USG Data at Rest Encryption/Protection
|
|
|
- Julian Caldwell
- 10 years ago
- Views:
Transcription
1 USG Data at Rest Encryption/Protection Briefing g for the Symantec y Government Symposium Preventing Data Loss Panel Session 31 July 2008 UNCLASSIFIED 8/5/2008 UNCLASSIFIED//FOR OFFICIAL USE ONLY - ACQUISITION SENSITIVE Connecting People With Information1 1
2 USG DAR/PII Encryption Issues. Policy awareness, compliance, and technology per OMB policy directive M and DoD policy memorandums on mobile computing devices and PII USG loss of laptops, removable storage media, sensitive data, and PII: Multiple government agency (Federal, State, Local) loss of laptops, PDAs, removable storage media DoD thumbdrives (Afghan bazaar) Biti British government tloss of fpii via various incidentsid Numerous commercial PII incidents Connecting People With Information 2
3 Data at Rest Tiger Team (DARTT) Background Created by DoD CIO and DoD C4 Principals in Aug 06, joined by GSA/Civil Agencies in Dec 06, chartered PM via DoD CIO Acquisition Memo Mar 07 Collaborative intergovernmental effort - 20 DoD Components, 18 Federal agencies, State/Local, NATO Assessed shortfalls in USG DAR encryption policies, practices, initiatives, and technology solutions; focusing on mobile computing devices and PII data Used an unprecedented, competitive, and rapid (Dec 06 - June 07) acquisition process (FAR Part 8) to establish DoD ESI/GSA SmartBUY acquisition vehicles resulting in 11 BPAs (open to all USG agencies). Innovative Tech Refresh/Upgrade process using GSA collaboration portal ( Connecting People With Information 3
4 DARTT Status 11 BPAs awarded in June 07 with discounts up to 98% off GSA Schedule pricing Unprecedented leveraging of USG customer base Over 917,600 DAR encryption licenses sold to Federal, State, and Local govt agencies since award Represents $18M in sales with $82M in verifiable cost avoidance; or put another way, the USG has purchased $100M worth of DAR encryption products (at GSA Schedule pricing) for an actual cost of $18M Comprehensive DARTT information available to.gov and.mil accounts at GSA collaboration portal: More information: p Connecting People With Information 4
5 DARTT the Good News. Synchronization of govt policy & technology acquisition Collaborative effort across Federal, State, Local agencies and NATO Public awareness campaign recent DoD/GSA joint press releases; CNSS Annual Report (Mar 08); and articles in FedTech, FCW, GCN, Military Information Technology, and Network World magazines Highly successful Technical Refreshment/Upgrade process ( DARTT has approved 3 vendor BPA contract modification proposals, 1 more in-process. DARTT s on-going Advisory initiative; written and disseminated two DARTT Advisories for the ColdBoot and FireWire vulnerabilities for USG/public awareness. Connecting People With Information 5
6 DARTT Awards Several major awards for the DARTT program: DoD Excellence in Information Assurance Award (Feb 2008) 2008 Intergovernmental Government Solutions Award at the 28th Annual Management of Change Conference (June 2008) Executive Alliance nomination for Mid-Atlantic Project of the Year Award (June 2008) Connecting People With Information 6
7 DARTT Contacts: David Hollis Program Manager/Co-Chair Sharon Terango Co-chair Robby Ann Carter Technical Director Single source for comprehensive DARTT information: (GSA collaboration web site,.gov/.mil only) Vendor and BPA ordering information: / tb or BPA Points of Contact for Federal and State/Local Agencies Sharon Terango - SmartBUY IA PM (703) [email protected] Michael Hargrove - SmartBUY Contracting Officer (703) [email protected] BPA Points of Contact for DoD, IC, DHS, and NATO: Maurice Griffin - ESI IA Software Product Manager (334) [email protected] Richard Ashley - ESI IA Contracting Officer (334) [email protected] Connecting People With Information 7
