<?xml version="1.0" encoding="UTF-8"?>
<PerformancePlanOrReport xmlns="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport http://xml.fido.gov/stratml/references/PerformancePlanOrReportISOVersion20150612.xsd" Type="Strategic_Plan"><Name>U.S. Department of Defense Cyber Strategy</Name><Description>This strategy presents an aggressive, specific plan for achieving change. For DoD to succeed in  its mission of defending the United States and its interests in cyberspace, leaders from across  the Department must take action to achieve the objectives outlined in this document. They must  also hold their organizations accountable. Because of the nature of networks and computer  code, no single organization can be relied upon to do this work. Success requires close  collaboration across DoD, between agencies of the U.S. government, with the private sector, and  with U.S. allies and partners. </Description><OtherInformation>We live in a time of growing cyber threats to U.S. interests. State and non-state actors threaten  disruptive and destructive attacks against the United States and conduct cyber-enabled theft of  intellectual property to undercut the United States’ technological and military advantage. We  are vulnerable in cyberspace, and the scale of the cyber threat requires urgent action by leaders  and organizations across the government and the private sector.  Since developing its first cyber strategy in 2011, the Defense Department has made significant  progress in building its cyber capabilities, developing its organizations and plans, and fostering  the partnerships necessary to defend the country and its interests. More must be done.  Stemming from the goals and objectives outlined in this strategy, appropriate resources must be  aligned and managed to ensure progress... The strategic environment can change quickly. That is especially true in cyberspace. We must be  dynamic, flexible, and agile in this work. We must anticipate emerging threats, identify new  capabilities to build, and determine how to enhance our partnerships and planning. As always,  our women and men – both uniformed and civilian personnel – will be our greatest and most  enduring strength and a constant source of inspiration. By working together we will help  protect and defend the United States and its interests in the digital age.</OtherInformation><StrategicPlanCore><Organization><Name>U.S. Department  of Defense</Name><Acronym>DoD</Acronym><Identifier>_5e8dcfdc-5d6a-11df-839d-400e7a64ea2a</Identifier><Description/><Stakeholder StakeholderTypeType="Person"><Name>Ashton Carter</Name><Description>Secretary of Defense</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>National Mission Teams</Name><Description>13 teams --   Defend the United States and its interests against cyberattacks of significant consequence.</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Teams</Name><Description>68 teams --   Defend priority DoD networks and systems against priority threats.</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combat Mission Teams</Name><Description>27 teams --   Provide support to Combatant Commands by generating integrated cyberspace effects in support of operational plans and contingency operations.</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Support Teams</Name><Description>25 teams --   Provide analytic and planning support to the National Mission and Combat Mission teams.</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder></Organization><Vision><Description/><Identifier>_d447d854-679f-11e5-8193-20c88df7775b</Identifier></Vision><Mission><Description>To guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture.</Description><Identifier>_d447da66-679f-11e5-8193-20c88df7775b</Identifier></Mission><Value><Name/><Description/></Value><Goal><Name>Forces &amp; Capabilities</Name><Description>BUILD AND MAINTAIN READY FORCES AND CAPABILITIES  TO CONDUCT CYBERSPACE OPERATIONS.</Description><Identifier>_d447db92-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To operate effectively in cyberspace, DoD requires forces and personnel that are trained to the  highest standard, ready, and equipped with best-in-class technical capabilities. In 2013 DoD  initiated a major investment in its cyber personnel and technologies by initiating the CMF; now  DoD must make good on that investment by training its people, building effective organizations  and command and control systems, and fully developing the capabilities that DoD requires to  operate in cyberspace. This strategy sets specific objectives for DoD to meet as it mans, trains,  and equips its forces and personnel over the next five years and beyond.</OtherInformation><Objective><Name>Cyber Workforce</Name><Description>Build the cyber workforce. </Description><Identifier>_d447e146-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Workforce</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To make good on DoD’s significant investment in cyber  personnel, and to help achieve many of the objectives in this strategy, DoD’s first priority is  to develop a ready Cyber Mission Force and associated cyber workforce. This workforce  will be built on three foundational pillars: enhanced training; improved military and civilian  recruitment and retention; and stronger private sector support. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ec5a0-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_1</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Training</Name><Description>Maintain a persistent training environment.</Description><Identifier>_d447e42a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD requires an individual and collective  training capability to achieve the goals outlined in this strategy and to meet future  operational requirements. U.S. Cyber Command will work with other components,  agencies, and military departments to define the requirements for and create a training  environment that will enable the total cyber force to conduct joint training (including  exercises and mission rehearsals), experimentation, certification, as well as the  assessment and development of cyber capabilities and tactics, techniques, and  procedures for missions that cross boundaries and networks. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ec960-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_2</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Career Paths</Name><Description>Build viable career paths.</Description><Identifier>_d447e5ba-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Throughout the course of this strategy, and following the  CMF decisions of 2013, DoD will continue to foster viable career paths for all military  personnel performing and supporting cyber operations.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ecb7c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_3</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>National Guard &amp; Reserve</Name><Description>Draw on the National Guard and Reserve.</Description><Identifier>_d447e7e0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Guard</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>National Reserve</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Throughout the course of this strategy, DoD  will draw on the National Guard and Reserve Components as a resource for expertise  and to foster creative solutions to cybersecurity problems. The Reserve Component  offers a unique capability for supporting each of DoD’s missions, including for engaging  the defense industrial base and the commercial sector. It represents DoD’s critical surge  capacity for cyber responders.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ecd5c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_4</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Recruitment &amp; Retention</Name><Description>Improve civilian recruitment and retention. </Description><Identifier>_d447e9d4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Civilians</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>In addition to developing highly-skilled  military personnel, DoD must recruit and retain highly-skilled civilian personnel,  including technical personnel for its total cyber workforce. Civilians must follow a well-developed career development and advancement track and be provided with best-in-class opportunities to develop and succeed within the workforce.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ecf32-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_5</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Exchange Programs</Name><Description>Develop and implement exchange programs with the private sector.</Description><Identifier>_d447eb5a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.v</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>The Private Sector</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To supplement  DoD’s civilian cyber workforce, DoD must be able to employ technical subject matter  experts from the best cybersecurity and information technology companies in the  country to perform unique engineering and analytic roles within DoD. The Defense  Department will implement successful private sector exchange programs to bring  measurable benefits to the Department of Defense through the design and development  of new operational concepts for DoD’s cyberspace missions.