SlideShare a Scribd company logo
1 of 7
Practical Approaches to Address
Government Contracting Problems
John M. Gilligan
Defense Acquisition University
ISA 320
Common Government Contracting
Problems
• Source Selection takes too long and costs too much
money
– Too many bidders
– Too much calendar time and costs too much
• Difficulty in locking down requirements
• Fear of protests limits government-industry
interaction and drives up acquisition costs
• Failure to get innovative or cost saving ideas once on
contract
• Too few and inexperienced acquisition staff
2
Problem: Source Selection takes too long
and costs too much money
Best Practices:
• Rapid down selection of prospective offerors
• Lock down (and publish) contract award date;
scope source selection tasks to fit schedule
• Use oral proposals with real time Q&A of
bidding team
• Limit emphasis on out-year pricing
Objective of Source Selection is to pick a partner not to get a
perfect contract (which will change as soon as it is signed). 3
Problem: Difficulty in locking down
requirements
• Best practices:
– Promote extensive industry dialogue prior to RFP
using interactive group sessions regarding contract
structure, evaluation criteria, general solution
approach
– Field evolving solution using “Time Box”
approach—requirements scoped to accommodate
fixed time and costs
Open dialogue between developer and (real) users and
iterative short duration projects 4
Problem: Fear of protests limits
government-industry interaction
• Note: Most protests due to poor
communication
• Best practice: Improve Communication
1. Stick to published process and timing
2. Keep industry informed of any delay or change
realizing that every change has a (big) cost to
industry
3. Non Select Debriefs done on contractor site with
senior management present
Government has significant control over the potential for protest!5
Cost growth and failure to get innovative
or cost saving ideas once on contract
• Use significant contract incentives (e.g., award
fee outside normal fee) to motivate continued
innovation
• Understand and manage program momentum
as way to reduce overall program cost
Industry only has so many “A” teams;
“A” teams are deployed based on ROI.
6
Problem: Too Few & Inexperienced
Acquisition Staff
• Best practices:
– Use collaboration and on-line support/training to better
leverage limited expertise
– Convene government-industry acquisition
strategy/advisory panels early in the process
– Don’t try to put all terms/performance parameters in
“concrete” at the start of the contract.
Keep it simple and commit to small increments--
reduces risk and increases likelihood of success
7

More Related Content

Viewers also liked

A case study the objective of the national skills strategy to encourage entre...
A case study the objective of the national skills strategy to encourage entre...A case study the objective of the national skills strategy to encourage entre...
A case study the objective of the national skills strategy to encourage entre...Alexander Decker
 
Narrative report danna
Narrative report dannaNarrative report danna
Narrative report dannaMa.Danna Inigo
 
Ojt narrative report - an example
Ojt  narrative report - an exampleOjt  narrative report - an example
Ojt narrative report - an exampleEnzo Engada
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsLouie Medinaceli
 
Narrative report danna
Narrative report dannaNarrative report danna
Narrative report dannaMa.Danna Inigo
 
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoOn the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoSheenbie Palado
 
Narrative report in ojt
Narrative report in ojtNarrative report in ojt
Narrative report in ojtFate Capa
 

Viewers also liked (10)

A case study the objective of the national skills strategy to encourage entre...
A case study the objective of the national skills strategy to encourage entre...A case study the objective of the national skills strategy to encourage entre...
A case study the objective of the national skills strategy to encourage entre...
 
A g
A gA g
A g
 
Narrative report danna
Narrative report dannaNarrative report danna
Narrative report danna
 
Ojt narrative report - an example
Ojt  narrative report - an exampleOjt  narrative report - an example
Ojt narrative report - an example
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problems
 
Narrative report danna
Narrative report dannaNarrative report danna
Narrative report danna
 
Ojt Narrative Report
Ojt Narrative ReportOjt Narrative Report
Ojt Narrative Report
 
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoOn the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
 
Narrative report in ojt
Narrative report in ojtNarrative report in ojt
Narrative report in ojt
 
