![]() ![]() In 2022, Thunderdome celebrated its 30th anniversary at the Jaarbeurs convention centre, Utrecht. The party was brought back in 2017 for the 25th anniversary with a 2019 edition announced the following year. The first party was organized in 1992 and the party held in December 2012 was advertised as being the end of Thunderdome. It was organized by the Dutch entertainment company ID&T. DISA officials are considering hosting a reverse industry day to learn more about contractors’ capabilities and offer details about any challenge-based approach to evaluating bids.Thunderdome is a concept in hardcore techno and gabber music that was mainly used for a series of parties and CD albums. Potential bidders have until June 14 to submit a seven-page response detailing technical capabilities, company information, and experience implementing more than three dozen cybersecurity technologies listed in the notice. In a March 2020 report, MITRE experts recommend ChBA in cases where the government faces an urgent and time-critical need, where conventional solutions prove ineffective and emerging technologies offer a nontraditional solution. This approach, pioneered by the nonprofit MITRE Corp., consists of one or more technical simulations or exercises to assess how bidders solve real-world problems. The contract has generated $24 million.įurther, DISA is considering competing Thunderdome using what’s known as a challenge-based acquisition (ChBA). a $199 million OTA to build a cloud-based internet isolation platform to prevent malware from reaching DOD networks. In August 2020, DISA awarded By Light Professional IT Services Inc. This is not the first time Pentagon agencies considered using OTAs to implement zero trust. OTAs enable some federal agencies, including DISA, to fast-track funding for technology research and prototyping engagements with nontraditional contractors. Notably, DISA is contemplating awarding contracts for one to two Thunderdome prototypes in the form of other transaction agreements (OTA). The program will complement an existing suite of cybersecurity technologies - including identity management, encryption, security analytics, and endpoint management - offering greater “defense in depth” for users both inside the Pentagon and those working remotely.ĭISA did not provide an official estimate for the value of Thunderdome, but Bloomberg Government estimates the contract could generate $100 million or more in obligations through the end of fiscal 2025. Once in place, Thunderdome will enable DISA’s information security team to apply access controls based on users’ role within the organization, location, or even type of devices they use, according to the notice. Zero trust has quickly emerged as the keystone of the Biden administration’s May executive order on cybersecurity and represents a top priority of federal chief information security officer Chris DeRusha. ![]() The SolarWinds hack that affected perhaps dozens of federal agencies was a wakeup call that federal cybersecurity strategies needed to do more to constrain hostile actors if they succeed in breaching the perimeter. It requires users to continuously prove their authorization to access the network, rather than accepting them by default. It’s the paradigm that users and programs receive the minimum network access necessary to do their jobs. ![]() Organizations prioritized cyber defenses at the perimeter of their networks to keep intruders out in the past, while offering authorized users freedom of movement on the network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |