USG Data at Rest Encryption/Protection

Size: px
Start display at page:

Download "USG Data at Rest Encryption/Protection"

Transcription

1 USG Data at Rest Encryption/Protection Briefing g for the Symantec y Government Symposium Preventing Data Loss Panel Session 31 July 2008 UNCLASSIFIED 8/5/2008 UNCLASSIFIED//FOR OFFICIAL USE ONLY - ACQUISITION SENSITIVE Connecting People With Information1 1

2 USG DAR/PII Encryption Issues. Policy awareness, compliance, and technology per OMB policy directive M and DoD policy memorandums on mobile computing devices and PII USG loss of laptops, removable storage media, sensitive data, and PII: Multiple government agency (Federal, State, Local) loss of laptops, PDAs, removable storage media DoD thumbdrives (Afghan bazaar) Biti British government tloss of fpii via various incidentsid Numerous commercial PII incidents Connecting People With Information 2

3 Data at Rest Tiger Team (DARTT) Background Created by DoD CIO and DoD C4 Principals in Aug 06, joined by GSA/Civil Agencies in Dec 06, chartered PM via DoD CIO Acquisition Memo Mar 07 Collaborative intergovernmental effort - 20 DoD Components, 18 Federal agencies, State/Local, NATO Assessed shortfalls in USG DAR encryption policies, practices, initiatives, and technology solutions; focusing on mobile computing devices and PII data Used an unprecedented, competitive, and rapid (Dec 06 - June 07) acquisition process (FAR Part 8) to establish DoD ESI/GSA SmartBUY acquisition vehicles resulting in 11 BPAs (open to all USG agencies). Innovative Tech Refresh/Upgrade process using GSA collaboration portal ( Connecting People With Information 3

4 DARTT Status 11 BPAs awarded in June 07 with discounts up to 98% off GSA Schedule pricing Unprecedented leveraging of USG customer base Over 917,600 DAR encryption licenses sold to Federal, State, and Local govt agencies since award Represents $18M in sales with $82M in verifiable cost avoidance; or put another way, the USG has purchased $100M worth of DAR encryption products (at GSA Schedule pricing) for an actual cost of $18M Comprehensive DARTT information available to.gov and.mil accounts at GSA collaboration portal: More information: p Connecting People With Information 4

5 DARTT the Good News. Synchronization of govt policy & technology acquisition Collaborative effort across Federal, State, Local agencies and NATO Public awareness campaign recent DoD/GSA joint press releases; CNSS Annual Report (Mar 08); and articles in FedTech, FCW, GCN, Military Information Technology, and Network World magazines Highly successful Technical Refreshment/Upgrade process ( DARTT has approved 3 vendor BPA contract modification proposals, 1 more in-process. DARTT s on-going Advisory initiative; written and disseminated two DARTT Advisories for the ColdBoot and FireWire vulnerabilities for USG/public awareness. Connecting People With Information 5

6 DARTT Awards Several major awards for the DARTT program: DoD Excellence in Information Assurance Award (Feb 2008) 2008 Intergovernmental Government Solutions Award at the 28th Annual Management of Change Conference (June 2008) Executive Alliance nomination for Mid-Atlantic Project of the Year Award (June 2008) Connecting People With Information 6

7 DARTT Contacts: David Hollis Program Manager/Co-Chair Sharon Terango Co-chair Robby Ann Carter Technical Director Single source for comprehensive DARTT information: (GSA collaboration web site,.gov/.mil only) Vendor and BPA ordering information: / tb or BPA Points of Contact for Federal and State/Local Agencies Sharon Terango - SmartBUY IA PM (703) [email protected] Michael Hargrove - SmartBUY Contracting Officer (703) [email protected] BPA Points of Contact for DoD, IC, DHS, and NATO: Maurice Griffin - ESI IA Software Product Manager (334) [email protected] Richard Ashley - ESI IA Contracting Officer (334) [email protected] Connecting People With Information 7

8 BACKUP SLIDES Connecting People With Information 8

9 DAR Data at Rest ACRONYMS DARTT Data at Rest Tiger Team PII Personally Identifiable Information ESI DoD Enterprise Software Initiative BPA Blanket Purchase Agreement RFQ Request for Quote FIPS Federal Information o Processing Standards ds FDE Full Disk Encryption FES File/Folder Encryption System RSM Removable Storage Media SME Subject Matter Expert USG United States Government 8/5/2008 Connecting People With Information9 9

10 Awardees 1 MTM Technologies / Mobile Armor Mobile Guardian FDE / FES Software 2 Rocky Mountain Ram Safeboot FDE / FES SW & HW 3 Carahsoft / Information Security Corp. Secret Agent FES Software 4 Spectrum Systems Safeboot FDE / FES Software 5 SafeNet ProtectDrive FDE Software 6 Hi Tech Service / Encryption Solutions SkyLOCK FES Software 7 Autonomic Resources / WinMagic & Spyrus WinMagic SecureDoc & Spyrus Talisman SD FDE / FES HW &SW 8 GovBUYS / WinMagic SecureDoc FDE / FES Software 9 Intelligent Decisions / Credant Technologies Mobile Guardian FES Software 10 Merlin Int l / Guardian a Edge Guardian a Edge FDE / FES Software Technologies 11 immixtechnology / Pointsec Mobile Technologies Pointsec FDE Software 12 GTSI Corp / Credant Technologies Mobile Guardian FES Software Connecting People With Information 10

11 DARTT BPA Advantages All awarded offers are FIPS validated - vendor FIPS Confirmation form on file in the GSA/SmartBUY Program Licenses are transferable within a federal agency and include secondary use rights Volume pricing i is based on tiers for 10,000, ,000, and 100,000 users Competitive spot discounting is encouraged Five option years after award date: June 15, 2007 The BPAs were awarded through a full and open competition. The 103 technical requirements were provided by all federal agencies and were evaluated by an interagency USG team of information assurance/computer network defense SMEs. Connecting People With Information 11

Endpoint & Media Encryption

Endpoint & Media Encryption Endpoint & Media Encryption Bill Kyrouz, Senior Applications Manager Bingham McCutchen LLP ILTA Boston City Rep (CR) Tim Golden, Principal Architect Enterprise Architecture & IT Governance McGuireWoods

More information

Identity and Access Management Initiatives in the United States Government

Identity and Access Management Initiatives in the United States Government Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"

More information

Data at Rest Security in Navy/NMCI. Steven Gillis ONR Information Assurance Manager 10 January 2008

Data at Rest Security in Navy/NMCI. Steven Gillis ONR Information Assurance Manager 10 January 2008 Data at Rest Security in Navy/NMCI Steven Gillis ONR Information Assurance Manager 10 January 2008 Agenda Data at Rest Security What is it? What are the policies? Existing Solutions in Navy Do DAR solutions

More information

Product and Pricing Updates

Product and Pricing Updates Product and Pricing Updates 1 Talisman/DS Data Security Suite with SecureDoc FDE (Encryption Software only) 2 Talisman/DS Data Security Suite with Hydra PC Enterprise Edition ViP (Includes Hydra PC Series

More information

ESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303

ESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 ESC/HI VENDOR DAY ESC/HIJ Enterprise Services Division Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 1 Overview Mission Organization Industry Opportunities How Industry Can Help Summary 2 ESC/HIJ Enterprise

More information

How To Reduce Cost Of Ownership For Microsoft Products And Services

How To Reduce Cost Of Ownership For Microsoft Products And Services Helping Agencies Reduce Total Cost of Ownership for Microsoft Products and Services Mr. Stanley Kaczmarczyk Acting Director Strategic Solutions and Security Services, General Services Administration (GSA),

More information

GENERAL SERVICES ADMINISTRATION (GSA) FEDERAL ACQUISITION SERVICE (FAS) Request for Quotations: GS10F15LPQ0022. Project ID: B15S47E0073

GENERAL SERVICES ADMINISTRATION (GSA) FEDERAL ACQUISITION SERVICE (FAS) Request for Quotations: GS10F15LPQ0022. Project ID: B15S47E0073 GENERAL SERVICES ADMINISTRATION (GSA) FEDERAL ACQUISITION SERVICE (FAS) Request for Quotations: GS10F15LPQ0022 Project ID: B15S47E0073 Blanket Purchase Agreement for Government-wide Identity Monitoring

More information

General Services Administration. Federal Supply Schedule Government-Wide Blanket Purchase Agreement for Identity Protection Services (IPS)

General Services Administration. Federal Supply Schedule Government-Wide Blanket Purchase Agreement for Identity Protection Services (IPS) General Services Administration Federal Supply Schedule Government-Wide Blanket Purchase Agreement for Identity Protection Services (IPS) Changes incorporated with this BPA updated effective 5/6/2016:

More information

U.S. General Services Administration. Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet

U.S. General Services Administration. Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet U.S. General Services Administration Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet May 2014 Quick Facts Infrastructure as a Service (IaaS) BPA was awarded in October 2010

More information

Blanket Purchase Agreement Attachment C Ordering Guide. DLT Solutions/Autodesk. Blanket Purchase Agreement (BPA): N00104-12-A-ZF30

Blanket Purchase Agreement Attachment C Ordering Guide. DLT Solutions/Autodesk. Blanket Purchase Agreement (BPA): N00104-12-A-ZF30 DLT Solutions/Autodesk Blanket Purchase Agreement (BPA): N00104-12-A-ZF30 1 Version Dated: January 23, 2015 DOD ESI BPA ORDERING GUIDE This Ordering Guide has been developed by the DoD ESI team to assist