How to write a statement problem
How to write a statement problemHow to write a statement problem
How to write a statement problem
 

Similar to Practical approaches to address government contracting problems

ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)
 ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE) ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)
ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)OECD Governance
 
EBN Forum Sept 2016 A_Better_Selection_Presentation
EBN Forum Sept 2016 A_Better_Selection_PresentationEBN Forum Sept 2016 A_Better_Selection_Presentation
EBN Forum Sept 2016 A_Better_Selection_PresentationMatt Gabrielson
 
Group 2 six myths of product development final
Group 2 six myths of product development finalGroup 2 six myths of product development final
Group 2 six myths of product development finalCRISIL Limited
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsPaul Kuiken
 
IT Operations Consulting
IT Operations Consulting  IT Operations Consulting
IT Operations Consulting Anubhav Lal
 
Procurement ManagementImportance of Project Procurem
Procurement ManagementImportance of Project ProcuremProcurement ManagementImportance of Project Procurem
Procurement ManagementImportance of Project ProcuremDaliaCulbertson719
 
Tech connect fall 2015 value proposition to encouraging adoption
Tech connect fall 2015   value proposition to encouraging adoption Tech connect fall 2015   value proposition to encouraging adoption
Tech connect fall 2015 value proposition to encouraging adoption Lassonde School of Engineering
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzImran Hussain Khan
 
Executing the Project (1).pdf
Executing the Project (1).pdfExecuting the Project (1).pdf
Executing the Project (1).pdfAkshithKota
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeAdil Mehmoood
 
qLure The TIGER_Module handout.pptx
qLure The TIGER_Module handout.pptxqLure The TIGER_Module handout.pptx
qLure The TIGER_Module handout.pptxAnonymoushAiENTeyt
 
Michele A. Kande Ppt
Michele A. Kande PptMichele A. Kande Ppt
Michele A. Kande Pptmkande
 
3 developing project proposals
3 developing project proposals3 developing project proposals
3 developing project proposalsDaw Juguilon
 
Competition scope, competition eligibility conditions and application process...
Competition scope, competition eligibility conditions and application process...Competition scope, competition eligibility conditions and application process...
Competition scope, competition eligibility conditions and application process...KTN
 
How to enter the US & European Generic Pharmaceutical markets
How to enter the US & European Generic Pharmaceutical marketsHow to enter the US & European Generic Pharmaceutical markets
How to enter the US & European Generic Pharmaceutical markets✪ Asa Cox (ThePharmaPartner)
 

Similar to Practical approaches to address government contracting problems (20)

Contract Negotiations
Contract NegotiationsContract Negotiations
Contract Negotiations
 
ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)
 ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE) ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)
ECI in Sweden - A. Kadefors, KTH Royal Institute of Technology, Stockholm (SE)
 
EBN Forum Sept 2016 A_Better_Selection_Presentation
EBN Forum Sept 2016 A_Better_Selection_PresentationEBN Forum Sept 2016 A_Better_Selection_Presentation
EBN Forum Sept 2016 A_Better_Selection_Presentation
 
Group 2 six myths of product development final
Group 2 six myths of product development finalGroup 2 six myths of product development final
Group 2 six myths of product development final
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Project Procurement Management
Project Procurement ManagementProject Procurement Management
Project Procurement Management
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and Models
 
IT Operations Consulting
IT Operations Consulting  IT Operations Consulting
IT Operations Consulting
 
Procurement ManagementImportance of Project Procurem
Procurement ManagementImportance of Project ProcuremProcurement ManagementImportance of Project Procurem
Procurement ManagementImportance of Project Procurem
 
Tech connect fall 2015 value proposition to encouraging adoption
Tech connect fall 2015   value proposition to encouraging adoption Tech connect fall 2015   value proposition to encouraging adoption
Tech connect fall 2015 value proposition to encouraging adoption
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyz
 
CONS6817_S13'16
CONS6817_S13'16CONS6817_S13'16
CONS6817_S13'16
 
Executing the Project (1).pdf
Executing the Project (1).pdfExecuting the Project (1).pdf
Executing the Project (1).pdf
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its type
 
qLure The TIGER_Module handout.pptx
qLure The TIGER_Module handout.pptxqLure The TIGER_Module handout.pptx
qLure The TIGER_Module handout.pptx
 
Michele A. Kande Ppt
Michele A. Kande PptMichele A. Kande Ppt
Michele A. Kande Ppt
 
3 developing project proposals
3 developing project proposals3 developing project proposals
3 developing project proposals
 
Competition scope, competition eligibility conditions and application process...
Competition scope, competition eligibility conditions and application process...Competition scope, competition eligibility conditions and application process...
Competition scope, competition eligibility conditions and application process...
 
Agile purchasing
Agile purchasingAgile purchasing
Agile purchasing
 
How to enter the US & European Generic Pharmaceutical markets
How to enter the US & European Generic Pharmaceutical marketsHow to enter the US & European Generic Pharmaceutical markets
How to enter the US & European Generic Pharmaceutical markets
 

More from John Gilligan

The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber SecurityJohn Gilligan
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy John Gilligan
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...John Gilligan
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 
Implementing Continuous Monitoring
Implementing Continuous MonitoringImplementing Continuous Monitoring
Implementing Continuous MonitoringJohn Gilligan
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...John Gilligan
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesUnderstanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesJohn Gilligan
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesJohn Gilligan
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesJohn Gilligan
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityJohn Gilligan
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 

More from John Gilligan (14)

The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...Automating Enterprise IT Management by Leveraging Security Content Automation...
Automating Enterprise IT Management by Leveraging Security Content Automation...
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Implementing Continuous Monitoring
Implementing Continuous MonitoringImplementing Continuous Monitoring
Implementing Continuous Monitoring
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesUnderstanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and Challenges
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber Security
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Practical approaches to address government contracting problems

  • 1. Practical Approaches to Address Government Contracting Problems John M. Gilligan Defense Acquisition University ISA 320
  • 2. Common Government Contracting Problems • Source Selection takes too long and costs too much money – Too many bidders – Too much calendar time and costs too much • Difficulty in locking down requirements • Fear of protests limits government-industry interaction and drives up acquisition costs • Failure to get innovative or cost saving ideas once on contract • Too few and inexperienced acquisition staff 2
  • 3. Problem: Source Selection takes too long and costs too much money Best Practices: • Rapid down selection of prospective offerors • Lock down (and publish) contract award date; scope source selection tasks to fit schedule • Use oral proposals with real time Q&A of bidding team • Limit emphasis on out-year pricing Objective of Source Selection is to pick a partner not to get a perfect contract (which will change as soon as it is signed). 3
  • 4. Problem: Difficulty in locking down requirements • Best practices: – Promote extensive industry dialogue prior to RFP using interactive group sessions regarding contract structure, evaluation criteria, general solution approach – Field evolving solution using “Time Box” approach—requirements scoped to accommodate fixed time and costs Open dialogue between developer and (real) users and iterative short duration projects 4
  • 5. Problem: Fear of protests limits government-industry interaction • Note: Most protests due to poor communication • Best practice: Improve Communication 1. Stick to published process and timing 2. Keep industry informed of any delay or change realizing that every change has a (big) cost to industry 3. Non Select Debriefs done on contractor site with senior management present Government has significant control over the potential for protest!5
  • 6. Cost growth and failure to get innovative or cost saving ideas once on contract • Use significant contract incentives (e.g., award fee outside normal fee) to motivate continued innovation • Understand and manage program momentum as way to reduce overall program cost Industry only has so many “A” teams; “A” teams are deployed based on ROI. 6
  • 7. Problem: Too Few & Inexperienced Acquisition Staff • Best practices: – Use collaboration and on-line support/training to better leverage limited expertise – Convene government-industry acquisition strategy/advisory panels early in the process – Don’t try to put all terms/performance parameters in “concrete” at the start of the contract. Keep it simple and commit to small increments-- reduces risk and increases likelihood of success 7