SlideShare a Scribd company logo
1 of 13
3rd Annual
Doing Business
With
DOD & The Intel Community
November 27, 2018
November 27, 2018
JSchaus & Associates www.JenniferSchaus.com
Washington, DC 202-365-0598
Professional Services for Federal Contractors
- GSA Schedules;
- Proposal Writing;
- Pricing;
- Contract Admin & Compliance
3rd Annual
Doing Business
With
DOD & The Intel Community
November 27, 2018
Understanding and Capitalizing on DoD Cyber Strategy
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
STRATEGIC COMPETITION IN CYBERSPACE: IMPERATIVES
โ€ข Ensure the U.S. militaryโ€™s ability to fight and win wars in any domain, including
cyberspace
โ€ข Preempt, defeat, or deter malicious cyber activity targeting U.S. critical
infrastructure that could cause a significant cyber incident
โ€ข Strengthen cyber capacity, expand combined cyberspace operations, and
increase bi-directional information sharing
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
DOD CYBERSPACE OBJECTIVES
โ€ข Ensure the Joint Force can operate in a contested cyberspace environment
โ€ข Conduct cyberspace operations that enhance U.S. military advantages
โ€ข Defend U.S. critical infrastructure from malicious cyber activity
โ€ข Secure DoD information and systems against malicious cyber activity, including
DoD information on non-DoD-owned networks
โ€ข Expand cyber cooperation with interagency, industry, and international partners
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
STRATEGIC APPROACH
โ€ข Build a more lethal joint force: Accelerate cyber capability development, foster
agility, leverage automation and data analysis, employ and adapt COTS products
โ€ข Compete and deter in Cyberspace: Deter malicious cyber activities, persistently
contest malicious cyber activity, increase critical infrastructure resilience
โ€ข Strengthen alliances and attract new partnerships: Build trusted private sector
partnerships, operationalize international partnerships, reinforce norms
โ€ข Reform the department: Cyber culture, cybersecurity accountability, flexible
materiel solutions, crowd-sourced vulnerability identification, cultivate talent
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
Military
Applications
of Cyber Ops
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
Approaches to
Cyber Attack
Defense and
Mitigation
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
Cyber-Electronic
Warfare
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
CYBER EXPLOITATION OPERATIONS
โ€ข Human augmentation and replacement: AI, machine
learning, algorithmic data analytics, autonomy
โ€ข Human-Machine Teaming: Augmented Reality,
Human-Machine Interfaces, C2/Battle management and
decision execution, Virtual Reality training & exercising
โ€ข EM Spectrum Operations (EMSO): EMSO C2/BM,
EW-Cyber Ops, and Spectrum Agility and Management
โ€ข Process Innovation: Additive manufacturing, business, logistics, sustainment
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
INSIGHTS
โ€ข DoD seeks to control and exploit cyberspace to achieve US objectives
โ€ข Cyber critical for multi-domain opsโ€”not just cyber defense and offense
โ€ข Other than security and intel, DoD cyber requirements are not well defined
โ€ข DoD operators value mission effectivenessโ€”resiliency key but not emphasized
โ€ข Cyber-physical systems need same prominence as information systems
โ€ข Business risk management approaches apply to DoD cyber protection strategies
โ€ข Must close gaps between DoD cyber users, requirement developers, acquirers
3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018
โ€˜
Understanding and Capitalizing on DoD Cyber Strategy
THANK YOU
Lt General (Ret) Bob Elder, D.Engr
Research Professor, George Mason,
NDIA Cyber Augmented Ops Chair
703-873-7592 (Direct Phone)
relder@gmu.edu
https://www.ndia.org/divisions/
cyber-augmented-operations
November 27, 2018
JSchaus & Associates www.JenniferSchaus.com
Washington, DC 202-365-0598
Professional Services for Federal Contractors
- GSA Schedules;
- Proposal Writing;
- Pricing;
- Contract Admin & Compliance

More Related Content

What's hot

What's hot (18)

International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020)International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020)
ย 
2017 Smart Infrastructure Market Report
2017 Smart Infrastructure Market Report2017 Smart Infrastructure Market Report
2017 Smart Infrastructure Market Report
ย 
Healthcare Blockchain Technology Landscape
Healthcare Blockchain Technology LandscapeHealthcare Blockchain Technology Landscape
Healthcare Blockchain Technology Landscape
ย 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ย 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
ย 
International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020)International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020)
ย 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ย 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
ย 
Green it and cloud computing
Green it and cloud computingGreen it and cloud computing
Green it and cloud computing
ย 
Call for participation --5th international conference on software security (...
Call for participation  --5th international conference on software security (...Call for participation  --5th international conference on software security (...
Call for participation --5th international conference on software security (...
ย 
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ย 
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
Submit Your Research Articles - 3rd International Conference on Cloud, Big Da...
ย 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
ย 
Call for Papers - 3rd International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 3rd International Conference on Cloud, Big Data and IoT (CB...Call for Papers - 3rd International Conference on Cloud, Big Data and IoT (CB...
Call for Papers - 3rd International Conference on Cloud, Big Data and IoT (CB...
ย 
Digital Economy and Investment Policy
Digital Economy and Investment Policy Digital Economy and Investment Policy
Digital Economy and Investment Policy
ย 
Call for papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
Call for papers - International Conference on Cloud, Big Data and IoT (CBIoT ...Call for papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
Call for papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
ย 
Call for Papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
Call for Papers - International Conference on Cloud, Big Data and IoT (CBIoT ...Call for Papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
Call for Papers - International Conference on Cloud, Big Data and IoT (CBIoT ...
ย 
International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020) International Conference on Cloud, Big Data and IoT (CBIoT 2020)
International Conference on Cloud, Big Data and IoT (CBIoT 2020)
ย 

