SlideShare a Scribd company logo
OFFICIAL
Future Requirements
Defensive Cyber
Industry Update
January 2022
We recognise that it is helpful to regularly signpost our potential future requirements, our plans
in terms of routes to market, our projected timelines and other information that can help you,
our supplier base, decide which projects and programs you will bid into.
However please be aware that the information included in this update is our best estimation of
future requirements, timelines and delivery routes.
Any or all of these elements could change, including but not limited to withdrawal of
requirements, changes to routes to market, procurement timelines and contract durations.
Thank you for you continued engagement.
The Defence Digital Commercial Team (Cyber)
2
FORWARD VIEW: IMPORTANT NOTES
The Defensive Cyber
Programmes are:
• Defensive Cyber Operations
(DCO) Programme
• Cyber Resilience
Programme (CRP)
Between them they address
cyber risk across the MOD. They
will also help deliver the secure
cyber foundations needed for the
Digital Backbone, set out in the
Digital Strategy for Defence.
OFFICIAL
National Institute of Standards and Technology
(NIST) Cyber Security Framework
3
Cyber Resilience Programme
Themes and Projects
Awareness,
Behaviour &
Culture
Cyber Confident
Behavioural
Testing
Secure Digital
Foundations
Protective Tooling
Active Cyber
Defence
Network Asset
Visibility
Patch Management
Resilient by
Design
Secure by Design
Secure in Depth
Policy &
Architecture
Defensive Cyber
Futures
Cyber Attack
Recovery Planning
NIST Compliance
Assessments
Supplier Security
Audit
Cyber
Vulnerability
Fixes
Cyber Risk
Interventions
Vulnerability
Research
Secure at Reach
OFFICIAL 4
OFFICIAL
OFFICIAL
5
Theme Project Procurement Title Duration Yrs. Route to Market ITT Release Contract Start
Cyber Confident
Cyber awareness Training, Family & Dependent
days and Deployment Briefing
3 months TBC Jan-22 Feb-22
Behavioural Testing Behaviour/ Media 2+1 CCS Jan 22 Apr-22
Training Training 2+1 CCS Jan 22 Apr 22
Cyber Confident
Enduring Cyber awareness Training, Family &
Dependent days and Deployment Briefing
2 TBC TBC TBC
Behavioural Intervention
USB Intervention – Hardware & Support Contract
TBC TBC TBC TBC
Enterprise Patching Enterprise Patching TBC DOS 5 Jan-22 Mar-22
Patch Management
Patch acquisition and Delivery Service (PADS)
(Modernising Patching) BETA Phase
3 DOS 5 Mar-22 May-22
Network Asset Visibility (NAV) Network Asset Visibility (NAV) 3 TBC Mar-22 Jul-22
Secure in Depth Secure in Depth Resource 6 + 3 months DOS 5 Jan-22 Feb-22
Cyber Attack Recover Planning
(CARP)
Cyber Attack Recover Planning (CARP) TBC TBC TBC Mar-22
Supplier Security Audit Audit Delivery 2+1 CCS Jan 22 Apr-22
“All Resilient by Design
projects”
Support Services Group 2+1 DOS 5 Jul-22 Oct-22
Defensive Cyber Futures Benchmarking 3 TBC Aug-22 Oct-22
Vulnerability Research Bug Bounty Service 3 CCS Jan-22 Apr-22
Secure @ Reach Mobile Device Mgmt. 3 TBC Sep-22 Oct-22
Cyber Resilience Programme
Upcoming Procurements
Cyber Threat
Intelligence
Cyber Vulnerability
Investigations
Segregated Network
DCC in Complex
Environments (DICE)
Defensive Cyber
Capability (DDC)
Core
Mission
Configurable
(deployed) DCC
Cyber Security
Operations
Capability (CSOC)
18 functional
areas
Cyber Mission
Data
Enrichment and
Sensing
Project SHUKRA
Tradecraft
Individual Cyber
Training
Environment
Collective Cyber
Training
Environment
6
OFFICIAL
OFFICIAL 7
Theme Project Procurement Title Expected Route to Market Expected Date to Market
Cyber Vulnerability Investigations (CVI)
Cyber Vulnerability Investigations (CVI) Management Unit
(CMU)
CSS3 ITT Issued Dec-21
Defensive Cyber Capability (DDC) Core
DCO Cyber Situational Awareness Fusion Architecture
(CySAFA3) (2022-2026)
Competition ITT Issued Dec-21
N/A DCO CSS – Close Support Partner (2021-2023) DOS ITT Issued Jan-22
Project Shukra DCO SHUKRA – Managed Training Service CSS3 Jan-22
Project Shukra DCO SHUKRA CVLE (Cyber Virtual Learning Environment) DOS Jan-22
Cyber Threat Intelligence DCO Threat Intelligence Feeds TePAS Feb-22
Defensive Cyber Capability (DDC) Core DCO Phase 13 Bill of Materials TePAS Q1 2022
Cyber Vulnerability Investigations (CVI) DCO CVI Investigators (2021-2023) CSS3 Q1 2022
Enrichment and Sensing Corelight Licence G-Cloud Q1 2022
Enrichment and Sensing Elastic Licence G-Cloud Q1 2022
Enrichment and Sensing Lumeta Licence G-Cloud Q1 2022
Defensive Cyber Capability (DDC) Core DCO Phase 14 Bill of Materials TePAS Q2 2022
Defensive Cyber Capability (DDC) Core DCO Platform as a Service – Core UK (2022-2024) 2+1+1 Tech Services 3 Summer 2022
Defensive Cyber Capability (DDC) Core DCO Facilities as a Service (2022-2024) Crown Hosting Jan-23
Defensive Cyber Capability (DDC) Core DCO ISOPODS TBC TBC
Defensive Cyber Capability (DDC) Core DCO Phase 15 Bill of Materials TePAS TBC
Cyber Mission Data (CMD) DCO Cyber Mission Data (CMD) – Specialists (Pod 2) DOS TBC
Defensive Cyber Operations Programme
Upcoming Procurements

More Related Content

Similar to cyber defense.pptx

Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
Government Technology and Services Coalition
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-en
KBIZEAU
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
ThousandEyes
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Ns3Edu
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
ICS
 
11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...
ijccsa
 
Cyber Security Management.pdf
Cyber Security Management.pdfCyber Security Management.pdf
Cyber Security Management.pdf
Robert Kloots
 
Definition of project profiles to streamline MBSE deployment efforts
Definition of project profiles to streamline MBSE deployment effortsDefinition of project profiles to streamline MBSE deployment efforts
Definition of project profiles to streamline MBSE deployment efforts
Obeo
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Ulrich Seldeslachts
 
Public clouds - tasty but scary
Public clouds - tasty but scaryPublic clouds - tasty but scary
Public clouds - tasty but scary
Vsevolod Shabad
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ijccsa
 
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMSCLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
IJNSA Journal
 
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
ijccsa
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
Amazon Web Services
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
Priyanka Aash
 
Advanced Work Packaging - CCT Solutions at a Glance
Advanced Work Packaging - CCT Solutions at a GlanceAdvanced Work Packaging - CCT Solutions at a Glance
Advanced Work Packaging - CCT Solutions at a Glance
CCT International
 

Similar to cyber defense.pptx (20)

Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-en
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...
 
Cyber Security Management.pdf
Cyber Security Management.pdfCyber Security Management.pdf
Cyber Security Management.pdf
 
Definition of project profiles to streamline MBSE deployment efforts
Definition of project profiles to streamline MBSE deployment effortsDefinition of project profiles to streamline MBSE deployment efforts
Definition of project profiles to streamline MBSE deployment efforts
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Public clouds - tasty but scary
Public clouds - tasty but scaryPublic clouds - tasty but scary
Public clouds - tasty but scary
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMSCLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
 
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
3rd International Conference on Cloud Computing, Security and Blockchain (CLS...
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
 
Advanced Work Packaging - CCT Solutions at a Glance
Advanced Work Packaging - CCT Solutions at a GlanceAdvanced Work Packaging - CCT Solutions at a Glance
Advanced Work Packaging - CCT Solutions at a Glance
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

