DCDC seeks Google Threat Intelligence support

On August 26, the Defense Information Systems Agency (DISA) posted a sources sought notice.  The Department of Defense Cyber Defense Command (DCDC) is seeking sources for Google Threat Intelligence (GTI). Responses are due by 4:00 p.m. Eastern on September 9.

The DCDC – Department of Defense Information Network (DODIN) is seeking information from potential sources for: a globally interconnected end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The DODIN includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and national security systems.

The DCDC is responsible for the Command and Control of DODIN Operations and Defensive Cyberspace Operations-Internal Defensive Measures (DCO-IDM) globally in order to synchronize the protection of DCDC component capabilities to enable power projection and freedom of action across all warfighting domains. For instance, the vendor will reduce vulnerabilities, eliminate threats, and defeat, deny, and disrupt attacks against the DODIN. Two key mission essential tasks (METs) of DCDC are Synthesize Intel and Disseminate Operational Intelligence Intel. The purpose of synthesizing intelligence is to develop comprehensive intelligence products by integrating, evaluating, analyzing, and interpreting information from single or multiple sources, and fusing it into finished intelligence to meet known or anticipated production requirements. Disseminating operational intelligence involves conveying and integrating intelligence across the joint force. The organization is looking for a vendor to:

  • Provide information about threats and threat actors to support these METs.
  • Provide case studies and describing recent incidents at similar organizations; addressing trends across the industry and new or expanded descriptions of threat actors specifically target within this particular industry.
  • Create Threat Analysis Reports describing new or evolving threats tied to DCDC business areas, partners, products, and services.
  • Conduct Threat Landscape Briefings to provide situational awareness of current advanced persistent threats (for instance, financial and hacktivists groups). Most importantly, the vendor should provide support to access and apply the capability’s knowledge base to improve and enhance the DCDCs Google threat intelligence.

 

Review the DCDC Google Threat Intelligence sources sought.

Source: SAM

The right opportunity can be worth millions. Don’t miss out on the latest IC-focused RFI, BAA, industry day, and RFP information – subscribe to IC News today.