Similar to FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides

Tecnologias Estratรฉgicas
Tecnologias Estratรฉgicas Tecnologias Estratรฉgicas
Tecnologias Estratรฉgicas
sucesu68
ย 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
ย 
exploit_big_data_v1
exploit_big_data_v1exploit_big_data_v1
exploit_big_data_v1
Attila Barta
ย 
Rachel Resume
Rachel ResumeRachel Resume
Rachel Resume
Rachel Adamick
ย 

Similar to FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides (20)

FED GOV CON - DOD & INTEL Conference
FED GOV CON - DOD & INTEL ConferenceFED GOV CON - DOD & INTEL Conference
FED GOV CON - DOD & INTEL Conference
ย 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
ย 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
ย 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
ย 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
ย 
Strategic and economic drivers of governance
Strategic and economic drivers of governanceStrategic and economic drivers of governance
Strategic and economic drivers of governance
ย 
Discover - Emerging Cloud Technologies
Discover - Emerging Cloud TechnologiesDiscover - Emerging Cloud Technologies
Discover - Emerging Cloud Technologies
ย 
Modernizing Your Data Infrastructure
Modernizing Your Data InfrastructureModernizing Your Data Infrastructure
Modernizing Your Data Infrastructure
ย 
Tecnologias Estratรฉgicas
Tecnologias Estratรฉgicas Tecnologias Estratรฉgicas
Tecnologias Estratรฉgicas
ย 
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial Domain
ย 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
ย 
Entry Points โ€“ How to Get Rolling with Big Data Analytics
Entry Points โ€“ How to Get Rolling with Big Data AnalyticsEntry Points โ€“ How to Get Rolling with Big Data Analytics
Entry Points โ€“ How to Get Rolling with Big Data Analytics
ย 
Women in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial LandscapeWomen in Fintech: Evolving the Financial Landscape
Women in Fintech: Evolving the Financial Landscape
ย 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis Survey
ย 
5 g and local fibre programme inca presentation
5 g and local fibre programme   inca presentation5 g and local fibre programme   inca presentation
5 g and local fibre programme inca presentation
ย 
August 2017 digital realty company overview
August 2017 digital realty company overview August 2017 digital realty company overview
August 2017 digital realty company overview
ย 
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
ย 
exploit_big_data_v1
exploit_big_data_v1exploit_big_data_v1
exploit_big_data_v1
ย 
Rachel Resume
Rachel ResumeRachel Resume
Rachel Resume
ย 
AIIM Webinar: Defuse the Ticking Time Bomb of Data by Leveraging Smart Techno...
AIIM Webinar: Defuse the Ticking Time Bomb of Data by Leveraging Smart Techno...AIIM Webinar: Defuse the Ticking Time Bomb of Data by Leveraging Smart Techno...
AIIM Webinar: Defuse the Ticking Time Bomb of Data by Leveraging Smart Techno...
ย 

More from JSchaus & Associates

More from JSchaus & Associates (20)

2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
ย 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
ย 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
ย 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
ย 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
ย 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
ย 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
ย 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
ย 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
ย 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
ย 
2024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 192024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 19
ย 
2024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 222024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 22
ย 
GSA Schedules - Requirements And Reality
GSA Schedules - Requirements And  RealityGSA Schedules - Requirements And  Reality
GSA Schedules - Requirements And Reality
ย 
2024: The FAR, Federal Acquisition Regulations - Part 18
2024: The FAR, Federal Acquisition Regulations - Part 182024: The FAR, Federal Acquisition Regulations - Part 18
2024: The FAR, Federal Acquisition Regulations - Part 18
ย 
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
ย 
2024: The FAR, Federal Acquisition Regulations - Part 17
2024: The FAR, Federal Acquisition Regulations - Part 172024: The FAR, Federal Acquisition Regulations - Part 17
2024: The FAR, Federal Acquisition Regulations - Part 17
ย 
2024: The FAR, Federal Acquisition Regulations - Part 16
2024: The FAR, Federal Acquisition Regulations - Part 162024: The FAR, Federal Acquisition Regulations - Part 16
2024: The FAR, Federal Acquisition Regulations - Part 16
ย 
2024: The FAR, Federal Acquisition Regulations - Part 15
2024: The FAR, Federal Acquisition Regulations - Part 152024: The FAR, Federal Acquisition Regulations - Part 15
2024: The FAR, Federal Acquisition Regulations - Part 15
ย 
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
ย 
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
ย 

