State of Florida Department of Management Services
|
|
|
- Felix Porter
- 10 years ago
- Views:
Transcription
1 September 3, 2015 State of Florida Attn: Joel Atkinson Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 350 Seventh Avenue 10th Floor New York, New York P: Toll Free: 877.QED.NATL F:
2
3 Table of Contents 1. Introduction Background... 1 Overview... 1 Summary of Relevant Experience... 1 Management Team... 1 Awards... 3 Certifications Contact Information... 4 Key Contacts Service Offerings (as per section IV of Cyber-Security RFI) Conclusion /3/2015
4 1. Introduction The State of Florida - Department of Managed Services is seeking to identify vendors that are able to provide assessment and remediation services in the event of a Cyber-Security incident and provide identity protection, identity monitoring and identity restoration services. The following provides information necessary for QED National to be listed as a vendor capable of providing such services to the State of Florida under GSA Schedule Background Overview is a privately held New York corporation that provides IT Consulting, Solutions and Staffing Services to the public and private sectors. Founded in 1993 by President, Colleen Molter, holds a GSA Schedule 70 contract (#GS-35-F378AA), is registered with the State of Florida, and is highly experienced in Cyber- Security Assessment and Remediation Services. The superior quality of s services and staff has been recognized by clients and the industry over the years. Inc. Magazine named one of Inc s Fastest Growing Private Companies for seven consecutive years ( ); The Competitive Edge awarded the 2014 Women Business Enterprise (WBE) Award of Excellence; and CIO Review named one of the Top 20 Most Promising Government Technology Consulting Companies in the US. Summary of Relevant Experience has over 22 years experience as a provider of IT consulting services and solutions. Our reputation for integrity, high-quality and overall value has earned us contracts with Fortune 500 companies such as Financial Services, Audit, Engineering, Energy, Technology firms and numerous State and Local government entities (e.g., Transportation, Health and Human Services, Education, Construction, Criminal Justice, and Environmental Protection agencies). With extensive expertise in all aspects of Information Technology, Information & Cyber-Security, Governance, Risk & Compliance, Project & Program Management, and Enterprise Architecture, has been awarded over 70 contracts totaling in excess of $27 Million over the last three years. For these contracts, over 180 consultants have been deployed, with approximately 80% for State and Local government entities. Specific Cyber and Information Security Services recently provided by include: Information Security Risk Assessments Vulnerability Assessments Application Security Assessments Incident Response Investigations for Malware and Advanced Persistent Threats Implementation of Data Loss Prevention Solutions Monitoring Networks for Security Anomalies Implementation Encryption Solutions Management Team The Management Team will diligently apply its experience and expertise in Information Technology and Information Security to ensure successful delivery of Cyber-Security assessment and remediation services to the State of Florida. Professional biographies of the Management Team are provided below. -1-9/3/2015
5 Colleen Molter President & Founder Ms. Molter, an NYU Polytechnic Electrical Engineering graduate, has been providing technology solutions to government agencies and Fortune 500 firms for more than 25 years as a Technology Manager and Entrepreneur. Colleen s work history, prior to starting in 1993, includes nine years of Information Technology management consulting, seven years experience teaching computer science and electrical engineering in the university system at both the graduate and undergraduate levels and eight years experience working for IBM as a systems engineer, data systems specialist and manager. Her industry experience includes servicing large financial and governmental institutions with centralized and distributed IT installations and her skills in strong facilitation, project management, development and execution of technology systems design have provided the base for the growth and success of. Colleen has always been at the forefront of providing sound technology solutions and professionals to her clients and, as a result, has been recognized by such organizations as Inc. Magazine and CIO Review among others for business and technology leadership. Colleen s broad experience as a C-Level Strategist, Executive Manager and Entrepreneur provide her team, clients and community the leadership to consistently deliver with the highest level of quality and integrity. She has received numerous awards for her accomplishments as a businesswoman and advocate for women in business, including recognition for her achievements by the US Small Business Administration, the Women s Presidents Organization, and Women in Technology International. Fred Seim Account Executive Fred is the Account Executive and Engagement Manager for State and Local Government as well as Education (SLED) business activities in which is engaged in the State of Florida. Fred has 29 plus years combined experience in Program and Engagement Management in support of large clients with the US Treasury, US Secret Service (now DHS), US Customs Service, (now DHS ICE), Bureau of the Public Debt, the Federal Aviation Administration (FAA) and most recently the City of New York. It is s position that the importance of this engagement, as well as, the critical importance of Cyber-Security to the State of Florida government operations and public infrastructure warrants this level of management experience and commitment. Fred s security experience includes design and implementation of a security and access control system for the US Treasury for a special national security campus. Following that project, Fred was the PM for the design and implementation of the FAA s FAR compliant anti-terrorist and intrusion detection system for the International Arrivals Terminal (T5) at ORD and was a member of the security design and