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ed112-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_6</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyberspace Education</Name><Description>Support the National Initiative for Cyberspace Education.</Description><Identifier>_d447ed80-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.vi</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will develop policies to  support the National Initiative for Cybersecurity Education. Working with interagency  partners, one or more educational institutions, as well as state and private sector partners, DoD will continue to support innovative workforce development partnerships  focused on both the technical and policy dimensions of cybersecurity and cyber defense. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ed2f2-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_7</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Technical Capabilities</Name><Description>Build technical capabilities for cyber operations.</Description><Identifier>_d447ef88-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>President of the United States</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>In 2013, DoD developed a model for  achieving CMF readiness and for developing viable cyber military options to present to the  President and Secretary of Defense. DoD must have the technical tools available to conduct  operations in support of combatant command missions. Key initiatives include the  following:</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ed4dc-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_8</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Unified Platform</Name><Description>Develop the Unified Platform.</Description><Identifier>_d447f10e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>On the basis of planning requirements, DoD will  develop the detailed requirements for integrating disparate cyber platforms and  building an interoperable and extendable network of cyber capabilities. This Unified  Platform will enable the CMF to conduct full-spectrum cyberspace operations in support  of national requirements. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ed6d0-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_9</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>R&amp;D</Name><Description>Accelerate research and development.</Description><Identifier>_d447f348-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will continue to  accelerate innovative cyber research and development to build cyber capabilities. The DoD research and development community as well as established and emerging private  sector partners can provide DoD and the nation with a significant advantage in  developing leap-ahead technologies to defend U.S. interests in cyberspace. In addition to supporting current and planned investments, DoD will focus its basic and applied  research agenda on developing cyber capabilities to expand the capacity of the CMF and  the broader DoD cyber workforce.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ed8ba-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_10</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Command &amp; Control</Name><Description>Validate and continually refine an adaptive command and control mechanism for cyber operations.</Description><Identifier>_d447f53c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.C</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD has made significant progress in recent years in developing command and  control for all three of its missions, but its command and control model must be finalized,  resourced, and tested to ensure effectiveness. The command and control model must  support USCYBERCOM and the combatant commands. It must be efficient and practical,  and must promote unity of effort of effort across all three cyber missions.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673edaae-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_11</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Modeling &amp; Simulation</Name><Description>Establish an enterprise-wide cyber modeling and simulation capability.</Description><Identifier>_d447f6cc-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.D</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Intelligence Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will work in  collaboration with the intelligence community to develop the data schema, databases,  algorithms, and modeling and simulation (M&amp;S) capabilities necessary to assess the  effectiveness of cyber operations.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673edcac-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_12</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Capacity Assessment</Name><Description>Assess Cyber Mission Force capacity.</Description><Identifier>_d447f910-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Mission Force</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Assess the capacity of the projected Cyber  Mission Force to achieve its mission  objectives when confronted with multiple  contingencies. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673edebe-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_13</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Metrics</Name><Description>Propose, collect, analyze, and report a set of appropriate metrics to measure the operational capacity of the CMF.</Description><Identifier>_d447fb0e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.E.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Joint Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Joint Staff, with support from  USCYBERCOM and other DoD  components, will propose, collect,  analyze, and report a set of appropriate  metrics to the Principal Cyber Advisor to  measure the operational capacity of the  CMF. These metrics will include updates  on the status of USCYBERCOM  contingency capabilities, to include  capability development and proficiency as well as accesses and tools that may be  required in a contingency. In response to this analysis, DoD will develop a plan for  ensuring that the CMF has the appropriate capacity and flexibility available to respond  to changes in the strategic environment.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ee0bc-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_14</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal><Goal><Name>Network, Data &amp; Risks</Name><Description>DEFEND THE DOD INFORMATION NETWORK, SECURE DOD DATA, AND MITIGATE RISKS TO DOD MISSIONS.</Description><Identifier>_d447fc9e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>While DoD cannot defend every network and system against every kind of intrusion – DoD’s  total network attack surface is too large to defend against all threats and too vast to close all  vulnerabilities – DoD must take steps to identify, prioritize, and defend its most important  networks and data so that it can carry out its missions effectively. DoD must also plan and  exercise to operate within a degraded and disrupted cyber environment in the event that an  attack on DoD’s networks and data succeeds, or if aspects of the critical infrastructure on which  DoD relies for its operational and contingency plans are disrupted. Finally, DoD must raise the bar on technology and innovation to stay ahead of the threat by  enhancing its cyber defense capabilities, including by building and employing a more  defendable network architecture in the Joint Information Environment (JIE). Outside of DoD  networks, DoD must work with the private sector to help secure defense industrial base trade data, and be prepared to assist other agencies in hardening U.S. networks and data against  cyberattacks and cyber espionage.</OtherInformation><Objective><Name>Joint Information Environment</Name><Description>Build the Joint Information Environment (JIE) single security architecture.</Description><Identifier>_d447fee2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combatant Commands</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense  Department will build DoD information networks to meet the JIE’s single security architecture. The single security architecture will adapt and evolve to mitigate cyber threats;  it will help DoD to develop and follow best-in-class cybersecurity practices, and its small  network footprint will allow USCYBERCOM, combatant commands, and DoD components  to maintain comprehensive situational awareness of network threats and mitigations.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ee2ba-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_15</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Enterprise Security</Name><Description>Enable a robust network defense and shift the focus from protecting service-specific networks and systems to securing the DoD enterprise in a unified manner.</Description><Identifier>_d44800f4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The JIE’s single security architecture will enable a robust network defense and shift the  focus from protecting service-specific networks and systems to securing the DoD  enterprise in a unified manner. The JIE’s single security architecture must be developed  with enhanced cyber situational awareness, deployed in response to validated  requirements, and able to accommodate future defensive measures.  </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ee4cc-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_16</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>New Techniques</Name><Description>Develop and integrate new defensive techniques into DoD’s cybersecurity architecture.</Description><Identifier>_d4480298-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>As a part of JIE planning DoD will develop a framework for developing and integrating  new defensive techniques into DoD’s cybersecurity architecture, to include anomaly-based detection capabilities, data analytics to identify vulnerabilities and threats, and advanced encryption methods. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ee6fc-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_17</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Joint Force Headquarters</Name><Description>Assess and ensure the effectiveness of the Joint Force Headquarters for DoD information network (DoDIN) operations.</Description><Identifier>_d4480522-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Joint Force Headquarters</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Operating under USCYBERCOM, the Joint Force  Headquarters-DoDIN will coordinate network defense and mitigate cyber risks to DoD  operations and missions across the defense enterprise. DoD will assess, validate, and fully  implement the Joint Force Headquarters-DoDIN concept to operate DoD networks securely,  defend DoD networks, and mitigate cyber risks to DoD missions. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ee922-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_18</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Vulnerabilities</Name><Description>Mitigate known vulnerabilities.</Description><Identifier>_d448070c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.C</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will implement a capability to  mitigate all known vulnerabilities that present a high risk to DoD networks and data. In  addition to zero-day vulnerabilities, one of the greatest threats to DoD networks and  systems lies in known, high-risk vulnerabilities that potential adversaries can exploit. DoD  often finds itself rushing to close vulnerabilities once an adversary has penetrated a system. The DoD Chief Information Officer (CIO) will lead an effort to implement an automated  patch management capability to distribute software and configuration patches, updates, and  fixes to mitigate known, major vulnerabilities on DoD networks and systems against threats. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673eed3c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_19</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Defense Assessment</Name><Description>Assess DoD’s cyber defense forces.</Description><Identifier>_d44808c4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.D</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Team</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will assess its cyber defense  forces’ ability to conduct integrated, adaptive, and dynamic defensive operations. Enterprise-level and Cyber Protection Team (CPT) network defenders must be able to  discover, detect, analyze, and mitigate threats and vulnerabilities to defend the DoD  information network.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_673ef4d0-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_20</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Computer Network Defense Service Provider</Name><Description>Improve the effectiveness of the current DoD Computer Network Defense Service Provider (CNDSP) construct in defending and protecting DoD networks.</Description><Identifier>_d4480c0c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Computer  network defense service providers deliver cybersecurity solutions for DoD networks, to  include monitoring, detection, and protection capabilities. The Defense Department will  determine whether current CNDSP processes are sufficient to defend networks against  known and projected threats in cyberspace and whether current CNDSP forces are  adequately trained and equipped to defend against advanced threats. Finally, DoD will determine whether its CNDSP forces can integrate into the broader cyberspace command  and control construct and how that integrated construct will perform in the face of cyber  threats that span CNDSP and CPT protected networks and data.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67403002-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_21</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Network Defense &amp; Resilience</Name><Description>Plan for network defense and resilience. </Description><Identifier>_d4480e32-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department must identify and plan  to defend the networks that support key DoD missions. The Department must make a  careful assessment of the priority assets that it must defend in cyberspace to assure DoD  missions and exercise to defend those assets effectively.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674033e0-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_22</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Mission Assurance</Name><Description>Integrate cyber into mission assurance assessments.</Description><Identifier>_d4480ff4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will  integrate cybersecurity requirements and assessments into the DoD Mission Assurance  program and update DoD policy appropriately. Currently DoD components take  varying approaches to measuring and  assessing cyber risks for mission  assurance. DoD will develop a Joint  Mission Assurance Assessment Program  that includes the integration of  cybersecurity assessments, cybersecurity  requirements, and cyber operations’  requirements.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740362e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_23</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Capability Assessement</Name><Description>Assess Cyber Protection Team (CPT) capabilities. </Description><Identifier>_d448126a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Teams</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will complete an  assessment of CPT capacity, capability,  and employment model in regard to  mission assurance priorities as set by  combatant command requirements.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674038ae-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_24</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Weapons Systems</Name><Description>Improve weapons systems cybersecurity.</Description><Identifier>_d448149a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will assess and initiate improvements to  the cybersecurity of current and future weapons systems, doing so on the basis of  operational requirements. For all future weapons systems that DoD will acquire or  procure, DoD will mandate specific cybersecurity standards for weapons systems to  meet. Acquisition and procurement policy and practice will be updated to promote  effective cybersecurity throughout a system’s life cycle. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67403b1a-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_25</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Continuity Plans</Name><Description>Build and exercise continuity plans.</Description><Identifier>_d4481670-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>All DoD components will identify and build  resiliency plans to maintain continuity of their most critical operations in the event of  network disruption and degradation. Military campaign plans must fully incorporate  the ability to operate in a degraded cyber environment; military forces must exercise and  be able to conduct military campaigns in a degraded cyber environment where access to  networks and data is uncertain. Components must balance cyber risks effectively to  ensure that they can continue to carry out their missions in the physical world. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67403d90-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_26</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Red Teams</Name><Description>Red team DoD’s network defenses.</Description><Identifier>_d44818fa-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.G</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department has developed mature red  team capabilities to test vital networks and mission systems for vulnerabilities and to better prepare its cyber defense forces. Going forward, DoD must focus its red team capabilities on  priority networks and mission systems to assure DoD’s ability to carry out its most critical  missions. As a part of this work, every major DoD exercise should include a cyber red team  to test DoD's cyber defenses in a realistic scenario where the Department could have its  operations disrupted by an adversary. Components will be audited regularly to ensure  progress in incorporating red team findings and improving their cybersecurity posture.