• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Journal Issues / Cost Estimation & Systems Acquisition / The Need for “Acquisition Visibility”

The Need for “Acquisition Visibility”

Published in Software Tech News
Volume: 15 Number: 1 - Cost Estimation & Systems Acquisition

Author: Mark Krzysko
Posted: 01/04/2016 | Leave a Comment

On September 14, 2010, then Under Secretary of Defense for Acquisition, Technology and Logistics (USD(AT&L)), Dr. Ashton Carter, provided guidance to acquisition professionals regarding the “Better Buying Power” initiative.  The Department of Defense (DoD) introduced Better Buying Power – with broad support from senior DoD leadership – to improve acquisition value through increased competition, tradecraft, productivity and incentives.  Better Buying Power also focused heavily on how the Department managed its complex acquisition portfolio by challenging the workforce to improve critical acquisition management, oversight and processes.  The Department would achieve better acquisition management and processes, according to Better Buying Power, with a greater focus on cost, affordability and performance – elements that were becoming increasingly important as DoD faced growing scrutiny on its acquisition programs.

The timing of Better Buying Power was no surprise.  In 2010 the Department’s Major Defense Acquisition Program (MDAP) portfolio grew to over $1.7 trillion across the life of the programs, an almost 60% increase from acquisition numbers reported ten years earlier.  The $1.7 trillion did not account for certain operations and sustainment costs, the Military Department’s smaller acquisition programs, or Major Automated Information Systems, adding billions to an already incredible portfolio.  DoD’s acquisition processes were also the subject of ongoing Congressional scrutiny and numerous Government Accountability Office (GAO) and DoD Inspector General (IG) investigations.  Highlighting significant management and oversight issues, the GAO claimed that development costs for acquisition programs were as much as 42% higher than original estimates, with program delays averaging 22 months.  While DoD worked closely with GAO to review their conclusions, the scope of the portfolio is real.

Better Buying Power provided a strategic foundation to implement change, but acquisition leadership still needed to answer a tough but appropriate question: did DoD have the right information or systematic processes to address acquisition management, oversight and process complexities and achieve efficiencies that provided better value to the Warfighters and taxpayers?  In the September 14, 2010, Better Buying Power guidance memorandum to acquisition professionals, Dr. Carter emphasized the use of data to answer this question.

“We have analyzed data on the Department’s practices, expenditures, and outcomes and examined various options for changing our practices.   We have sought to base the specific actions I am directing today on the best data the Department has available to it.  In some cases, however, this data is very limited.  In these cases, the guidance makes provision for future adjustments as experience and data accumulate so that unintended consequences can be detected and mitigated.”

The message was clear: data and information were key to managing, overseeing and streamlining processes within the acquisition portfolio, but DoD would require diligence to obtain it.  Data offered innovative perspectives on acquisition processes, delivering the necessary insight into acquisition cost, performance, affordability and other critical elements.  Empowered with data, DoD leadership could report, analyze, and make informed decisions on the Department’s complex acquisition portfolio.  This is the focus of this article.

Prior to Better Buying Power, the Director of Acquisition, Resources and Analysis (ARA), an organization under the USD(AT&L), led a parallel effort to support the reformation of acquisition management, oversight and departmental business processes.  The Director, ARA directed a small team to focus on using structured data to provide insight on how the Department viewed and managed its acquisition portfolio.  Key areas of focus were data governance and using data as a service.  In conjunction with the Military Departments, the team demonstrated it could identify authoritative sources of major acquisition information; have consistent, semantic definitions across the Department; measure data for accuracy, reliability and availability; and provide it to acquisition leadership for use in any visual tool giving them data-driven insight into the major acquisition portfolio.

These efforts were part of a pilot that went from concept to execution in under 60 days – a short order for a complex Department of Defense.  The team extracted performance data elements of 12 major weapons programs and presented this data to leadership within a service-oriented environment.  DoD leadership would manage this service Department-wide with the goal of supporting reporting, analysis and decision making.  Although the pilot represented a small subset of acquisition data and programs, it demonstrated two important achievements: first, DoD could manage and govern acquisition information with technologies and techniques such as Service Oriented Architecture (SOA) and semantics; second, DoD could provide data and information as a service in a near real-time environment.  The ability for this team to reach across DoD and work closely with the Military Departments showed transcendence of organizational boundaries, infrastructures, organizational prerogatives, and security models.  Acquisition data – once held tightly by those processes – was now transparent and understood. The USD(AT&L) saw the potential structured data could have on acquisition management, oversight and business processes and expanded the pilot to determine its full capability. Additionally, he sought an on-demand environment that could provide data across the enterprise seamlessly and efficiently. This capability became known as Acquisition Visibility (AV), which transitioned from pilot to implementation, formally effective in July 2009.  The number of acquisition programs covered under Acquisition Visibility tripled during this transition and the team worked across the Department to apply structured acquisition data to other uses.  They began to automate reporting to immediately comply with internal and Congressional reporting requirements and reused data to develop multiple reports at the same time.  In support of other organizations, including the Office of Performance Assessments and Root Cause Analyses, DoD began to explore the use of data analytics, using business intelligence tools to provide dramatically better insight to leadership about how DoD oversaw and managed its acquisition programs.  This also provided leadership awareness into how DoD’s industry partners were performing against their requirements and obligations.  As data requirements increased, Acquisition Visibility quickly became the single source for acquisition information across the Department.

An Effective Capability Through Agility

While Acquisition Visibility provides important information to acquisition decision-makers, it is more than a technical capability which shares information across the Department.  The service is the authoritative source for acquisition information, acquisition information definition and the foundation for how acquisition leadership oversees, manages, reports and analyzes its major acquisition portfolio.  It delivers the core service for the USD(AT&L)’s acquisition oversight, accountability and strategic decision making.  Acquisition Visibility leverages internal net-centric services from OSD defense agencies as well as engineering and technical expertise from the Military Departments and industry partners.  Components now provide accurate, structured, acquisition information – via AV SOA as the core element of net-centricity – immediately to the USD(AT&L) and  senior decision makers.

Acquisition Visibility does not impose uniform business processes across the DoD acquisition community, replace current applications and tools or implement an “IT solution”.  It benefits from best practices, SOA and existing technical infrastructure to gain access to transparent, acquisition data without having to maintain a single data strategy or common infrastructure – each Component optimizes their business processes and leverages technologies as appropriate.  Data governance ensures access to Component-managed acquisition information and defines data for consistency, accuracy and reliability across the Department.  Governance also establishes definitive semantic meaning to the business rules so Components share acquisition information consistently within the AV environment.  This enables Components, leadership and acquisition stakeholders to view and measure data uniformly and promotes information quality assurance when it comes to data reporting and analysis.

Multiple delivery teams support Acquisition Visibility providing functional, technical and data expertise.  Acquisition Visibility now covers all major defense acquisition programs, by sharing sustainment, operating costs and earned value management data among other acquisition information.  AV leadership has transitioned the service into a production environment and grew the number of acquisition data elements to over 700 bringing additional, more relevant information to acquisition decision makers.  The Department will add the Major Automated Information Systems and non-MDAP acquisition programs to this information paradigm in the near future.  Figure 1 below provides a visual of Acquisition Visibility and its core services.  In support of Acquisition decision making, DAES, SAR, UCR, DAB and APB are legislative reporting requirements or decisions forums that leverage acquisition information via Acquisition Visibility.
DataManagement

Figure 1:  Strategic View of the Acquisition Visibility service

Pages: Page 1 Page 2 Page 3

Next Article:
Air Force Analytics for Decision Support »

Author

Mark Krzysko
Mark Krzysko
Mark Krzysko serves as the Deputy Director, Enterprise Information and Office of the Secretary of Defense Studies. In this senior leadership position, he directs data governance, technical transformation, and shared services efforts to make timely, authoritative acquisition information available to support oversight of the Department of Defense’s major programs, a portfolio totaling more than $1.7 trillion of investment funds over the lifecycle of the programs. Mr. Krzysko oversees Federally Funded Research and Development Centers and University Affiliated Research Centers.

Reader Interactions

Leave a Comment Cancel

You must be logged in to post a comment.

sidebar

Blog Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

Featured Subject Matter Expert (SME): Daksha Bhasker

A dynamic CSIAC SME, Senior Principal Cybersecurity Architect, Daksha Bhasker has 20 years of experience in the telecommunications services provider industry. She has worked in systems security design and architecture in production environments of carriers, often leading multidisciplinary teams for cybersecurity integration, from conception to delivery of complex technical solutions. As a CSIAC SME, Daksha's contributions include several published CSIAC Journal articles and a webinar presentation on the sophiscated architectures that phone carriers use to stop robocalls.

View SME's Contributed Content

CSIAC Report - Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design

Integration of Smart City Technologies to create Smart Bases for DoD will require due diligence with respect to the security of the data produced by Internet of Things (IOT) and Industrial Internet of Things (IIOT). This will increase more so with the rollout of 5G and increased automation "at the edge". Commercially, data will be moving to the cloud first, and then stored for process improvement analysis by end-users. As such, implementation of Secure Cloud Architectures is a must. This report provides some use cases and a description of a risk based approach to cloud data security. Clear understanding, adaptation, and implementation of a secure cloud framework will provide the military the means to make progress in becoming a smart military.

Read the Report

CSIAC Journal - Data-Centric Environment: Rise of Internet-Based Modern Warfare “iWar”

CSIAC Journal Cover Volume 7 Number 4

This journal addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities.

Read the Journal

CSIAC Journal M&S Special Edition - M&S Applied Across Broad Spectrum Defense and Federal Endeavors

CSIAC Journal Cover Volume 7 Number 3

This Special Edition of the CSIAC Journal highlights a broad array of modeling and simulation contributions – whether in training, testing, experimentation, research, engineering, or other endeavors.

Read the Journal

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

Recent Video Podcasts

  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 3 Series: Programming Language Comparisons
  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 2 Series: Programming Language Comparisons
  • A Brief Side-by-Side Comparison Between C++ and Rust – Part 1 Series: Programming Language Comparisons
  • Digital Engineering Implementation Progress and Plans Series: CSIAC Webinars
  • Assessing the Operational Risk Imposed by the Infrastructure Deployment Pipeline Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Jan 28

Data Privacy Day

January 28, 2022
Jan 28

Data Privacy Day

January 28, 2023
View all Events

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT