U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. Events
  3. Basic Cyber Hygiene: “How To Verify” For Federal Contracting Teams
Online

Basic Cyber Hygiene: “How to verify” for federal contracting teams

@ 1:00 pm EDT
Cyber Solutions Banner
  • Register Now Button

     

    Intended Audience:  Anyone with DoD contract cybersecurity responsibilities. Learn basic cybersecurity!  Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognize compliant cybersecurity requirements by the end of the meeting.  Contracting Teams will learn litmus-test-type questions to ask.   Does your contract only handle Federal Contracting Information?   Walk away understanding what is required, compliance documentation and recognize compliant cybersecurity DAUCYBER SOLUTIONS:  BASIC CYBER HYGIENE WALK THROUGH of the FAR 52-204.21 and the Proposed CMMC LEVEL 1.

    Speakers
    Image
    Kelley

    Kelley Kiernan

    Professor of Cybersecurity

    Kelley Kiernan is a professor of Cybersecurity and Information Protection at the DoD’s Defense Acquisition University.   Kelley Kiernan is a cybersecurity and small business ecosystem leader, who applies her experience from Industry, NASA, Navy, Air Force and Space Force to pave the way for robust cybersecurity adoption in the acquisition ecosystem.  Kelley is an engineer, scientist and an innovation expert. She is a graduate of the Air Force Academy and served as an Air Force officer where she was a recipient of the Air Medal. Kelley's champion leadership brings robust cybersecurity within the reach of everyone.


Other Events in Series: DoD Cyber Solutions

Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognized implementation of the fifteen requirements to keep Federal Contracting Information from becoming pubic by the end of the meeting. Contracting Teams will learn questions…
The concept of the DoD supply chain is key to understanding the security of the lifecycle of acquisition.  Learn about supply chains and the DoD contract requirements found in contracts. Let’s talk about questions to ask around supply chain risk management to verify the requirements are in…
  Intended Audience:  Anyone with DoD contract cybersecurity responsibilities. Learn basic cybersecurity!  Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognize compliant cybersecurity requirements by the end…
  The DFARS 252.204-7012 requires contractors who are provided or generate Controlled Unclassified Information for the DoD to implement the cybersecurity standard NIST SP 800-171.  The DoD IG has several reports about how this implementation is going.  Let’s talk about NIST SP 800-…
  Every DoD Supplier/Contractor has contractual requirements to report cyber incidents back to the DoD.  Let’s go over those requirements and how they impact the contracting team and it’s IPT.  We will walk through the scenarios and the reports, as well as what to expect after a…
  Intended Audience:  Anyone with DoD contract cybersecurity responsibilities. Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognized implementation of the fifteen requirements to keep Federal Contracting…
  Intended Audience:  Anyone with DoD contract cybersecurity responsibilities. Listen to Georgetown University Professor, Chuck Brooks talk about how AI will change the world and DoD contract cybersecurity along with it. DoD Contracts will continue to increase their use of AI…
  Intended Audience:  Anyone with DoD contract cybersecurity responsibilities. Contracts which bring IT or Software to the DOD must follow the federal Risk Management Framework. Learn about this contract element.  Hear about the how the Air Force Life Cycle Management Center is…
  What is a great threat to DoD contracts/data?  Phishing!  We will cover all the federal support to stay safe from the #1 predator after DoD contracts.  Hear about CISA and NSA’s programs to support DoD Contracts and the DoD cybersecurity journey.  Learn about the…
  Learn basic cybersecurity!  Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can implement the fifteen requirements by the end of the meeting.  Contracting Teams will learn litmus-test-type questions to ask.…
For full screen viewing and other options click here Everyone Handles FCI!  Learn how to recognize and implement Basic Cyber Hygiene:  for contractors and federal contracting teams Learn basic cybersecurity!  Every federal contract contains the FAR 52-204.21  We will ensure…
For full screen viewing and other options click here Basic Cyber Hygiene:  “How to” for contractors and “How to verify” for federal contracting teams Learn basic cybersecurity!  Every federal contract contains the FAR 52-204.21  We will ensure that you understand the FAR, the cyber…
For full-screen viewing and other options, please click here Do you only handle Federal Contracting Information?  Learn how to protect your micro-small company with the FAR 52.204-21/CMMC Level 1. Walk away understanding what is required, how to document your compliance and how to create…
To view in full-screen and other options, click here Date: Thursday, May 23, 2024 Time: 1:00 P.M. - 3:30 P.M. (Eastern) /10:00 A.M - 12:30 P.M. (Pacific) Event Description: Join DoD Cyber Solutions for two talks about Risk Management Framework (RMF).  If you are a Small Business Innovation…
    Do you only handle Federal Contracting Information?  Learn how to protect your micro-small company with the FAR 52.204-21/CMMC Level 1.  Walk away understanding what is required, how to document your compliance and how to create a culture of cybersecurity to protect your…
There isn't any Discussion information at this moment.
There isn't any FAQ information at this moment.
There isn't any contact information at this moment.