acquisition qualification requirements for work roles responsible for research, development, and
acquisition of DoD IT, information systems, platform IT, and cyberspace capabilities.
b. Supports integration of qualified cyberspace workforce personnel into DoD information
systems lifecycle development processes.
c. Provides guidance and oversight to the Defense Acquisition Workforce to incorporate the
requirements of this directive into contracts.
d. Establishes policies and procedures, in coordination with the USD(P&R), DoD CIO,
USD(I), USD(P), Secretaries of the Military Departments, and the CJCS, for the effective
management of the acquisition, technology, and logistics workforce supporting DoD cyberspace
programs in accordance with section 1702 of Title 10, United States Code (Reference (j)) and
DoDD 5134.01 (Reference (k)).
e. Provides direction and oversight of the Defense Acquisition University to ensure that
cybersecurity work role requirements are integrated into training, courses, and curriculum.
4. USD(P&R). In addition to the responsibilities in section 9 of this enclosure, the USD(P&R):
a. Establishes policy guidance to support military cyberspace training requirements in
accordance with DoDD 1322.18 (Reference (l)).
b. Provides, as appropriate, DoD Components with access to systems that identify and track
personnel, manpower, training, education, and qualifications to support cyberspace workforce
lifecycle management.
c. Supports the DoD Components in determining requirements for DoD military and civilian
manpower in accordance with Reference (f) and contract support needed to perform cyberspace
missions.
7. DoDD 8140.01, August 11, 2015
ENCLOSURE 27
d. Collaborates with the DoD CIO, USD(P), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
e. Supports identification of DoD Component cyberspace workforce reporting requirements.
5. USD(I). In addition to the responsibilities in section 9 of this enclosure, the USD(I):
a. Establishes and maintains workforce management requirements, qualification standards,
and certification programs for intelligence, counterintelligence (CI), security, law enforcement
(LE), sensitive activities, and other related positions and personnel required to operate in or
support the cyberspace domain. This is done in coordination with Defense intelligence, CI and
LE agencies, the Joint Staff, the Office of the USD(P&R), and the Military Departments.
b. Establishes and maintains, in coordination with the DoD CIO, appropriate workforce
management requirements and personnel qualification standards for digital forensics to support
DC3 curriculum development in accordance with Reference (i).
c. Implements this directive for personnel who support DoD intelligence, security, and LE
missions in the cyberspace domain.
d. Collaborates with the DoD CIO, USD(P&R), USD(P), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
6. DIRNSA/CHCSS. In addition to the responsibilities in section 9 of this enclosure and under
the authority, direction, and control of USD(I), the DIRNSA/CHCSS:
a. Oversees development and maintenance of standards for cryptologic work roles related to
cyberspace operations, training, and personnel certifications in accordance with DoDI 3115.11
(Reference (m)) and DoDI 3305.09 (Reference (n)).
b. Develops and provides appropriate training and education standards for DoD personnel
who perform cryptologic work roles related to cyberspace operations.
c. Collaborates with the DoD CIO, USD(P&R), USD(P), USD(I), Secretaries of the Military
Departments, and the CJCS to establish a DoD cyberspace workforce management council.
7. USD(P). In addition to the responsibilities in section 9 of this enclosure, the USD(P):
8. DoDD 8140.01, August 11, 2015
ENCLOSURE 28
a. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
b. Coordinates and maintains a cyberspace strategy and advises on implementing that
strategy in accordance with DoDD 5111.1 (Reference (o)).
c. Establishes and maintains, in coordination with the Joint Staff and Military Departments,
workforce management requirements and qualification standards for positions and personnel
required to perform cyberspace effects work roles.
d. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military
Departments, and CJCS to establish metrics for the cyberspace effects workforce to monitor and
validate compliance as an element of mission readiness.
8. IG DoD. In addition to the responsibilities in section 9 of this enclosure, the IG DoD, at his
or her discretion, establishes and leverages qualification standards for personnel supporting and
performing audits and inspections in the cyberspace domain.
9. OSD AND DoD COMPONENT HEADS. The OSD and DoD Component heads:
a. Establish, resource, implement, and assess cyberspace workforce management programs
for all DoD Component personnel in accordance with this directive.
b. In addition to DoD mandated cybersecurity awareness training, provide DoD Component-
specific cybersecurity orientation, training, awareness, and reinforcement programs to authorized
users of information systems.
c. Identify total manpower required to perform cyberspace work roles in manpower
databases in accordance with Reference (f).
d. Identify, document, track, and report qualifications for military, DoD civilian, and
contractor support personnel who perform cyberspace work roles using authoritative personnel
databases in accordance with Reference (f) and DoDI 1336.05, Volume 1 of DoD 7730.54-M,
and Volume 4 of DoDI 1444.02 (References (p), (q), and (r)).
e. Specify workforce qualification requirements in contracts that include the acquisition of
personnel and services to perform cyberspace work roles. Contractor personnel performing such
work roles must have their qualifications documented in an authoritative verification system(s) in
accordance with Reference (f).
f. Require personnel who perform cyberspace work roles to meet qualification requirements
in accordance with issuances supporting this directive.
