Search for tag: "cybersecurity"
DAU Cyber Solutions presents Chuck Brooks The Intersection of AI and CybersecurityIntended Audience: Anyone with DoD contract cybersecurity responsibilities. Listen to Georgetown University Professor, Chuck Brooks talk about how AI will change the world and DoD contract…
From Kelley Kiernan
0 likes
73 plays
0
|
|
DAU Cyber Solutions Agile Authorizations – AO’s PerspectiveIntended Audience: Anyone with DoD contract cybersecurity responsibilities. Contracts which bring IT or Software to the DOD must follow the federal Risk Management Framework. Learn about this…
From Kelley Kiernan
0 likes
35 plays
0
|
|
Cyber Gov Life: Just Hacker Things 09262024September 26,2024, Topic: Just Hacker Things with Jayson DAU hosts the virtual Cyber Gov Life every 4th Thursday of each month starting at 12:00 p.m. ET for one hour. These live virtual sessions…
From Andrew Hall
0 likes
55 plays
0
|
|
Zero Trust Transforming Cybersecurity Is Your Program Setup to be Cyber Survivable-20240919Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…
From George Alves
0 likes
62 plays
0
|
|
"How to" for Contractors and "How to Verify" for Federal Contracting TeamsLearn basic cybersecurity! Every federal contract contains the FAR 52-204.21 We will ensure that you understand the FAR, the cyber lingo and can implement the fifteen requirements by the end of the…
From Kelley Kiernan
0 likes
75 plays
0
|
|
Day 3 Session 3: Cybersecurity You Can Use!2024 ACQUISITION INSIGHT DAYS - Defense Acquisition in Action - Lessons from the Field https://www.dau.edu/events/acquisition-insight-days-0 Event Date: 27 - 29 August 2024Senior leaders and…
From Thomas Bagwell
0 likes
31 plays
0
|
|
Cyber Gov Life 082224August 22, 2024 Topic: Software Reverse Engineering, Reading The Matrix
From Andrew Hall
0 likes
19 plays
0
|
|
Logistics LIVE Handling a Higher-Level Threat 8.19.24Can your logistics systems, applications, and services operate in a contested environment? Critical unclassified systems (like numerous logistics systems and the majority of our critical…
From Karla Oconnor
0 likes
29 plays
0
|
|
Zero Trust Transforming Cybersecurity: Effect of Open Source Software (OSS) On DOD Zero Trust CapabilitiesZero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…
From George Alves
0 likes
118 plays
0
|
|
DCMA DIBCAC Cybersecurity and DCMA Industrial Analysis DivisionJoin this recurring 2-hour session hosted by DAU to hear DCMA discuss their role in Early Acquisition Engagement, Workload Acceptance, and Tailored Contract Administration Services
From Scott Sturgill
0 likes
67 plays
0
|
|
BASIC CYBER HYGIENE WALK THROUGH of the FAR 52.204-21 and the Proposed CMMC LEVEL 1Everyone Handles FCI! Learn how to recognize and implement Basic Cyber Hygiene: for contractors and federal contracting teamsLearn basic cybersecurity! Every federal contract contains the FAR…
From Kelley Kenney
0 likes
119 plays
0
|
|
Cybersecurity for Small Businesses - 20240731Please join Ms. Kelley Kiernan and the DAU Learning Director for Small Business Mr. Ken Carkhuff as they discuss cybersecurity for small businesses.
From Kenneth Carkhuff
1 likes
55 plays
0
|
|
Cyber Gov Life 072524July 25, 2024 Topic: Small Business Contractor Cybersecurity Requirements
From Sara Layne
0 likes
22 plays
0
|
|
BASIC CYBER HYGIENE WALK THROUGH OF THE FAR 52-204.21 AND THE PROPOSED CMMC LEVEL 1Basic Cyber Hygiene: “How to” for contractors and “How to verify” for federal contracting teamsLearn basic cybersecurity! Every federal contract contains the FAR 52-204.21 …
From Kelley Kenney
0 likes
225 plays
0
|
|
Cyber Gov Life - Aviation Cybersecurity - 062724June 27, 2024, Topic: Aviation Cybersecurity DAU hosts the virtual Cyber Gov Life every 4th Thursday of each month starting at 12:00 p.m. ET for one hour. These live virtual sessions were created…
From Sara Layne
0 likes
77 plays
0
|
|
Zero Trust Transforming Cybersecurity – Where does Identity, Credential, and Access Management (ICAM) fit into Zero Trust - 20240620_180044Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and…
From George Alves
0 likes
143 plays
0
|