IT Risk Management Summit – March 26, 2013 – Reston, VA

Cloud computing: A data-centric business model

By G C Network | October 3, 2015

According to the National Institute of Standards and Technology: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers,…

John Mayer At Dell World 2015!! (Oh, I’ll be there too.)

By G C Network | September 30, 2015

An artist who defies all boundaries, John Mayer has won seven Grammy Awards and sold more than 17 million albums worldwide. The singer, songwriter and guitarist’s skills have been widely…

Data-centric Security: The New Must Have

By G C Network | September 23, 2015

Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere.Having your data and the…

Personal email:Pathway to Cybersecurity Breaches

By G C Network | September 14, 2015

As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems…

IEEE Cloud Computing: Legal Clouds

By G C Network | September 11, 2015

The new issue of IEEE Cloud Computing is now available!   This special issue looks at how to balance privacy with legitimate surveillance and lawful data access. Some of the…

Cloud hosting: Look beyond cost savings and weigh pros, cons

By G C Network | September 3, 2015

Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud…

“Cloud First” Lessons Learned from ViON

By G C Network | August 25, 2015

In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of…

Looking for Security Peak Performance?

By G C Network | August 19, 2015

You can find it at Dell Peak Performance 2015!!! I’ll be there at the Aria Resort and Casino in Las Vegas attending as a social media correspondent with a full…

The Cybersecurity Sprint: Are we safe yet?

By G C Network | August 7, 2015

UPDATE: NBC News reports U.S. officials have disclosed a hack of the Pentagon’s Joint Staff unclassified email system, which took place on July 25. Recent unauthorized access to a U.S. government database…

Cloud Computing + Things = “Information Excellence”, Not IoT

By G C Network | July 31, 2015

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is…


https://it-cisq.org/
https://www.it-aac.org/In response to growing demand for formal software risk and quality management tools, the nations’ most respected standards bodies and IT communities of practice have joined forces to advance the state of the practice in software quality management. 
Hosted by the Consortium for IT Software Quality (CISQ), and in cooperation with Object Management Group, Software Engineering Institute, Interoperability Clearinghouse, IT Acquisition Advisory Council, a leadership forum will be held on March 26th in Reston, Virginia. The goal of this intensive one day event is to provide both IT practitioners and leaders insights into emergent industry standards of practices and case studies needed to mitigate common software vulnerabilities and risk. Examples from both a development and acquisition management perspectives will be addressed.
Selected topics will focus on emerging standards and best practices in measuring risk and quality in IT intensive programs from the standpoint of productivity, software assurance, overall quality and system/mission risk. The discussion will be expose emerging methods and tools of incorporating such standard metrics into the IT software development, sustainment and acquisition processes.

I am personally honored to be participating in this important forum.
Topic: Improving System Development & Sustainment Outcomes with Software Quality and Risk Measurement Standards
Date: March 26thth, 0900-1600 followed by Cocktail Social
Location: HYATT Reston Town Center, Reston, VA
https://www.omg.org/meetings/va-2014/index6.cgi?noid=yes
CISQ Program Agenda
0800-0900       Registration
Morning Segment: System Engineering Practices
0900-0915       Introductions
Dr. Bill Curtis, CISQ; Kevin Jackson, IT-AAC
0915-1000       Sizing and Estimating Software Risk (can’t manage what you can’t measure)
Lead: Mike Harris, DCG
Terry Mitchell, Army G2 Sr Advisor (invited)
Neal Ziring, NSA IAD TD (invited)
1015-1100       Advances in Information Assurance Standards
Lead: Robert Martin, Mitre
Don Davidson, OSD CIO (invited)
Dr. Chris Greer, NIST (invited)
1115-1200       Lessons Learned in Health IT Security and Interoperability
Leads: John Keane, Military Health Systems
Dave Bowen, DHA CIO (invited)
Don Johnson, OSD ATL iEHR Lead (invited)
1200-1300       Lunch
Afternoon Segment: IT Risk Management for National Security Programs
1300-1315       Introduction
MajGen John Brennan, USAF ret, Executive Director, IT-AAC
1315-1400       Keynotes
                        Facilitator: John Weiler, CIO Interop. Clearinghouse
Kevin Meiners, DNI Director of Acquisition Technology and Logistics
Jim Martin, DUSD ISP&R OUSD I
1415-1500       Business Drivers for Agile Methods Used in Measuring Risk and Quality
Facilitator: Harry Levinson, SEI
Col Bruce Lyman, AF A2 (invited)
Terry Mitchel, Army G2 (invited)
Richard Hale, DOD CIO (invited)
1515-1600       IT Risk and Acquisition Challenges in National Security Programs
Facilitator: Bill Greenwalt, VP Acquisition, AEI (invited)
General Kirk Vollmecke, Army ASA ALT (invited)
General Mike Basla, AF A6/CIO (invited)
OSD OT&E, J. Michael Gilmore, Director (invited)

For more information on this program, contact:
Sam Somashekar, CISQ Program Manager,
Phone: 917-843-4708
  

Bookmark and Share

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)
–>

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network