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67403fe8-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_27</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Insider Threats</Name><Description>Mitigate the risk of insider threats.</Description><Identifier>_d4481b34-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.H</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The nation's defense depends upon the fidelity of those  entrusted with the nation's secrets. The Defense Department has invested in the  technological and personnel solutions necessary to identify threats before they can impact  U.S. national security. The Defense Department continues to deploy and implement these  solutions through continuous network monitoring, improved cybersecurity training for the  workforce, and improved methods for identifying, reporting, and tracking suspicious  behavior.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67404240-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_28</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Awareness, Anticipation, Detection &amp; Response</Name><Description>Create a culture of awareness to anticipate, detect, and respond to insider  threats,</Description><Identifier>_d4481d0a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.H.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>This work extends beyond information technology and includes matters of personnel  and reliability. Mitigating the insider threat requires good leadership and accountability  throughout the workforce. Beyond implementing policies and protocols, leaders will  strive to create a culture of awareness to anticipate, detect, and respond to insider  threats before they have an impact.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674044b6-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_29</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Civil Authorities</Name><Description>Exercise to provide Defense Support of Civil Authorities.</Description><Identifier>_d4481fa8-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.I</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Civil Authorities</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Under its existing and planned  force structure, DoD will develop a framework and exercise its Defense Support of Civil  Authorities (DSCA) capabilities in support of DHS and other agencies and with state and  local authorities to help defend the federal government and the private sector in an  emergency if directed.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67404718-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_30</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Critical Infrastructure</Name><Description>Exercise for contingencies that may require emergency allocation of forces to  help protect critical infrastructure.</Description><Identifier>_d4482200-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.I.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>DHS</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>FBI</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD‘s annual exercise program, to include Cyber Guard, will include exercising with  DHS and the FBI for contingencies that may require emergency allocation of forces to  help protect critical infrastructure, under  partner agencies’ lead. This framework will  describe how combatant commands and combat  support agencies can partner with DHS and FBI  and other agencies to improve integration,  training and support.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740498e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_31</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>National Guard</Name><Description>Define and refine the National Guard’s role in supporting law enforcement,  Homeland Defense, and Defense Support of Civil Authorities missions.</Description><Identifier>_d44823ea-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.J</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Guard</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will work  with the National Guard to define the  coordinate, train, advise, and assist (C/TAA)  roles of the National Guard force and refine  implementation through Cyber Guard 16-1.  Under its existing and planned force structure, National Guard forces will exercise to coordinate, train, advise, and assist state and local  agencies and domestic critical infrastructure and to provide support to law enforcement,  Homeland Defense, and Defense Support of Civil Authorities activities in support of  national objectives.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67404cea-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_32</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Data Protection</Name><Description>Improve accountability and responsibility for the protection of data across DoD and the DIB.</Description><Identifier>_d44826a6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Cyber Crime Center</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will ensure that policies and any associated federal rules or  contract language requirements have been implemented to require DIB companies to report  data theft and loss to the Defense Cyber Crime Center. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67404f6a-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_33</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>DFARS</Name><Description>Assess Defense Federal Acquisition Regulation Supplement (DFARS) rules and associated guidance to ensure they mature over time in a manner  consistent with known standards for protecting data.</Description><Identifier>_d44828fe-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.1</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will continue to assess Defense Federal Acquisition Regulation Supplement  (DFARS) rules and associated guidance to ensure they mature over time in a manner  consistent with known standards for protecting data from cyber adversaries, to include  standards promulgated by the National Institute of Standards and Technology (NIST). </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67405208-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_34</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Information Sharing</Name><Description>Expand companies' participation in threat information sharing programs.</Description><Identifier>_d4482ade-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Companies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will continue to expand companies' participation in threat information sharing  programs, such as the Cyber Security/Information Assurance program. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740549c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_35</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Education &amp; Training</Name><Description>Expand education and training programs to include material for  DoD personnel and DIB contractors to enhance their cyber threat awareness.</Description><Identifier>_d4482dae-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense  Security Service</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Personnel</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DIB Contractors</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>As the certification authority for DIB cleared defense contractor sites, the Defense  Security Service will expand education and training programs to include material for  DoD personnel and DIB contractors to enhance their cyber threat awareness. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67405730-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_36</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Acquisition &amp; Technology Programs</Name><Description>Review the sufficiency of current classification guidance for critical acquisition and technology programs.</Description><Identifier>_d4482ffc-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Intelligence</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>In addition, the Office of the Under Secretary of Defense for Intelligence will review the sufficiency of current classification guidance for critical acquisition and technology  programs to protect information on contractor networks.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674059d8-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_37</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Procurement &amp; Acquisition Cybersecurity</Name><Description>Strengthen DoD’s procurement and acquisition cybersecurity standards.</Description><Identifier>_d4483272-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.L</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To defend DoD  networks, DoD must strengthen the cybersecurity requirements of DoD’s network  acquisition and procurement items by integrating cybersecurity standards into contract  vehicles for research, development, and procurement. DoD will specify additional  cybersecurity standards for industry to meet for components of any DoD procurement item.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67405c76-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_38</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Collaboration</Name><Description>Build collaboration between the acquisition, intelligence, counterintelligence, law  enforcement, and operations communities to prevent, mitigate, and respond to data loss.