oversight team for three of the other eleven FAA-designated Class X US airports. Additionally, Fred led the consulting team responsible for developing and executing annual pre-audit activities at USCS (now, DHS ICE) for compliance of the agency to OMB circulars A-123 and A-130. More recently, Fred led the PM/QA consulting team responsible for the security assessment and accreditation for numerous NYC enterprise-wide systems implementations (e.g., NYC.gov, Customer Service, NYCServ, and NYCAPS). Anthony Concolino Managing Director Anthony (Tony) leads the company's Solution-based Consulting Practice areas which include Information/Cyber- Security, Data Center Solutions, Information Technology Management, and GRC (Governance, Risk and Compliance). As a senior Information Technology professional with over 30 years of experience, Tony s innovative style helped advance the use of enterprise technology in the banking and brokerage industry and most recently in the public sector. Prior to joining, Tony managed large organizations at Citigroup, where, as COO for Capital Markets and Corporate Infrastructure Services, he led efforts to improve security, service and business continuity in IT Operations, Risk Management and Application Development while driving down costs as part of a multiyear, multi-billion dollar transformation program. Earlier in his career, Tony delivered world-class brokerage and trading technology products serving large global Wall Street firms. Tony has also advised several startup companies building Cloud, Virtualization, Big Data, DevOps, Cyber-Security and Digital Marketing technologies. -2-9/3/2015
6 Russell Kiernan Director of Management Consulting and Cyber / Information Security Services Mr. Kiernan oversees the delivery of IT Management Consulting and Information Security Services at QED National. With over 20 years of IT experience, Russell understands the business needs of s client base and transposes them into capabilities. He is highly skilled in a number of management and technology disciplines including Cyber / Information Security, GRC (Governance, Risk and Compliance), Program and Project Management, and Enterprise Architecture. Russell has extensive experience in global financial institutions such as Citigroup, Bank of America Merrill Lynch, Marsh & McLennan, Smith Barney and Broadridge where he managed Risk & Control Management, Information Security, Application Development, Program and Project Management, Enterprise Architecture, Process Engineering, and Financial Management functions. Russell s accomplishments include: authoring of Software Development Process Standards for organizations with up to a $1B annual application development and implementation budget; authoring of various Information Security Standards and Processes, implementation of Enterprise Software Solutions; definition and rollout of comprehensive project and SDLC processes (which addressed both functional and non-functional requirements such as Security and Enterprise Architecture reviews) and supporting Project Management Information System; definition and ongoing management of global Project Portfolios and associated budgets; definition of project performance and quality review processes; initial implementation and ongoing management of global Risk and Compliance Self Assessments (including Application and Security Assessments); and successful management of all Federal Regulatory, External Audit, and Independent Audit inspections for auditable entities. Barry Pardee Industry Expert Barry is a Senior Information Technology professional with over 30 years of expertise in IT Sales, Project Management, IT consulting and management. He has a broad background in successfully working with various commercial organizations, as well as federal and non-federal government agencies. As a civilian Senior Field Engineer, he worked on key Air Force R&D systems including early Arpanet security development, starting in 1976, distributed computing (cloud) the first Intrusion Detection System and many more leading edge security systems throughout his career. In the past 23 years as a senior Project and Program Manager, Barry has successfully managed multi-million dollar IT projects/programs for Kodak, General Electric and what is now NYS Information Technology Services. He has been a trusted security partner to large commercial and government clients including Global Foundries, Pitney Bowes, GE Global Research, GE Energy, NYS agencies, NYS Governor s Office (through several administrations) and the NYS Division of Homeland Security and Emergency Services. More recently, Barry has helped, alongside a top security consultant hired from the White House, to design and manage the delivery of many IT security assessments for large New York government agencies including the State Police, Criminal Justice Services, Integrated Justice Advisory Board agencies, Department of Transportation, Division of the Budget and the Energy Research and Development Authority. Barry has also been active in the Cloud Security Alliance and is acknowledged for contributions in the Cloud Standards Customer Council publication, Security for Cloud Computing. Awards As a result of our excellent service, professionalism, and leadership, consistently garners the highest accolades and awards. Such awards include: Awards Seven Consecutive Years: Inc Fastest Growing Private Companies, Women Business Enterprise (WBE) Award of Excellence, Competitive Edge, 2014 Top 20 Most Promising Government Technology Consulting Companies in the US, CIO Review, 2013 Top 50 Women Owned Business in New York, DiversityBusiness.com, 2013 Enterprising Women of the Year Award, Enterprising Women Magazine, /3/2015