Recently uploaded

celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
Call Girls in Nagpur High Profile
ย 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
SUHANI PANDEY
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
Call Girls in Nagpur High Profile
ย 
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
SUHANI PANDEY
ย 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
SUHANI PANDEY
ย 
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 

Recently uploaded (20)

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
ย 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
ย 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
ย 
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
ย 
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts โ˜Ž๏ธ8617370543 Starting From 5K to 25K ...
ย 
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'IsraรซlAntisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
ย 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
ย 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
ย 
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
ย 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
ย 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
ย 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
ย 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
ย 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
ย 
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
ย 

FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides

  • 1. 3rd Annual Doing Business With DOD & The Intel Community November 27, 2018
  • 2. November 27, 2018 JSchaus & Associates www.JenniferSchaus.com Washington, DC 202-365-0598 Professional Services for Federal Contractors - GSA Schedules; - Proposal Writing; - Pricing; - Contract Admin & Compliance
  • 3. 3rd Annual Doing Business With DOD & The Intel Community November 27, 2018 Understanding and Capitalizing on DoD Cyber Strategy
  • 4. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy STRATEGIC COMPETITION IN CYBERSPACE: IMPERATIVES โ€ข Ensure the U.S. militaryโ€™s ability to fight and win wars in any domain, including cyberspace โ€ข Preempt, defeat, or deter malicious cyber activity targeting U.S. critical infrastructure that could cause a significant cyber incident โ€ข Strengthen cyber capacity, expand combined cyberspace operations, and increase bi-directional information sharing
  • 5. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy DOD CYBERSPACE OBJECTIVES โ€ข Ensure the Joint Force can operate in a contested cyberspace environment โ€ข Conduct cyberspace operations that enhance U.S. military advantages โ€ข Defend U.S. critical infrastructure from malicious cyber activity โ€ข Secure DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks โ€ข Expand cyber cooperation with interagency, industry, and international partners
  • 6. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy STRATEGIC APPROACH โ€ข Build a more lethal joint force: Accelerate cyber capability development, foster agility, leverage automation and data analysis, employ and adapt COTS products โ€ข Compete and deter in Cyberspace: Deter malicious cyber activities, persistently contest malicious cyber activity, increase critical infrastructure resilience โ€ข Strengthen alliances and attract new partnerships: Build trusted private sector partnerships, operationalize international partnerships, reinforce norms โ€ข Reform the department: Cyber culture, cybersecurity accountability, flexible materiel solutions, crowd-sourced vulnerability identification, cultivate talent
  • 7. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy Military Applications of Cyber Ops
  • 8. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy Approaches to Cyber Attack Defense and Mitigation
  • 9. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy Cyber-Electronic Warfare
  • 10. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy CYBER EXPLOITATION OPERATIONS โ€ข Human augmentation and replacement: AI, machine learning, algorithmic data analytics, autonomy โ€ข Human-Machine Teaming: Augmented Reality, Human-Machine Interfaces, C2/Battle management and decision execution, Virtual Reality training & exercising โ€ข EM Spectrum Operations (EMSO): EMSO C2/BM, EW-Cyber Ops, and Spectrum Agility and Management โ€ข Process Innovation: Additive manufacturing, business, logistics, sustainment
  • 11. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy INSIGHTS โ€ข DoD seeks to control and exploit cyberspace to achieve US objectives โ€ข Cyber critical for multi-domain opsโ€”not just cyber defense and offense โ€ข Other than security and intel, DoD cyber requirements are not well defined โ€ข DoD operators value mission effectivenessโ€”resiliency key but not emphasized โ€ข Cyber-physical systems need same prominence as information systems โ€ข Business risk management approaches apply to DoD cyber protection strategies โ€ข Must close gaps between DoD cyber users, requirement developers, acquirers
  • 12. 3rd Annual Doing Business With DOD & The Intel Community โ€“ NOV 2018 โ€˜ Understanding and Capitalizing on DoD Cyber Strategy THANK YOU Lt General (Ret) Bob Elder, D.Engr Research Professor, George Mason, NDIA Cyber Augmented Ops Chair 703-873-7592 (Direct Phone) relder@gmu.edu https://www.ndia.org/divisions/ cyber-augmented-operations
  • 13. November 27, 2018 JSchaus & Associates www.JenniferSchaus.com Washington, DC 202-365-0598 Professional Services for Federal Contractors - GSA Schedules; - Proposal Writing; - Pricing; - Contract Admin & Compliance