Cybersecurity

Army tries to speed cyber acquisition process

keyhole digital

The Army is trying to speed cyber-related acquisition by using a template known as the Information Technology Box. Officials said the goal is to quickly supply soldiers with IT tools such as sensors, forensics and "insider threat discovery capabilities" in a matter of weeks rather than the months or years a traditional acquisition might take.

"Cyber doesn't fit the traditional acquisition process that you would use to deliver a tank," said Kevin Fahey, executive director of the Army's System of Systems Engineering and Integration Directorate, in an article on the Army's website.

The Defense Department first used the IT Box template in 2008 and updated it in 2012, according to the article.

"IT Box is not new. What's new is how the Army is tailoring the IT Box and other innovative acquisition methods to meet the demands of cyber," Army spokesman Lt. Col. Jesse Stalder told FCW. "We pursued IT Box because it gives us the foundation and the flexibility to quickly prioritize and deliver solutions, even as cyber requirements change based on evolving threats."

The "box" has four main components (or "sides"), according to a Defense Acquisition University glossary: requirements and oversight; capabilities and measures of effectiveness; applications and software development and integration costs; and estimated sustainment costs.

The oversight side of the box is fulfilled, at least in part, by the Cyber Acquisition Requirements and Resourcing working group, which helps prioritize the acquisition of materiel solutions.

The Army also has other initiatives in the works to limber up its acquisition process. Officials plan to set up a "consortium of industry, academia and government entities to foster cross-sector collaboration on emerging cyber solutions," according to the article on the Army's website. And Stalder said the service has established a "Cyber Innovation Challenge that allows the Army to quickly purchase and evaluate pilot and prototype cyber solutions using other transaction authority methods rather than standard acquisition processes."

The first such challenge, which is already underway, involves a software and hardware kit that supports the service's cyber protection teams, Stalder said, adding that several vendors' proposals are being evaluated at the Army's Cyber Battle Lab at Fort Gordon, Ga.

The Army isn't the only service trying to inject a sense of urgency into IT acquisition. In March, the Navy unveiled a new acquisition model known as the Innovation Cell to get interested vendors involved in the process earlier. The Air Force, meanwhile, has emphasized agile acquisition. The service's 30-year strategy, released last year, warned against big, complex procurements with "crippling interdependencies."

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group