7 Certifications is a Small, Disadvantaged and Women-Owned Business Enterprise certified and accredited by various esteemed organizations. These certifications allow to obtain and perform business within organizations that require such credentials. These certifications include: Certifications Women's Business Enterprise National Council (for US Small Business Administration) - Woman Owned Small Business (WOSB) US Department of Transportation - DBE Women's Business Enterprise National Council - WBE 3. Contact Information The address of s headquarters is as follows: Corporate Headquarters 350 Seventh Ave, 10 th Floor New York, NY Key Contacts Fred Seim, s Account Executive for the State of Florida, will coordinate s efforts to ensure the highest quality services. Russell Kiernan, s Director of Management Consulting and Information Security Services, will coordinate Cyber / Information Security resources to ensure the success of all Cyber-Security engagements for the State of Florida. Contact information is included below. Key Contacts Primary Contact Fred Seim Account Executive (347) [email protected] Secondary Contact Russell Kiernan Director, Management Consulting and Information Security Services x111 [email protected] -4-9/3/2015
8 4. Service Offerings (as per section IV of Cyber-Security RFI) The table below lists all services identified in the RFI and indicates s capability to provide these services. 1) Pre-Incident Services: Cyber-Security Service a) Incident Response Agreements Terms and conditions in place ahead of time to allow for quicker response in the event of a cyber-security incident. b) Assessments Evaluate a State Agency s current state of information security and cybersecurity incident response capability. Capability c) Preparation Provide guidance on requirements and best practices. d) Developing Cyber-Security Incident Response Plans Develop or assist in development of written State Agency plans for incident response in the event of a cyber-security incident. e) Training Provide training for State Agency staff from basic user awareness to technical education. 2) Post-Incident Services: a) Breach Services Toll-free Hotline Provide a scalable, resilient call center for incident response information to State Agencies. b) Investigation/Clean-up Conduct rapid evaluation of incidents, lead investigations and provide remediation services to restore State Agency operations to pre-incident levels. c) Incident response Provide guidance or technical staff to assist State Agencies in response to an incident. d) Mitigation Plans Assist State Agency staff in development of mitigation plans based on investigation and incident response. Assist State Agency staff with incident mitigation activities. e) Identity Monitoring, Protection, and Restoration Provide identity monitoring, protection, and restoration services to any individuals potentially affected by a cyber-security incident. * will utilize the services of our pre-qualified partners in these areas. 5. Conclusion, via partner companies*, via partner companies*, via partner companies* With the increasing volume and complexity of cyber threats, understands the importance of having robust comprehensive Cyber-Security and Cyber Risk Management programs that are up to the challenge. We are grateful for the opportunity to be considered for inclusion on the list of vendors capable of providing these critical Cyber-Security services to the State of Florida. Please contact Fred Seim or Russell Kiernan directly should any additional information be required. Thank you for your kind consideration. -5-9/3/2015
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
State of Florida Cyber Security Services RFI
RFI ATTENTION: State of Florida Dept. of Management Services Joel Atkinson Associate Category Manager 4050 Esplanade Way, Suite 360 Tallahassee, FL 32399-0950 (850) 488-1985 [email protected]
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Request for Information 9/3/2015 12:00PM Prepared For State of Florida Department of Management Services Division of State
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
STREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
Chairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI
Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI August 25, 2015 Re: Cyber-Security Assessment, Remediation,
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Developing a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Five-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
MANAGEMENT AND SYSTEMS
NEW YORK UNIVERSITY SCHOOL OF CONTINUING AND PROFESSIONAL STUDIES MASTER OF SCIENCE IN MANAGEMENT AND SYSTEMS DIVISION OF PROGRAMS IN BUSINESS MASTER OF SCIENCE IN MANAGEMENT AND SYSTEMS To lead successfully
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Cyber Security & Compliance Briefing
Cyber Security & Compliance Briefing Cyber Security Offerings & Capabilities Overview Full service cyber security and compliance offerings in North America and international power markets: controls and
Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 [email protected] SUMMARY Amit Garg brings over 17 years of information
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
U.S. Securities and Exchange Commission
U.S. Securities and Exchange Commission FY 2013 Service Contract Inventory Analysis January 15, 2015 Office of Acquisitions SEC Headquarters Washington, DC 20549 1 Background The Securities and Exchange
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
Oil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.
Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
An SBA Certified 8(a) business. 2300 Clarendon Blvd. Arlington, VA. 22201 www.miraclesystems.net
S H A P I N G T H E An SBA Certified 8(a) business 2300 Clarendon Blvd. Arlington, VA. 22201 www.miraclesystems.net F U T U R E Sandesh Sharda [email protected] Mike Mohindra [email protected]
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
E-Learning Compliance Training Library of Online Courses
E-Learning Compliance Training Library of Online Courses What Are Your Training Requirements? ecfirst provides online compliance training and quality improvement training courseware to hospitals, teaching
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President
004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
A 6-Step How-To Guide to Contracting for Cloud Services Includes a 137-Element Contracting Checklist
Contracting for Cloud Services A 6-Step How-To Guide to Contracting for Cloud Services Includes a 137-Element Contracting Checklist Ron Scruggs, Thomas Trappler, & Don Philpott ii Contracting for Cloud
WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