</Description><Identifier>_d4483538-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Acquisition Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Intelligence Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Counterintelligence Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Operations Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will establish a Joint Acquisition Protection and Exploitation Cell (JAPEC) to link  intelligence, counterintelligence, and law enforcement agents with acquisition program  managers to prevent and mitigate data loss and theft. DoD will conduct comprehensive risk  and damage assessments of cyber espionage and theft to inform requirements, acquisition,  programmatic, and counterintelligence courses of action.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67405f14-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_39</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Information System Security Controls</Name><Description>Assess and update specific information system security controls that underpin the DFARs for defense contractors.</Description><Identifier>_d44837b8-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Defense Contractors</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>DoD CIO</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The DoD CIO, in collaboration with the Office of the Under Secretary of Defense for  Acquisition, Technology, and Logistics, will assess and update specific information  system security controls that underpin the DFARs for defense contractors within the  NIST and DFARS standards. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674061c6-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_40</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Alert Capabilities &amp; Cyber Defenses</Name><Description>Work with companies to develop alert capabilities and build layered cyber defenses.</Description><Identifier>_d44839ca-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Companies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To safeguard critical programs and technologies DoD will work with companies to  develop alert capabilities and build layered cyber defenses.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740648c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_41</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Risk &amp; Damage Assessment</Name><Description>Streamline risk and damage assessment processes to better inform decisions to  maintain, modify, or cancel penetrated programs. </Description><Identifier>_d4483c86-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Cyber Crime Center</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor to the Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Finally, the Defense Cyber Crime Center, the Principal Cyber Advisor to the Secretary of  Defense, and the Office of the Under Secretary of Defense for Acquisition, Technology,  and Logistics will collaborate with the Services' Damage Assessment Management  Offices to streamline risk and damage assessment processes to better inform decisions to  maintain, modify, or cancel penetrated programs. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740673e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_42</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Intrusions</Name><Description>Use DoD counterintelligence capabilities to defend against intrusions.</Description><Identifier>_d4483ef2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.N</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Military Departments</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Military Departments and the Under Secretary of Defense for Intelligence, in consultation with the  Principal Cyber Advisor, will develop a strategy for the Secretary of Defense’s approval that  maximizes the capabilities and authorities of the military departments’ counterintelligence  agencies to identify, attribute, and defend against cyber intruders. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674069fa-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_43</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Espionage</Name><Description>Improve insight into and frustrate and defeat cyber espionage.</Description><Identifier>_d4484104-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.N.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Counterintelligence Authorities</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Intelligence Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Community</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Counterintelligence authorities are uniquely positioned to improve our insight into and  frustrate and defeat cyber espionage. The strategy will specify how DoD’s  counterintelligence agencies will collaborate more effectively with the broader U.S.  intelligence and law enforcement communities on investigations and human and  technical operations to thwart cyber-enabled intellectual property theft against the  United States and its allies and partners.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67406cca-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_44</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Intellectual Property</Name><Description>Counter intellectual property theft.</Description><Identifier>_d44843d4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.O</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will continue to work with other agencies of the U.S.  government to counter the threat posed by intellectual property theft through cyberspace.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67406fa4-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_45</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal><Goal><Name>Homeland &amp; Interests</Name><Description>BE PREPARED TO DEFEND THE U.S. HOMELAND AND U.S. VITAL INTERESTS FROM DISRUPTIVE OR DESTRUCTIVE CYBERATTACKS OF  SIGNIFICANT CONSEQUENCE.</Description><Identifier>_d4484654-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Department of Defense must work with its  interagency partners, the private sector, and allied  and partner nations to deter and if necessary defeat a  cyberattack of significant consequence on the U.S.  homeland and U.S. interests. The Defense  Department must develop its intelligence, warning,  and operational capabilities to mitigate sophisticated,  malicious cyberattacks before they can impact U.S.  interests. Consistent with all applicable laws and  policies, DoD requires granular, detailed, predictive,  and actionable intelligence about global networks  and systems, adversary capabilities, and malware  brokers and markets. To defend the nation, DoD  must build partnerships with other agencies of the  government to prepare to conduct combined cyber  operations to deter and if necessary defeat aggression  in cyberspace. The Defense Department is focused on  building the capabilities, processes, and plans  necessary to succeed in this mission. </OtherInformation><Objective><Name>Threats</Name><Description>Continue to develop intelligence and warning capabilities to anticipate threats.</Description><Identifier>_d4484866-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.A</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To defend  the nation against cyberattacks of significant consequence, DoD will work with the broader  intelligence community to develop intelligence capabilities about adversary activities and  prepare to disrupt cyberattacks before they can impact the U.S. homeland and U.S. interests.  To meet combatant command contingency requirements, DoD will expand its intelligence of  key adversary human and technical networks. To operate effectively in cyberspace DoD  requires cyber intelligence and warning and shared situational awareness through all  phases of a potential operation. All intelligence collection will follow the law and guidance  outlined in executive orders.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67407b2a-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_46</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Capabilities</Name><Description>Develop and exercise capabilities to defend the nation.</Description><Identifier>_d4484b68-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Mission Force</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The National Mission Force and  other relevant DoD components will train and partner with key interagency organizations to prepare to conduct cyber operations to defend the nation from cyberattacks of significant  consequence. In addition, DoD will practice emergency procedures through regular  exercises at all levels of the Department and support interagency exercises to practice emergency and deliberate cyber action procedures.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67407e68-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_47</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Partnerships</Name><Description>Build partnerships to defend the nation.