- Events
- Cybersecurity 2019
Cybersecurity 2019: Introduction and Overview
OnlineThis series, taught by two experts in the field, will walk participants through the most important issues facing government contractors as they navigate the fast-changing issues of cybersecurity. Starting with a survey of the current threats confronting all companies in the cyber world, and ending with a session about how to deal with a […]
Cybersecurity 2019: Protecting Sensitive Information
OnlineThis series, taught by two experts in the field, will walk participants through the most important issues facing government contractors as they navigate the fast-changing issues of cybersecurity. Starting with a survey of the current threats confronting all companies in the cyber world, and ending with a session about how to deal with a breach […]
Cybersecurity 2019: Regulations and Standards
OnlineIn Part 3 of the series, Jonathan Meyer and Townsend Bourne will delve into cybersecurity regulations and standards applicable to government contractors. The course will examine NIST 800-53 and NIST 800-171, the National Archives and Records Administration (NARA) rule relating to protection of Controlled Unclassified Information (CUI), and cybersecurity clauses in the FAR and DFARS. […]
Cybersecurity 2019: Confronting the threat – sharing information and spreading the risk
OnlineClass 5 in the series will address cyber threats within the organization as well as programs for sharing information on cyber threats and spreading cyber risk. We will delve into issues related to insider threat, including requirements applicable to government contractors and best practices for developing an insider threat plan. We also will discuss cyber […]
Cybersecurity 2019: Breach Investigation and Response
OnlineThis series, taught by two experts in the field, will walk participants through the most important issues facing government contractors as they navigate the fast-changing issues of cybersecurity. Starting with a survey of the current threats confronting all companies in the cyber world, and ending with a session about how to deal with a breach […]