Cyber T&E policy and guidance are being modernized to keep pace with the U.S. Department of Defense (DoD) acquisition objectives stated in DoDI 5000.01:
- Simplify Acquisition Policy
- Tailor Acquisition Approaches
- Empower Program Managers
- Conduct Data-Driven Analysis
- Actively Manage Risk
- Emphasize Sustainment
This webinar training will provide a brief introduction to the DoD’s iterative cyber T&E approach superseding the six phases. We will cover the following topics:
- Iterative Cyber T&E Methodology
- Cyber T&E Strategy and the Integrated Decision Support Key (IDSK)
- Activities for Scoping Iterative Cyber T&E:
- Cyber Requirements, Mission-Based Cyber Risk Assessments, Threat Characterization, Attack Surface Characterization, and Using Cyber T&E
- Security Verification, Cooperative, and Adversarial Testing