cyber defense.pptx

  • 2. We recognise that it is helpful to regularly signpost our potential future requirements, our plans in terms of routes to market, our projected timelines and other information that can help you, our supplier base, decide which projects and programs you will bid into. However please be aware that the information included in this update is our best estimation of future requirements, timelines and delivery routes. Any or all of these elements could change, including but not limited to withdrawal of requirements, changes to routes to market, procurement timelines and contract durations. Thank you for you continued engagement. The Defence Digital Commercial Team (Cyber) 2 FORWARD VIEW: IMPORTANT NOTES
  • 3. The Defensive Cyber Programmes are: • Defensive Cyber Operations (DCO) Programme • Cyber Resilience Programme (CRP) Between them they address cyber risk across the MOD. They will also help deliver the secure cyber foundations needed for the Digital Backbone, set out in the Digital Strategy for Defence. OFFICIAL National Institute of Standards and Technology (NIST) Cyber Security Framework 3
  • 4. Cyber Resilience Programme Themes and Projects Awareness, Behaviour & Culture Cyber Confident Behavioural Testing Secure Digital Foundations Protective Tooling Active Cyber Defence Network Asset Visibility Patch Management Resilient by Design Secure by Design Secure in Depth Policy & Architecture Defensive Cyber Futures Cyber Attack Recovery Planning NIST Compliance Assessments Supplier Security Audit Cyber Vulnerability Fixes Cyber Risk Interventions Vulnerability Research Secure at Reach OFFICIAL 4
  • 5. OFFICIAL OFFICIAL 5 Theme Project Procurement Title Duration Yrs. Route to Market ITT Release Contract Start Cyber Confident Cyber awareness Training, Family & Dependent days and Deployment Briefing 3 months TBC Jan-22 Feb-22 Behavioural Testing Behaviour/ Media 2+1 CCS Jan 22 Apr-22 Training Training 2+1 CCS Jan 22 Apr 22 Cyber Confident Enduring Cyber awareness Training, Family & Dependent days and Deployment Briefing 2 TBC TBC TBC Behavioural Intervention USB Intervention – Hardware & Support Contract TBC TBC TBC TBC Enterprise Patching Enterprise Patching TBC DOS 5 Jan-22 Mar-22 Patch Management Patch acquisition and Delivery Service (PADS) (Modernising Patching) BETA Phase 3 DOS 5 Mar-22 May-22 Network Asset Visibility (NAV) Network Asset Visibility (NAV) 3 TBC Mar-22 Jul-22 Secure in Depth Secure in Depth Resource 6 + 3 months DOS 5 Jan-22 Feb-22 Cyber Attack Recover Planning (CARP) Cyber Attack Recover Planning (CARP) TBC TBC TBC Mar-22 Supplier Security Audit Audit Delivery 2+1 CCS Jan 22 Apr-22 “All Resilient by Design projects” Support Services Group 2+1 DOS 5 Jul-22 Oct-22 Defensive Cyber Futures Benchmarking 3 TBC Aug-22 Oct-22 Vulnerability Research Bug Bounty Service 3 CCS Jan-22 Apr-22 Secure @ Reach Mobile Device Mgmt. 3 TBC Sep-22 Oct-22 Cyber Resilience Programme Upcoming Procurements
  • 6. Cyber Threat Intelligence Cyber Vulnerability Investigations Segregated Network DCC in Complex Environments (DICE) Defensive Cyber Capability (DDC) Core Mission Configurable (deployed) DCC Cyber Security Operations Capability (CSOC) 18 functional areas Cyber Mission Data Enrichment and Sensing Project SHUKRA Tradecraft Individual Cyber Training Environment Collective Cyber Training Environment 6 OFFICIAL
  • 7. OFFICIAL 7 Theme Project Procurement Title Expected Route to Market Expected Date to Market Cyber Vulnerability Investigations (CVI) Cyber Vulnerability Investigations (CVI) Management Unit (CMU) CSS3 ITT Issued Dec-21 Defensive Cyber Capability (DDC) Core DCO Cyber Situational Awareness Fusion Architecture (CySAFA3) (2022-2026) Competition ITT Issued Dec-21 N/A DCO CSS – Close Support Partner (2021-2023) DOS ITT Issued Jan-22 Project Shukra DCO SHUKRA – Managed Training Service CSS3 Jan-22 Project Shukra DCO SHUKRA CVLE (Cyber Virtual Learning Environment) DOS Jan-22 Cyber Threat Intelligence DCO Threat Intelligence Feeds TePAS Feb-22 Defensive Cyber Capability (DDC) Core DCO Phase 13 Bill of Materials TePAS Q1 2022 Cyber Vulnerability Investigations (CVI) DCO CVI Investigators (2021-2023) CSS3 Q1 2022 Enrichment and Sensing Corelight Licence G-Cloud Q1 2022 Enrichment and Sensing Elastic Licence G-Cloud Q1 2022 Enrichment and Sensing Lumeta Licence G-Cloud Q1 2022 Defensive Cyber Capability (DDC) Core DCO Phase 14 Bill of Materials TePAS Q2 2022 Defensive Cyber Capability (DDC) Core DCO Platform as a Service – Core UK (2022-2024) 2+1+1 Tech Services 3 Summer 2022 Defensive Cyber Capability (DDC) Core DCO Facilities as a Service (2022-2024) Crown Hosting Jan-23 Defensive Cyber Capability (DDC) Core DCO ISOPODS TBC TBC Defensive Cyber Capability (DDC) Core DCO Phase 15 Bill of Materials TePAS TBC Cyber Mission Data (CMD) DCO Cyber Mission Data (CMD) – Specialists (Pod 2) DOS TBC Defensive Cyber Operations Programme Upcoming Procurements