Pentagon To Relaunch $475 Million Cyber Effort

Shortly after cancelling its search for bids on a five-year outsourcing contract, US Cyber Command said a retooled version will be out by October. 

After abandoning a $475 million job posting for cyberattack and network defense experts, the Pentagon now says a retooled solicitation that takes into account private sector questions will be out by Oct. 1.

 “Given significant interest along with technical and clarification questions from industry, US Cyber Command is reassessing and amending the [request for proposals] to give industry better fidelity into cyber requirements,” a Cyber Command official said recently.

The original solicitation, released April 30, was itself a revised version of a December 2014 draft request for proposals. The draft and final contracts both strove to reconcile the command’s needs with cyber market realities. 
But soon after the final iteration was published, Defense Department officials said they needed more time to answer questions from cybersecurity vendors and extended the deadline for proposals to June 19.

And on May 21, officials jettisoned the whole five-year plan. At the time, contracting officials said they had to weigh whether a different acquisition strategy could better serve CYBERCOM’s needs.
DOD now anticipates “reissuing the RFP” within the fiscal year 2015 time frame, which ends Sept. 30, the official said.

The Pentagon has set a goal of reaching full operational capacity by 2018. That means standing up three types of National Mission Force teams: one dedicated to defending military networks; another poised to aid troops worldwide with military offensives; and the third to repel hacks targeting vital U.S. organizations.

DefenseOne:  

« Rethinking Cybersecurity in the Age of the Hacker
Data Stolen in Hack Attack on German Parliament »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.