9. DoDD 8140.01, August 11, 2015
ENCLOSURE 29
g. Provide appropriate training for personnel who conduct assessments and inspections to
ensure organizations have a compliant cyberspace workforce management program, including
the verification of workforce qualifications.
h. Incorporate the cyberspace domain and operations in professional military education.
i. Coordinate with Defense intelligence, CI, and LE agencies, the Joint Staff, Military
Departments, and the Offices of the USD(P&R) and DoD CIO on the workforce management
requirements, qualification standards, and certification programs for positions and personnel
required to operate in or support the cyberspace domain.
j. Identify, establish, resource, implement, sustain, and assess additional Component-specific
cyberspace work role training, qualification, and standards for the Component cyberspace
workforce.
k. Include unit-based reporting of cyberspace workforce readiness status in the Defense
Readiness Reporting System in accordance with DoDD 7730.65 (Reference (s)).
10. SECRETARIES OF THE MILITARY DEPARTMENTS. In addition to the responsibilities
in section 9 of this enclosure, the Secretaries of the Military Departments will collaborate with
the DoD CIO, USD(P&R), USD(I), USD(P), CJCS, and the DIRNSA/CHCSS to establish a
DoD cyberspace workforce management council.
11. SECRETARY OF THE AIR FORCE. In his or her capacity as the DoD Executive Agent
for the DC3 in accordance with Reference (j), and in addition to responsibilities in sections 9 and
10 of this enclosure, the Secretary of the Air Force, through the Director, DC3:
a. Supports development of standards for digital forensics personnel training and
qualifications.
b. Coordinates with the DoD CIO, USD(I), and Secretaries of the other Military
Departments to integrate appropriate training and education for DoD personnel who perform
digital forensics.
12. CJCS. In addition to the responsibilities in section 9 of this enclosure, the CJCS:
a. Facilitates joint force development consistent with the overall responsibility of the CJCS
to integrate cyberspace capabilities. Includes applications into strategy, policy, doctrine,
concepts of operations, education, training, and exercises for DoD joint and combined operations
in the cyberspace domain.
b. Coordinates with the DoD CIO, USD(P), USD(I), and the Secretaries of the Military
Departments on qualifications requirements for cyberspace work roles, as appropriate.
10. DoDD 8140.01, August 11, 2015
ENCLOSURE 210
c. Identifies, documents, and tracks joint positions and personnel assigned to cyberspace
workforce positions in joint manpower and personnel system(s).
d. Facilitates coordination of work roles requirements assigned to positions at Combatant
Commands and their supporting Military Services when operating in the cyberspace domain.
e. Collaborates with the DoD CIO, USD(P&R), USD(I), USD(P), Secretaries of the Military
Departments and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management
council.
f. Provides access to current techniques, requirements, and knowledge resources to support
development of personnel performing work roles in DoD cyberspace effects, cybersecurity, and
cyberspace IT workforces.
g. Provides training materials, content, products, assessment tools, and methodologies
related to DoD cyberspace effects, cybersecurity, and cyberspace IT policies, concepts,
procedures, tools, techniques, and systems.
11. DoDD 8140.01, August 11, 2015
GLOSSARY11
GLOSSARY
PART I. ABBREVIATIONS AND ACRONYMS
CI counterintelligence
CJCS Chairman of the Joint Chiefs of Staff
DC3 DoD Cyber Crime Center
DIRNSA/CHCSS Director, National Security Agency/Chief, Central Security Service
DISA Defense Information Systems Agency
DoD CIO DoD Chief Information Officer
DoDD DoD Directive
DoDI DoD Instruction
IG DoD Inspector General Department of Defense
IT information technology
USD(AT&L) Under Secretary of Defense for Acquisition, Technology, and Logistics
USD(I) Under Secretary of Defense for Intelligence
USD(P) Under Secretary of Defense for Policy
USD(P&R) Under Secretary of Defense for Personnel and Readiness
PART II. DEFINITIONS
Unless otherwise noted, these terms and their definitions are for the purposes of this directive.
authorized user. Defined in DoDI 8500.01 (Reference (t)).
certification. Defined in Reference (h).
cybersecurity. Defined in Reference (t).
cyberspace. Defined in Joint Publication 1-02 (Reference (u)).
cyberspace operations. Defined in Reference (u).
cyberspace workforce. Personnel who build, secure, operate, defend, and protect DoD and U.S.
cyberspace resources; conduct related intelligence activities; enable future operations; and
12. DoDD 8140.01, August 11, 2015
GLOSSARY12
project power in or through cyberspace. It is comprised of personnel assigned to the areas of
cyberspace effects, cybersecurity, cyberspace IT, and portions of the Intelligence workforces:
cybersecurity workforce. Personnel who secure, defend, and preserve data, networks, net-
centric capabilities, and other designated systems by ensuring appropriate security controls and
measures are in place, and taking internal defense actions. This includes access to system
controls, monitoring, administration, and integration of cybersecurity into all aspects of
engineering and acquisition of cyberspace capabilities.
cyberspace effects workforce. Personnel who plan, support, and execute cyberspace
capabilities where the primary purpose is to externally defend or conduct force projection in or
through cyberspace.
cyberspace IT workforce. Personnel who design, build, configure, operate, and maintain IT,
networks, and capabilities. This includes actions to prioritize portfolio investments; architect,
engineer, acquire, implement, evaluate, and dispose of IT as well as information resource
management; and the management, storage, transmission, and display of data and information.
intelligence workforce (cyberspace). Personnel who collect, process, analyze, and
disseminate information from all sources of intelligence on foreign actors’ cyber programs,
intentions, capabilities, research and development, and operational activities.
information assurance. Defined in Reference (u).
information system. Defined in Reference (v).
IT. Defined in Reference (e).
platform IT. Defined in Reference (t).
total force. Defined in Reference (w).
work role. The knowledge, skills, and abilities that a person must have to perform a set of
functions or tasks.