-
For full screen viewing and other options click here
Basic Cyber Hygiene: “How to” for contractors and “How to verify” for federal contracting teams
Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can implement the fifteen requirements by the end of the meeting. Contracting Teams will learn litmus-test-type questions to ask. Do you only handle Federal Contracting Information? Walk away understanding what is required, how to document your compliance and how to create a culture of cybersecurity to protect your business everywhere you want to grow it!
SpeakersImageKelley Kiernan
Professor of CybersecurityKelley Kiernan is a professor of Cybersecurity and Information Protection at the DoD’s Defense Acquisition University. Kelley Kiernan is a cybersecurity and small business ecosystem leader, who applies her experience from Industry, NASA, Navy, Air Force and Space Force to pave the way for robust cybersecurity adoption in the acquisition ecosystem. Kelley is an engineer, scientist and an innovation expert. She is a graduate of the Air Force Academy and served as an Air Force officer where she was a recipient of the Air Medal. Kelley's champion leadership brings robust cybersecurity within the reach of everyone.
ImageJohn Whitmer
Professor of CybersecurityJohn Whitmer, Professor of Cybersecurity at DAU John began working in cybersecurity 25 years ago in college and after getting his Systems Engineering degree worked as a consultant for the Silicon Valley financial sector building security stacks to protect data in the booming days of the dotcom era. He began government service 20 years ago at NAVAIR managing RDT&E security environments and later serving as the Deputy Associate Director for Security at the High Performance Computing Modernization Office. He has an MS in Information Security, a dozen technical professional certifications including CISSP, OSEP/OSCP and has been teaching with DAU since Dec 2022.
Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognized implementation of the fifteen requirements to keep Federal Contracting Information from becoming pubic by the end of the meeting. Contracting Teams will learn questions…
The concept of the DoD supply chain is key to understanding the security of the lifecycle of acquisition. Learn about supply chains and the DoD contract requirements found in contracts. Let’s talk about questions to ask around supply chain risk management to verify the requirements are in…
Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognize compliant cybersecurity requirements by the end…
Come and be the first to hear about the Army’s newest acquisition pilot from Matthew Picerno, ASA(ALT) Chief Cyber Acquisition Officer: Next-Gen Commercial Operations in Defended Enclaves (N-CODE). Worked in association with the Office of the Assistant Secretary…
Every DoD Supplier/Contractor has contractual requirements to report cyber incidents back to the DoD. Let’s go over those requirements and how they impact the contracting team and it’s IPT. We will walk through the scenarios and the reports, as well as what to expect after a…
Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can recognized implementation of the fifteen requirements to keep Federal Contracting Information from…
Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Listen to Georgetown University Professor, Chuck Brooks talk about how AI will change the world and DoD contract cybersecurity along with it. DoD Contracts will continue to increase their use of AI…
Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Contracts which bring IT or Software to the DOD must follow the federal Risk Management Framework. Learn about this contract element. Hear about the how the Air Force Life Cycle Management Center is…
What is a great threat to DoD contracts/data? Phishing! We will cover all the federal support to stay safe from the #1 predator after DoD contracts. Hear about CISA and NSA’s programs to support DoD Contracts and the DoD cybersecurity journey. Learn about the…
Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can implement the fifteen requirements by the end of the meeting. Contracting Teams will learn litmus-test-type questions to ask.…
For full screen viewing and other options click here
Everyone Handles FCI! Learn how to recognize and implement Basic Cyber Hygiene: for contractors and federal contracting teams
Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure…
For full screen viewing and other options click here
Basic Cyber Hygiene: “How to” for contractors and “How to verify” for federal contracting teams
Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber…
For full-screen viewing and other options, please click here
Do you only handle Federal Contracting Information? Learn how to protect your micro-small company with the FAR 52.204-21/CMMC Level 1. Walk away understanding what is required, how to document your compliance and how to create…
To view in full-screen and other options, click here
Date: Thursday, May 23, 2024
Time: 1:00 P.M. - 3:30 P.M. (Eastern) /10:00 A.M - 12:30 P.M. (Pacific)
Event Description: Join DoD Cyber Solutions for two talks about Risk Management Framework (RMF). If you are a Small Business Innovation…
Do you only handle Federal Contracting Information? Learn how to protect your micro-small company with the FAR 52.204-21/CMMC Level 1. Walk away understanding what is required, how to document your compliance and how to create a culture of cybersecurity to protect your…
There isn't any Discussion information at this moment.
There isn't any FAQ information at this moment.
There isn't any contact information at this moment.