More information

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy 2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]

More information

EnCase Forensic Product Overview

EnCase Forensic Product Overview GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has

More information

Forecast to Industry 2015 External Contracting Opportunities

Forecast to Industry 2015 External Contracting Opportunities Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

TOPIC 12 CONTRACT COST AND PRICE ANALYSIS

TOPIC 12 CONTRACT COST AND PRICE ANALYSIS CONTRACT AUDIT GUIDE FRAMEWORK TOPIC 12 CONTRACT COST AND PRICE ANALYSIS Objective To determine whether the agency effectively conducts cost or price analysis to arrive at fair and reasonable prices for

More information

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation

More information

DoD ESI & The Joint Information Environment (JIE)

DoD ESI & The Joint Information Environment (JIE) DoD ESI & The Joint Information Environment (JIE) DISA Mission Partners Conference 2012 May 7, 2012 www.esi.mil Agenda DoD ESI Overview Economies of Scale for COTS IT Acquisition Alignment with JIE & DoD

More information

Federal Strategic Sourcing Initiative

Federal Strategic Sourcing Initiative U.S. General Services Administration Federal Strategic Sourcing Initiative FSSI: Fundamentals of Strategic Sourcing Presentation for SBTDC MarketPlace Bruce Osborne, GSA May 29, 2013 Federal Strategic

More information

STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending

STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549

More information

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA Cloud Services The Path Forward Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA November 1, 2012 Agenda Integrated Technology Services (ITS) Cloud Acquisition

More information

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used

More information

DISA Acquisition Opportunities

DISA Acquisition Opportunities DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov

More information

Palantir Software Enterprise Software Agreement. Blanket Purchase Agreement (BPA) N00104-13-A-ZF34. (Approved 5/21/15) (Approved

Palantir Software Enterprise Software Agreement. Blanket Purchase Agreement (BPA) N00104-13-A-ZF34. (Approved 5/21/15) (Approved Palantir Software Enterprise Software Agreement Blanket Purchase Agreement (BPA) N00104-13-A-ZF34 (Approved 5/21/15) (Approved DOD ESI BPA ORDERING GUIDE This Ordering Guide has been developed by the DoD

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5400.16 July 14, 2015 DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This instruction: a. In accordance with

More information

Vendor Landscape: Endpoint Encryption

Vendor Landscape: Endpoint Encryption Vendor Landscape: Endpoint Encryption Encryption from beginning to end(point) Introduction The Endpoint Encryption market is evolving alongside the data it protects by expanding its mobile encryption capabilities.

More information

Cyber Security for Advanced Manufacturing Next Steps

Cyber Security for Advanced Manufacturing Next Steps Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White

More information

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 6: Prepared by DoD ESI January 2013 Chapter Overview Government contracts must comply with FAR and DFARS. They include terms and conditions (Ts & Cs) from GSA, BPAs,

More information

U.S. General Services Administration. Federal Acquisition Service

U.S. General Services Administration. Federal Acquisition Service U.S. General Services Administration Federal Acquisition Service 1 Learning Objectives By the end of this lesson, you will be able to: Identify the program scope and governing regulation for Cooperative

More information

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:

More information

Benefits of the General Services Administration (GSA) Schedule. An introduction to the GSA Schedules Program and its process

Benefits of the General Services Administration (GSA) Schedule. An introduction to the GSA Schedules Program and its process Benefits of the General Services Administration (GSA) Schedule An introduction to the GSA Schedules Program and its process Learning Objectives At the end of this module, you will be able to understand:

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction

More information

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE

More information

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing UNCLASSIFIED/FOR OFFICIAL USE ONLY Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing What is CDM? UNCLASSIFIED/FOR OFFICIAL USE ONLY The CDM program is

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5400.16 February 12, 2009 ASD(NII)/DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES

MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503. December 5, 2012

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503. December 5, 2012 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503 DEPUTY DIRECTOR FOR MANAGEMENT December 5, 2012 M-13-02 MEMORANDUM FOR TH~E HEADS OF EXECUTIVE DEPARTMENTS AND

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments

More information

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI. d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April

More information

The Advantages of Using the GSA Schedule and Blanket Purchase Agreements

The Advantages of Using the GSA Schedule and Blanket Purchase Agreements The Advantages of Using the GSA Schedule and Blanket Purchase Agreements Contact Beth Miller-Herholtz, Chief Strategy Officer, SNVC About SNVC SNVC has been solving business challenges through innovative

More information

The Economic Benefit of Cloud Computing

The Economic Benefit of Cloud Computing The Economic Benefit of Cloud Computing An NJVC and Clear Government Solutions Executive White Paper Kevin L. Jackson General Manager, Cloud Services, NJVC Robert Williams President, Clear Government Solutions

