Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
Flowdowns: Are you Flowing FAR and DFAR...
The Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement (DFARS) requires Federal prime contractors and subcontractors, small and large alike, to flow-down certain clauses from their contracts when buying items from their suppliers and subcontractors. Although Small businesses are exempt from the requirement for subcontracting plans, small businesses are not exempt from FAR and DFARS flowdown requireme...
Introduction to the Defense Federal Acq...
The DFARS provides Department of Defense (DoD) implementation and supplementation of the Federal Acquisition Regulation (FAR). The DFARS contains requirements of the law, DoD-wide policies, delegations of FAR authorities, deviations from FAR requirements, and policies/procedures that have a significant effect on the public. Relevant procedures, guidance, and information that do not meet the criteria for inclusion in the DFARS are issued in the...
Defense Systems Summit
IT Everywhere: Technology's Role in Tomorrow's Military The Defense Department operates a vast and sometimes-disjointed IT ecosystem that is as complicated an enterprise as any that exists today. Throughout the department, IT teams manage operations by maintaining legacy systems alongside emerging technology. The common thread throughout is the desire for speed, insight, and security. The 2018 Defense Systems Summit brings together thought lea...
Face-to-Face Cybersecurity: CDM: New In...
Big changes are coming with the third phase of the Continuous Diagnostics and Mitigation program. Even as agencies continue to work on the first and second phases, the Department of Homeland Security and the General Services are laying the groundwork for CDM Phase 3, with its focus on providing much greater and timelier insight into what’s happening on the network—and providing the tools for rapid response and recovery. GSA has alr...
Leveraging CDM DEFEND: Agile Cybersecur...
Earn 1 CEU! Nation-state, mercenary, cyber-jihadist and other adversaries continue to exploit vulnerabilities in Frankensteined legacy systems despite the growing outcry among agency and legislative leaders demanding action. Meaningful change requires tools which give agency leaders the agility, flexibility, visibility, and contract vehicles to quickly acquire new, cutting-edge cybersecurity solutions. CDM DEFEND is a powerful single award tas...
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
Using Building Design to Reduce the Eff...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
Defense Systems Summit
THE INTERSECTION OF DEFENSE IT AND DEFENSE READINESS IT is essential to readiness. Cloud, network modernization, analytics, mobility, and related technologies are reshaping how the military services and supporting agencies manage core operations and deliver mission-critical services. These technologies also provide an opportunity to reengineer those operations and services to create a much more agile and responsive IT environment—one tha...
CSX Brainstorm
We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While the Federal government is focused on security, new adversaries and attack vectors still emerge hourly. What are the early grades on the new Administration’s response to the growing cyber threat? How can collaborative tactics...
September 20, 2017
Organizer:
MeriTalk Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.