Search for tag: "cybersecurity"

DAU Cyber Solutions presents Chuck Brooks The Intersection of AI and Cybersecurity

Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Listen to Georgetown University Professor, Chuck Brooks talk about how AI will change the world and DoD contract…

From  Kelley Kiernan 0 likes 73 plays 0  

DAU Cyber Solutions Agile Authorizations – AO’s Perspective

Intended Audience: Anyone with DoD contract cybersecurity responsibilities. Contracts which bring IT or Software to the DOD must follow the federal Risk Management Framework. Learn about this…

From  Kelley Kiernan 0 likes 35 plays 0  

Cyber Gov Life: Just Hacker Things 09262024

September 26,2024, Topic: Just Hacker Things with Jayson DAU hosts the virtual Cyber Gov Life every 4th Thursday of each month starting at 12:00 p.m. ET for one hour. These live virtual sessions…

From  Andrew Hall 0 likes 55 plays 0  

Zero Trust Transforming Cybersecurity Is Your Program Setup to be Cyber Survivable-20240919

Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…

+1 More
From  George Alves 0 likes 62 plays 0  

"How to" for Contractors and "How to Verify" for Federal Contracting Teams

Learn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can implement the fifteen requirements by the end of the…

From  Kelley Kiernan 0 likes 75 plays 0  

Day 3 Session 3: Cybersecurity You Can Use!

2024 ACQUISITION INSIGHT DAYS - Defense Acquisition in Action - Lessons from the Field https://www.dau.edu/events/acquisition-insight-days-0 Event Date: 27 - 29 August 2024Senior leaders and…

From  Thomas Bagwell 0 likes 31 plays 0  

Cyber Gov Life 082224

August 22, 2024 Topic: Software Reverse Engineering, Reading The Matrix

From  Andrew Hall 0 likes 19 plays 0  

Logistics LIVE Handling a Higher-Level Threat 8.19.24

Can your logistics systems, applications, and services operate in a contested environment? Critical unclassified systems (like numerous logistics systems and the majority of our critical…

From  Karla Oconnor 0 likes 29 plays 0  

Zero Trust Transforming Cybersecurity: Effect of Open Source Software (OSS) On DOD Zero Trust Capabilities

Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…

+3 More
From  George Alves 0 likes 118 plays 0  

DCMA DIBCAC Cybersecurity and DCMA Industrial Analysis Division

Join this recurring 2-hour session hosted by DAU to hear DCMA discuss their role in Early Acquisition Engagement, Workload Acceptance, and Tailored Contract Administration Services

+2 More
From  Scott Sturgill 0 likes 67 plays 0  

BASIC CYBER HYGIENE WALK THROUGH of the FAR 52.204-21 and the Proposed CMMC LEVEL 1

Everyone Handles FCI! Learn how to recognize and implement Basic Cyber Hygiene: for contractors and federal contracting teamsLearn basic cybersecurity! Every federal contract contains the FAR…

From  Kelley Kenney 0 likes 119 plays 0  

Cybersecurity for Small Businesses - 20240731

Please join Ms. Kelley Kiernan and the DAU Learning Director for Small Business Mr. Ken Carkhuff as they discuss cybersecurity for small businesses.

From  Kenneth Carkhuff 1 likes 55 plays 0  

Cyber Gov Life 072524

July 25, 2024 Topic: Small Business Contractor Cybersecurity Requirements

From  Sara Layne 0 likes 22 plays 0  

BASIC CYBER HYGIENE WALK THROUGH OF THE FAR 52-204.21 AND THE PROPOSED CMMC LEVEL 1

Basic Cyber Hygiene: “How to” for contractors and “How to verify” for federal contracting teamsLearn basic cybersecurity! Every federal contract contains the FAR 52-204.21 …

From  Kelley Kenney 0 likes 225 plays 0  

Cyber Gov Life - Aviation Cybersecurity - 062724

June 27, 2024, Topic: Aviation Cybersecurity DAU hosts the virtual Cyber Gov Life every 4th Thursday of each month starting at 12:00 p.m. ET for one hour. These live virtual sessions were created…

+2 More
From  Sara Layne 0 likes 77 plays 0  

Zero Trust Transforming Cybersecurity – Where does Identity, Credential, and Access Management (ICAM) fit into Zero Trust - 20240620_180044

Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…

+3 More
From  George Alves 0 likes 143 plays 0