Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Defense Acquisition University
  4. Information System Security Manager (ISS)

Information System Security Manager (ISS)

The workshop illustrates the Information System Security Manager’s (ISSM’s) roles and responsibilities in the application of cybersecurity risk management and synchronization of the Risk Management Framework (RMF) with the defense acquisition lifecycle processes outlined in DoDI 5000.02. This workshop is also tailorable for the Defense Business Systems (DBS) Business Capability Acquisition Cycle (BCAC) outlined in DoDI 5000.75. Lectures are combined with exercises to include a capstone exercise where students will apply ISSM activities to a real or hypothetical DoD acquisition program.

Course Overview

Overall Proficiency Level
1 - Basic
Course Catalog Number
WSS 003
Course Prerequisites

None

Training Purpose
Skill Development
Specific Audience
Federal Employee
Contractor
Delivery Method
Online, Instructor-Led
Online, Self-Paced
Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
  • Classroom

Learning Objectives

The objective of this workshop includes the ability to: Analyze the ISSM’s roles and responsibilities across the acquisition lifecycle. Enabling Learning Objective (ELO) 1: Describe the ISSM’s roles and responsibilities. Discuss how cybersecurity requirements and the RMF integrate with overarching DoD policies (DoDI 5000.02 / DoDI 5000.75). Illustrate cybersecurity incorporation into the Risk, Issue, and Opportunity (RIO) management process. Recognize the benefits of early/proactive integration of cybersecurity T&E with traditional T&E. Identify annual security review/reporting requirements. Analyze cyber-attack vectors—“Think like an adversary”. Explain software assurance “Best Practices” for a DoD acquisition program. Describe hardware protection measures. Apply ISSM activities to a real or hypothetical DoD acquisition program.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Exploitation Analysis
  • Risk Management
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: