Cybersecurity for Government Contractors: 5 Keys to Prepare for Cyber Incidents in 2017

Tuesday, February 28, 2017 • 1:00 pm ET/12:00 pm CT/11:00 am MT/10:00 am PT
1.5 CPE credits

REGISTER NOW

Please enter your desired quantity.

ONLINE

OnDemand
$189.00


$189.00 Cybersecurity for Government Contractors: 5 Keys to Prepare for Cyber Incidents in 2017 (OnDemand)

BY PHONE

1-800-677-3789

Webinar Details

Subject: Federal Contracting

Prerequisites: None

Recommended Field of Study: Specialized Knowledge and Applications

Program Knowledge Level: Basic

Advanced Preparation: None

The DFARS new rule on Network Penetration Reporting and Contracting for Cloud Services creates all new compliance challenges. 

Every DoD contract put out for bid must include a cybersecurity incident-reporting clause. Once the contract is awarded, that clause must go into action, with every prime and subcontractor implementing the right safeguards, controls, reporting practices and more.

If you don’t meet all these requirements, a single cyber incident in 2017 could expose you to potential contract terminations, or even suspension and debarment. And now that cybersecurity is an “immediate and top priority” for the Trump Administration, you can’t afford to be noncompliant.

Here’s how to protect yourself and prepare.

Register now Cybersecurity for Government Contractors: 5 Keys to Preparing for Cyber Incidents in 2017.

In this 90-minute webinar, partners from Venable’s Government Contracts Group provide expert guidance on what the new DFARS rule on Network Penetration Reporting means to every DoD contractor and subcontractor, especially those providing cloud services to government customers. From the safeguards and controls now required for defense information, to the timeframe for reporting incidents, you’ll learn where and how your current cybersecurity practices and processes must change.

Vital guidance for primes and subcontractors.  The webinar covers practical steps for government contractors, their subcontractors, and suppliers to follow in complying with this new rule. It’s the practical insight necessary for including the right incident reporting clause in every DoD contract put out for bid—and for putting the right measures in place once the contract goes “live.” Plus, you’ll have the chance to ask your own questions during the Q&A portion of the webinar.

Reserve your space now to do all it takes to comply with the new DFARS rule on Network Penetration Reporting and Contracting for Cloud Services, including how to:

  • Understand the practical requirements of the new rule and the new practices it will take to meet them
  • Prepare your incident response, including steps you’ll need to take in the event of a cyber event
  • Demonstrate adequate information safeguarding—and what controls must be in place
  • Manage compliance up and down the supply chain, including strategies prime and subcontractors can use in negotiating information safeguarding requirements in subcontracts
  • Assess the rule’s impact on cloud computing services and the contractors and subcontractors that provide them to government customers 

Bottom line: the “lessons learned” you’ll take away from this webinar can help you avoid contract terminations, suspension, debarment or even charges of False Claims.  Don’t wait—get the right cyber security precautions and practices in place before you’re involved in an incident.

Register now Cybersecurity for Government Contractors: 5 Keys to Preparing for Cyber Incidents in 2017.

Who Will Benefit

This webinar is of value to all DOD primes and subs. Attendees who will see the greatest value include:

  • CTOs/CIOs
  • Contract managers/administrators
  • CFOs/Controllers
  • Compliance managers
  • Business owners

FAR Benefit: Augment your compliance training and internal controls programs!

The Federal Acquisition Regulation (FAR 52.203-13), entitled Contractor Code of Business Ethics and Conduct, requires contractors not represented as small businesses to establish an ongoing business ethics awareness and compliance program, as well as effective internal controls. Participating in this webinar course can augment your company’s code of ethics and training programs by providing specific guidance on contractual obligations. Training can also be a significant part of an internal control system. Sign up today!


YOUR EXPERT(S):

Keir Bancroft
Keir Bancroft provides a range of services to clients throughout the government-contracting sector, addressing the needs of small, mid-sized and large businesses.  Mr. Bancroft’s practice spans federal, state, and local levels.  He counsels commercial and nonprofit clients as they address state-specific acquisition, intellectual property, information security, and trade secrets matters. Within the broad rubric of cybersecurity, Mr. Bancroft specializes in information security and privacy compliance.  He advises clients on compliance with standards promulgated under the Federal Information Security Act (“FISMA”), Federal Information Processing Standards (“FIPS”), the Department of Defense Information Assurance guidelines, the Privacy Act, and similar requirements.  Mr. Bancroft also focuses on national security and industrial security issues arising under the National Industrial Security Program Operating Manual (“NISPOM”), including employee security clearance, reporting obligations, and foreign ownership, control, and influence (“FOCI”).  

Carter Schoenberg

Carter Schoenberg is a Certified Information System Security Specialist with over 22 years of combined experience in criminal investigations, cyber threat intelligence, cyber security, risk management, and law.  He is a cybersecurity subject matter expert supporting government and commercial markets to promote organizational alignment with his proprietary methodologies where cyber risk, legal exposure, and insurance underwriting considerations converge.  He holds a dual career with a NSA/DHS Center of Academic Excellence leading undergraduate studies for cyber law, cybersecurity, cybercrime, and terrorism.   
 
Mr. Schoenberg  actively contributed to the GSA/DoD Final Report to the White House “Improving Cybersecurity and Resiliency through Acquisition”.  He is responsible for designing practical solutions to address cyber risk management using his proprietary cost-benefit analysis enabling system owners to make mission and cost justified decisions on cyber risk. Starting his career in law enforcement as a homicide detective, his work products have been actively used by DHS, the ISAC communities, and the Georgia Bar Association for Continuing Learning Educational (CLE) credits on the topic of cybersecurity risk and liability.  His expertise is profiled at conferences including ISC2, SecureWorld Expo, ISSA, and InfosecWorld and is regular contributor to multiple security blogs.

Select to add to your shopping cart.

Contact

Headquarters
 1.800.677.3789
 service@thompson.com