More information

I. U.S. Government Privacy Laws

I. U.S. Government Privacy Laws I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management

More information

Subject: Category Management Policy 16-1: Improving the Acquisition and Management of Common Information Technology: Software Licensing

Subject: Category Management Policy 16-1: Improving the Acquisition and Management of Common Information Technology: Software Licensing January 21, 2016 Anne E. Rung Administrator, Office of Federal Procurement Policy Office of Management and Budget 725 17 th Street, NW Washington, DC 20503 Tony Scott Administrator and Federal CIO Office

More information

How To Use Encase On A Computer Or A Hard Drive (For A Computer)

How To Use Encase On A Computer Or A Hard Drive (For A Computer) EnCase Version 7.10.01 Release Notes October 3, 2014 EnCase Version 7.10.01 Thank you for using Guidance Software products. The Release Notes for this version of EnCase contain important information regarding

More information

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?

More information

Comprehensive Endpoint Security

Comprehensive Endpoint Security Comprehensive Endpoint Security Protecting Data-at-Rest Compliance with data and security regulations Joseph Belsanti Director, Marketing WinMagic Inc. Agenda Key Messages Company Snapshot Evaluation Criteria

More information

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 3: Prepared by DoD ESI January 2013 Chapter Overview Publishers sell software products through multiple methods: Direct sales. Indirect sales (also called channel

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106

More information

National Exercise Program (NEP) and the Homeland Security Exercise and Evaluation Program (HSEEP)

National Exercise Program (NEP) and the Homeland Security Exercise and Evaluation Program (HSEEP) National Program (NEP) and the Homeland Security and Evaluation Program (HSEEP) NEP and HSEEP: Interagency Strategy (NRT/RRT Co-Chairs Meeting) James Kish, Senior Director, and Evaluation Division National

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

Esri Managed Cloud Services and FedRAMP

Esri Managed Cloud Services and FedRAMP Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP

More information

TRADE AGREEMENTS ACT LIMITATIONS ON PROCUREMENT OF PHARMACEUTICALS AND POTENTIAL VA SOLUTIONS

TRADE AGREEMENTS ACT LIMITATIONS ON PROCUREMENT OF PHARMACEUTICALS AND POTENTIAL VA SOLUTIONS TRADE AGREEMENTS ACT LIMITATIONS ON PROCUREMENT OF PHARMACEUTICALS AND POTENTIAL VA SOLUTIONS Donna Lee Yesner Morgan, Lewis & Bockius, LLP [email protected] (202)739-5887 The Trade Agreements Act,

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.

More information

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010

More information

GENERAL SERVICES ADMINISTRATION FACILITIES MAINTENANCE AND MANAGEMENT (03 FAC) Markon, Inc.

GENERAL SERVICES ADMINISTRATION FACILITIES MAINTENANCE AND MANAGEMENT (03 FAC) Markon, Inc. GENERAL SERVICES ADMINISTRATION FACILITIES MAINTENANCE AND MANAGEMENT (03 FAC) Markon, Inc. Federal Supply Service Authorized Federal Supply Schedule Price List (Effective May 20, 2014 as of Modification

More information

GAO CONTRACTING STRATEGIES. Data and Oversight Problems Hamper Opportunities to Leverage Value of Interagency and Enterprisewide Contracts

GAO CONTRACTING STRATEGIES. Data and Oversight Problems Hamper Opportunities to Leverage Value of Interagency and Enterprisewide Contracts GAO United States Government Accountability Office Report to Congressional Requesters April 2010 CONTRACTING STRATEGIES Data and Oversight Problems Hamper Opportunities to Leverage Value of Interagency

More information

POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS

POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT

More information

Federal Strategic Sourcing Initiative (FSSI) Office Supply Third Generation Contract (OS3)

Federal Strategic Sourcing Initiative (FSSI) Office Supply Third Generation Contract (OS3) Federal Strategic Sourcing Initiative (FSSI) Office Supply Third Generation Contract (OS3) Frequently Asked Questions (FAQs) Questions from Agency Purchasing Authorities and Cardholders 1. Where do I go

More information

Information Technology Asset Management

Information Technology Asset Management Information Technology Asset Management HARDWARE SOFTWARE AND SERVICES AUBREY P. JONES, PMP DATA SYSTEMS ANALYSTS, INC SUMMARY Management of government/defense IT assets is an increasing target for cost

More information

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) (HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM Subject: Hardware and Software Management Approval: Brent Wahlquist Subject Number: IT-2 Transmittal

More information

PGP Whole Disk Encryption Implementation

PGP Whole Disk Encryption Implementation PGP Whole Disk Encryption Implementation Educause National Conference October 29, 2008 Gale Fritsche Tim Foley Lehigh University Library and Technology Services Lehigh Overview Founded in 1865. Private

More information