</Description><Identifier>_d4484df2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will have a framework in place to  cooperate with other government  agencies to conduct defend the nation  operations. DoD will work with FBI, CIA,  DHS and other agencies to build  relationships and integrate capabilities to  provide the President with the widest  range of options available to respond to a cyberattack of significant consequence to  the United States.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67407e69-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_48</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Annual Reviews</Name><Description>Conduct an annual comprehensive review of DoD’s defend the nation capabilities.</Description><Identifier>_d4485018-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department’s  requirements and capabilities for its  mission to defend the nation against  cyberattacks of significant consequence  will evolve over time. On an annual basis, DoD will conduct an in-depth review of the  capabilities available and required for the mission. As a part of this review, DoD will  validate new requirements and identify gaps and initiatives to pursue.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674080ca-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_49</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Critical Infrastructure</Name><Description>Develop innovative approaches to defending U.S. critical infrastructure.</Description><Identifier>_d448532e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.C</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will work  with DHS to improve the Enhanced Cybersecurity Services program and encourage  additional critical infrastructure entities to participate, with a particular emphasis on  increasing the number of defense critical infrastructure participants.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67408412-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_50</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Information Sharing</Name><Description>Develop automated information sharing tools.</Description><Identifier>_d44855e0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.D</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>DHS</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Congress</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>The Private Sector</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To improve shared situational awareness  DoD will partner with DHS and other agencies to develop continuous, automated,  standardized mechanisms for sharing information with each of its critical partners in the  U.S. government, key allied and partner militaries, state and local governments, and the  private sector. In addition, DoD will work with other U.S. government agencies and  Congress to support legislation that enables information sharing between the U.S.  government and the private sector.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67408746-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_51</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Deterrence</Name><Description>Assess DoD’s cyber deterrence posture and strategy.</Description><Identifier>_d44858f6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.E</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Science  Board</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Task Force on Cyber Deterrence</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>U.S. Strategic Command</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Building off of the Defense Science  Board’s Task Force on Cyber Deterrence, U.S. Strategic Command (USSTRATCOM), in  coordination with the Joint Staff and the Office of the Secretary of Defense, will assess the  Department of Defense’s ability to deter specific state and non-state actors from conducting  cyberattacks of significant consequence on the U.S. homeland and against U.S. interests, to include loss of life, significant destruction of property, or significant impact on U.S. foreign  and economic policy interests.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67408aa2-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_52</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Capabilities &amp; Actions</Name><Description>Determine whether DoD is building the capabilities required for attributing and deterring key threats from conducting such attacks and recommend specific actions that DoD can take to improve its cyber deterrence posture.</Description><Identifier>_d4485c3e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.E.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>USSTRATCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>In conducting its analysis, USSTRATCOM must determine whether DoD is building the  capabilities required for attributing and deterring key threats from conducting such  attacks and recommend specific actions that DoD can take to improve its cyber  deterrence posture. Careful attention should be devoted also to deterring non-state  actors that may fall outside of traditional deterrence frameworks but which could pose a  considerable threat to U.S. interests.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67408dfe-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_53</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal><Goal><Name>Options</Name><Description>BUILD AND MAINTAIN VIABLE CYBER OPTIONS AND  PLAN TO USE THOSE OPTIONS TO CONTROL CONFLICT ESCALATION AND TO  SHAPE THE CONFLICT ENVIRONMENT AT ALL STAGES.</Description><Identifier>_d4485ee6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>President of the United States</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combatant Commands</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>During heightened tensions or outright hostilities, DoD must be able to provide the President  with a wide range of options for managing conflict escalation. If directed, DoD should be able to use cyber operations to disrupt an adversary’s command and control networks, military-related  critical infrastructure, and weapons capabilities. As a part of the full range of tools available to  the United States, DoD must develop viable cyber options and integrate those options into  Departmental plans. DoD will develop cyber capabilities to achieve key security objectives with  precision, and to minimize loss of life and destruction of property. To ensure unity of effort,  DoD will enable combatant commands to plan and synchronize cyber operations with kinetic  operations across all domains of military operations.</OtherInformation><Objective><Name>Options</Name><Description>Integrate cyber options into plans.</Description><Identifier>_d4486120-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Allies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To meet strategic end-states as defined by the Guidance  for the Employment of the Force, combatant command plans, and other strategic guidance  documents, DoD will work with agencies of the U.S. government as well as U.S. allies and  partners to integrate cyber options into combatant command planning.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740916e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_54</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Requirements</Name><Description>Accelerate the integration of cyber requirements into plans.</Description><Identifier>_d4486454-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USSTRATCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Chairman of the Joint Chiefs of Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Mission Forces</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will accelerate the integration of cyber requirements into combatant command plans. Plans must outline and define specific cyberspace effects against targets. To facilitate this work, the Joint Staff will work with USSTRATCOM to synchronize and integrate requirements into planning and provide recommendations to the Chairman of the Joint Chiefs of Staff on the alignment, allocation, assignment, and apportionment of Cyber Mission Forces.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_674094e8-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_55</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal><Goal><Name>Alliances &amp; Partnerships</Name><Description>BUILD AND MAINTAIN ROBUST INTERNATIONAL  ALLIANCES AND PARTNERSHIPS TO DETER SHARED THREATS AND INCREASE INTERNATIONAL SECURITY AND STABILITY.</Description><Identifier>_d4486706-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>All three of DoD’s cyber missions require close collaboration with foreign allies and partners. In  its international cyber engagement DoD seeks to build partnership capacity in cybersecurity  and cyber defense, and to deepen operational partnerships where appropriate.  Given the high demand and relative scarcity of cyber resources, the Department of Defense  must make hard choices and focus its partnership capacity initiatives on areas where vital U.S.  national interests are stake. Over the next five years, in addition to ongoing partner capacity  building efforts in other regions, DoD will focus its international engagement on: the Middle  East, the Asia-Pacific, and key NATO allies. Through the course of this strategy DoD will  constantly assess the international environment and develop innovative partnerships to  respond to emerging challenges and opportunities.</OtherInformation><Objective><Name>Partner Capacity</Name><Description>Build partner capacity in key regions.</Description><Identifier>_d4486954-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Allies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Partners</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>U.S. Department of State</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Under its existing and planned force structure, DoD  will work with key allies and partners to build partner capacity and help secure the critical  infrastructure and key resources on which DoD missions and U.S. interests depend. The  Defense Department will work regularly with other agencies of the U.S. government, to  include the Department of State, in building partner capacity. Priority regions include the  Middle East, Asia-Pacific, and Europe.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740995c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_56</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Middle Eastern Networks &amp; Systems</Name><Description>Support the hardening and resiliency of Middle Eastern allies’ and partners’ networks and systems.</Description><Identifier>_d4486ca6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Middle Eastern Allies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Middle Eastern Partners</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>As a part of its cyber dialogue and partnerships, DoD will work with key  Middle Eastern allies and partners to improve their ability to secure their military  networks as well as the critical infrastructure and key resources upon which U.S.  interests depend. Key initiatives include improved information sharing to establish a unified understanding of the cyber threat, an assessment of our mutual cyber defense  posture, and collaborative approaches to building cyber expertise.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_67409cf4-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_57</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Asian Networks &amp; Systems</Name><Description>Support the hardening and resiliency of Northeast Asian allies’ networks and systems.</Description><Identifier>_d4486f80-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Northeast Asian Allies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>As a part of its broader cyber  dialogue with Asian allies, DoD will work  with key allies and partners to improve  their ability to secure their military  networks and critical infrastructure and  key resources upon which U.S. and allied  interests depend.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740a596-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_58</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Asia-Pacific Region</Name><Description>Build new strategic partnerships in the Asia-Pacific region.</Description><Identifier>_d44871e2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense  Department will work with key states  across the Asia-Pacific to build cyber  capacity and minimize risk to U.S. and  allied interests, in a manner consistent  with DoD’s International Cyberspace  Security Cooperation Guidance.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740a597-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_59</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>NATO Allies</Name><Description>Work with key NATO allies to mitigate cyber risks to DoD and U.S. national interests.</Description><Identifier>_d448753e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>NATO Allies</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The Defense Department will develop these partnerships through the defense  consultations that DoD holds with its key NATO allies.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740a7a8-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_60</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Alliances &amp; Partnerships</Name><Description>Build alliances and partnerships to best respond to shifts in the strategic environment.</Description><Identifier>_d4487804-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.v</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will remain flexible and agile as it builds alliances and partnerships to best respond to shifts in the strategic environment.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740ab4a-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_61</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Malware</Name><Description>Develop solutions to counter the proliferation of destructive malware.</Description><Identifier>_d4487a70-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>State and non-state  actors seek to acquire destructive malware. The uncontrolled spread of destructive malware  to hostile actors presents a significant risk to the international system. Working with the  Department of State and other agencies of the U.S. government as well as U.S. allies and  partners, the Defense Department will draw on best-practices to counter the proliferation of  destructive malware within the international system. In addition to international regimes  and best-practices, the U.S. government has a range of domestic export control regimes for  governing dual-use technologies that can be used to prevent proliferation. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740aef6-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_62</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Planning &amp; Training</Name><Description>Work with capable international partners to plan and train for cyber operations.</Description><Identifier>_d4487dea-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.C</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Throughout the course of this strategy, DoD will strengthen its international alliances and  partnerships to develop combined capabilities to achieve cyber effects in support of  combatant command plans.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740b298-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_63</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Dialogue</Name><Description>Strengthen the United States cyber dialogue with China to enhance strategic stability.</Description><Identifier>_d448818c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.D</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>China</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Cyber Working Group</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Russia</Name><Description>If and when U.S.-Russia military relations resume, as a part of broader interagency efforts DoD will seek  to develop a military-to-military cyber dialogue with Russia to foster strategic stability in cyberspace. </Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Through the course of this strategy, as part of the U.S.-China Defense Consultative Talks and related dialogues, such as the Cyber Working Group, DoD will continue to hold  discussions with China to bring greater understanding and transparency of each nation’s  military doctrine, policy, roles and missions in cyberspace. The goal of this work is to reduce  the risks of misperception and miscalculation that could contribute to escalation and  instability. DoD will support U.S. government efforts to strengthen confidence-building  measures to bring a greater level of trust to the U.S.-China relationship. In addition, DoD  will continue to raise concerns about China’s cyber enabled theft of U.S. intellectual  property, trade secrets, and confidential business information.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740b64e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_64</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal><Goal><Name>Management</Name><Description>Manage the strategy.</Description><Identifier>_d44883ee-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI</SequenceIndicator><Stakeholder><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>To achieve the goals and objectives outlined in this strategy will require hard choices regarding  cyber forces and personnel, organizations, and capabilities. The financial choices that DoD  makes in the course of implementing this strategy will have national and global implications for  years to come, and DoD must operate in an effective and cost-efficient manner to guarantee the  best return on its investments. To that end, DoD will pursue the following management  objectives to govern its cyber activities and missions. </OtherInformation><Objective><Name>Principal Cyber Advisor</Name><Description>Establish the Office of the Principal Cyber Advisor to the Secretary of Defense.</Description><Identifier>_d448875e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Principal Cyber Advisor</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>In the National Defense Authorization Act (NDAA) of 2014, Congress required the Defense  Department to designate a Principal Cyber Advisor to the Secretary of Defense to review  military cyberspace activities, cyber mission forces, and offensive and defensive cyber  operations and missions. In addition, the Principal Cyber Advisor will govern the  development of DoD cyberspace policy and strategy for the DoD enterprise.