Project Ethics and Risk Management

In this 3 day course students will learn a clear understanding of the correlation between Risk Management and Project Ethics.

Target Audience

This course is intended for intermediate to advanced Business Analysts and Project Managers.

Course Outline

Course Introduction

  • Instructor and Class Introductions
  • Class Logistics

Introduction

  • Purpose
  • Background
  • Applicability

PM Cybersecurity Basics

General Expectations for Program Managers

  • Cybersecurity Basics
  • PM Cybersecurity Responsibilities
  • ISSM Roles and Responsibilities in Support of the Program Manager
  • Cybersecurity Strategy Requirement

Functional Activities

  • Cybersecurity Requirements Analysis and Definition
  • Categorization by Confidentiality, Integrity, and Availability Impact Levels
  • Functional Decomposition and Allocation of Cybersecurity Requirements
  • Design and Development
  • Configuration Management
  • Risk Assessment
  • Threat Analysis
  • Cybersecurity Validation, Test, and Evaluation
  • Test Plans and Reports

Risk and the RMF Governance Structure

Resolving Conflict Arising from Cybersecurity Implementation

Acquisition Lifecycle Cybersecurity Activities and Process Flow 

  • Requirements
  • Development
  • Authorization
  • Operations

Cybersecurity Throughout the Acquisition Lifecycle

  • Materiel Solution Analysis (MSA) Phase
  • Cybersecurity Assessment Criteria for Analysis of Alternatives (AoA)
  • Develop Initial Cybersecurity Strategy and Include Cybersecurity in MS A Documentation

Technology Maturation and Risk Reduction (TMRR) Phase

  • Include Cybersecurity in System Design and Development RFP Release Decision Documentation
  • Include Cybersecurity in Preliminary Design and Final MS B Documentation

Engineering and Manufacturing Development (EMD) Phase

  • Include Cybersecurity in Detailed Final Design
  • Test Cybersecurity Requirements in a Cyber Threat Environment and Assess Cyber Risk to Support Initial Deployment Decision

Production and Deployment Phase and Operations and Support Phase

  • Production and Deployment: Operationally Test Cybersecurity to Support Full or Final Deployment Decision
  • Operations and Support: Monitor Cybersecurity and Risk after Authorization to Operate to Maintain Security Posture until Disposal

Cybersecurity Roles and Responsibilities

Cybersecurity Engineering Considerations

  • Introduction
  • Background
  • Roles and Responsibilities
  • Cybersecurity Engineering References
  • Program Protection Planning
  • TSN Analysis
  • Requirements Traceability and Security Controls
  • Selecting and Tailoring Security Controls
  • Engineering Trade Analyses
  • Systems Engineering Technical Reviews

Cybersecurity Test and Evaluation Considerations 

  • Introduction
  • Cybersecurity Test and Evaluation
  • Developmental Test and Evaluation
  • Understand Cybersecurity Requirements
  • Characterize the Cyber Attack Surface
  • Cooperative Vulnerability Identification
  • Adversarial Cybersecurity DT&E
  • Operational Test and Evaluation
  • Cooperative Vulnerability and Penetration Assessment
  • Adversarial Assessment
  • Overarching Cybersecurity T&E Guidelines for the PM

Cybersecurity Lifecycle and Sustainment Considerations

Cybersecurity Risk Assessment Process

  • Cybersecurity Risk Assessments

Summary of Cybersecurity-Related Artifacts

Cybersecurity Request for Proposal Considerations

  • Overview
  • Request for Proposal (RFP) Language
  • Additional Request for Proposal Information

Ethical Considerations

Laws and Regulations

 

To Hire a proven AMS Course Author and or Subject Matter Expert who teaches this class, Call 800-798-3901 Today!

 

Leave a Reply