Security Criteria Development: Exceedin...
(SCD) Security Criteria Development: Exceeding DHS Guidelines – A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into...
Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
Flowdowns: Are you Flowing FAR and DFAR...
The Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement (DFARS) requires Federal prime contractors and subcontractors, small and large alike, to flow-down certain clauses from their contracts when buying items from their suppliers and subcontractors. Although Small businesses are exempt from the requirement for subcontracting plans, small businesses are not exempt from FAR and DFARS flowdown requireme...
Introduction to the Defense Federal Acq...
The DFARS provides Department of Defense (DoD) implementation and supplementation of the Federal Acquisition Regulation (FAR). The DFARS contains requirements of the law, DoD-wide policies, delegations of FAR authorities, deviations from FAR requirements, and policies/procedures that have a significant effect on the public. Relevant procedures, guidance, and information that do not meet the criteria for inclusion in the DFARS are issued in the...
Leveraging CDM DEFEND: Agile Cybersecur...
Earn 1 CEU! Nation-state, mercenary, cyber-jihadist and other adversaries continue to exploit vulnerabilities in Frankensteined legacy systems despite the growing outcry among agency and legislative leaders demanding action. Meaningful change requires tools which give agency leaders the agility, flexibility, visibility, and contract vehicles to quickly acquire new, cutting-edge cybersecurity solutions. CDM DEFEND is a powerful single award tas...
Sensitive Compartmented Information Fac...
Sensitive Information Facility Design and Construction (SCIF) – After attending this unclassified class, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of co...
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
Using Building Design to Reduce the Eff...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
UFC-Minimum Antiterrorism Standards for...
UFC – Minimum Antiterrorism Standards for DOD Buildings (UFC) – This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize students with the fundamentals of Security Engineering and antiterrorism related to protecting...
CSX Brainstorm
We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While the Federal government is focused on security, new adversaries and attack vectors still emerge hourly. What are the early grades on the new Administration’s response to the growing cyber threat? How can collaborative tactics...
September 20, 2017
Organizer:
MeriTalk Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.