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740b9fa-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_65</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Governance</Name><Description>Build an intradepartmental team to ensure effective governance of cyber issues within DoD.</Description><Identifier>_d4488a38-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Policy</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Personnel and Readiness</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Principal Staff Assistants (PSA)</Name><Description>in the office of the  Secretary of Defense</Description><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>The 2014 NDAA also stipulated that this Principal Cyber Advisor integrate the cyber  expertise and perspectives of key organizations to build an intradepartmental team of  key players to ensure effective governance of cyber issues within DoD. The Principal  Cyber Advisor responsibilities assigned by the FY14 NDAA shall not be interpreted to  affect the existing responsibilities and authorities of the Under Secretary of Defense for  Acquisition, Technology, and Logistics; the Under Secretary of Defense for Policy; the  Under Secretary of Defense for Intelligence; the Under Secretary of Defense for  Personnel and Readiness; or any other Principal Staff Assistant (PSA) in the office of the  Secretary of Defense in cyber-related responsibilities and authorities. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740bdba-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_66</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Management Review</Name><Description>Review DoD’s cyber management.</Description><Identifier>_d4488cae-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD  Components</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Investment and Management Board (CIMB)</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and  Logistics</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>An intradepartmental team. The Principal Cyber Advisor will work with DoD  components through the Cyber Investment and Management Board (CIMB) to review  DoD’s cyber management. The CIMB will be a forum for synchronization, coordination,  and project management. It will not replicate existing programmatic and budgetary  mechanisms or interfere with previously defined Principal Staff Assistant roles and  authorities, nor will it interfere in any way with the military chain of command; rather, it  will provide a single forum to integrate cyber initiatives, it will manage projects through completion, and streamline DoD’s cyber governance structures. The PCA will work  with the Office of the Under Secretary of Defense for Acquisition, Technology, and  Logistics and the Joint Staff to build an intradepartmental team of DoD representatives  to support the CIMB in this work.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740c22e-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_67</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Issue Coordination</Name><Description>Provide senior-level coordination on key cyber issues.</Description><Identifier>_d4489028-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>CIMB</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>OSD</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>A senior executive forum. Subordinate and reporting to the CIMB, a senior executive  forum will provide initial senior-level coordination on key cyber issues. The senior  executive forum will recommend courses of action to the CIMB and will coordinate with  other OSD and Joint Staff governance bodies to facilitate unity of effort and resolve  management issues at appropriate levels.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740c580-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_68</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Budgetary &amp; Financial Coordination</Name><Description>Coordinate budgetary and financial recommendations.</Description><Identifier>_d4489316-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Deputy’s Management Action Group</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>CIMB</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>If and when a budgetary or financial matter comes into play during the Program and  Budget Review process, the Principal Cyber Advisor will use the senior executive forum and the CIMB to coordinate recommendations for the Deputy’s Management Action Group or other financial and budgetary organizations, vetting options and alternatives through the issue teams as appropriate.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740c8d2-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_69</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Cyber Budgetary Management</Name><Description>Improve cyber budgetary management. </Description><Identifier>_d44895a0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.B</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>DoD will develop an agreed-upon method to more  transparently and effectively manage the DoD cyber operations budget. Today cyber  funding is spread across the DoD budget, to include the Military Intelligence Program  (MIP), in multiple appropriations, budget lines, program elements, and projects. In addition,  the Under Secretary of Defense for Intelligence, on behalf of DoD, ensures that all National  Intelligence Program (NIP) investments are aligned to support DoD missions. The diffuse  nature of the DoD cyber budget presents DoD with a challenge for effective budgetary  management; DoD must develop a new method for  managing cross-program funding to improve  mission effectiveness and achieve management  efficiencies. </OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740cc38-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_70</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Operations &amp; Policy framework</Name><Description>Develop DoD’s cyber operations and cybersecurity policy framework. </Description><Identifier>_d448994c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.C</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>[To be named]</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>Consistent with  Presidential guidance, DoD will align and simplify  its cyber operations and cybersecurity policy  management and identified gaps, overlaps, seams,  conflicts, and areas in need of revision in current  documentation. This effort will help translate  national and departmental guidance and policy into  tactical operations. It is essential to clarifying  conflicts in existing documentation that currently  complicate cyber operations and cybersecurity  governance.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740cfb2-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_71</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective><Objective><Name>Capability Assessement</Name><Description>Conduct an end-to-end assessment of DoD’s cyber capabilities.</Description><Identifier>_d4489c58-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.D</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor to the Secretary of Defense</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Director of Coast Assessment and Program Evaluation</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/><Role><Name>[To be named]</Name><Description/></Role></Stakeholder><OtherInformation>U.S. Cyber Command will lead a comprehensive operational assessment of its posture. In coordination with  the Principal Cyber Advisor to the Secretary of Defense, the Office of the Under  Secretary of Defense for Acquisition, Technology, and Logistics, and the Office of the  Director of Coast Assessment and Program Evaluation, USCYBERCOM will provide  short- and long-term recommendations through the CIMB to provide to the Secretary of Defense regarding organizational structure, command and control mechanism, rules of  engagement, personnel, capabilities, tools, and potential operational gaps. The goal of  this posture assessment will be to provide a clear understanding of the future  operational environment; key stakeholder views; as well as strategic priorities, choices,  and resources for planning and operations.</OtherInformation><PerformanceIndicator ><SequenceIndicator/><MeasurementDimension/><UnitOfMeasurement/><Identifier>_6740d32c-67a0-11e5-a7c5-e7ec8df7775b</Identifier><Relationship><Identifier>PLACEHOLDER_72</Identifier><Name/><Description/></Relationship><MeasurementInstance><TargetResult><Description>[To be described]</Description><StartDate/><EndDate/></TargetResult><ActualResult><Description>[To be determined]</Description><StartDate/><EndDate/></ActualResult></MeasurementInstance><OtherInformation/></PerformanceIndicator></Objective></Goal></StrategicPlanCore><AdministrativeInformation><Identifier>_6740d6b0-67a0-11e5-a7c5-e7ec8df7775b</Identifier><StartDate>2015-04-30</StartDate><EndDate/><PublicationDate>2015-09-30</PublicationDate><Source>http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf</Source></AdministrativeInformation><Submitter><Identifier>_6740da2a-67a0-11e5-a7c5-e7ec8df7775b</Identifier><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></PerformancePlanOrReport>