8 BACKUP SLIDES Connecting People With Information 8
9 DAR Data at Rest ACRONYMS DARTT Data at Rest Tiger Team PII Personally Identifiable Information ESI DoD Enterprise Software Initiative BPA Blanket Purchase Agreement RFQ Request for Quote FIPS Federal Information o Processing Standards ds FDE Full Disk Encryption FES File/Folder Encryption System RSM Removable Storage Media SME Subject Matter Expert USG United States Government 8/5/2008 Connecting People With Information9 9
10 Awardees 1 MTM Technologies / Mobile Armor Mobile Guardian FDE / FES Software 2 Rocky Mountain Ram Safeboot FDE / FES SW & HW 3 Carahsoft / Information Security Corp. Secret Agent FES Software 4 Spectrum Systems Safeboot FDE / FES Software 5 SafeNet ProtectDrive FDE Software 6 Hi Tech Service / Encryption Solutions SkyLOCK FES Software 7 Autonomic Resources / WinMagic & Spyrus WinMagic SecureDoc & Spyrus Talisman SD FDE / FES HW &SW 8 GovBUYS / WinMagic SecureDoc FDE / FES Software 9 Intelligent Decisions / Credant Technologies Mobile Guardian FES Software 10 Merlin Int l / Guardian a Edge Guardian a Edge FDE / FES Software Technologies 11 immixtechnology / Pointsec Mobile Technologies Pointsec FDE Software 12 GTSI Corp / Credant Technologies Mobile Guardian FES Software Connecting People With Information 10
11 DARTT BPA Advantages All awarded offers are FIPS validated - vendor FIPS Confirmation form on file in the GSA/SmartBUY Program Licenses are transferable within a federal agency and include secondary use rights Volume pricing i is based on tiers for 10,000, ,000, and 100,000 users Competitive spot discounting is encouraged Five option years after award date: June 15, 2007 The BPAs were awarded through a full and open competition. The 103 technical requirements were provided by all federal agencies and were evaluated by an interagency USG team of information assurance/computer network defense SMEs. Connecting People With Information 11
Endpoint & Media Encryption
Endpoint & Media Encryption Bill Kyrouz, Senior Applications Manager Bingham McCutchen LLP ILTA Boston City Rep (CR) Tim Golden, Principal Architect Enterprise Architecture & IT Governance McGuireWoods
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
Data at Rest Security in Navy/NMCI. Steven Gillis ONR Information Assurance Manager 10 January 2008
Data at Rest Security in Navy/NMCI Steven Gillis ONR Information Assurance Manager 10 January 2008 Agenda Data at Rest Security What is it? What are the policies? Existing Solutions in Navy Do DAR solutions
Product and Pricing Updates
Product and Pricing Updates 1 Talisman/DS Data Security Suite with SecureDoc FDE (Encryption Software only) 2 Talisman/DS Data Security Suite with Hydra PC Enterprise Edition ViP (Includes Hydra PC Series
ESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303
ESC/HI VENDOR DAY ESC/HIJ Enterprise Services Division Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 1 Overview Mission Organization Industry Opportunities How Industry Can Help Summary 2 ESC/HIJ Enterprise
How To Reduce Cost Of Ownership For Microsoft Products And Services
Helping Agencies Reduce Total Cost of Ownership for Microsoft Products and Services Mr. Stanley Kaczmarczyk Acting Director Strategic Solutions and Security Services, General Services Administration (GSA),
GENERAL SERVICES ADMINISTRATION (GSA) FEDERAL ACQUISITION SERVICE (FAS) Request for Quotations: GS10F15LPQ0022. Project ID: B15S47E0073
GENERAL SERVICES ADMINISTRATION (GSA) FEDERAL ACQUISITION SERVICE (FAS) Request for Quotations: GS10F15LPQ0022 Project ID: B15S47E0073 Blanket Purchase Agreement for Government-wide Identity Monitoring
General Services Administration. Federal Supply Schedule Government-Wide Blanket Purchase Agreement for Identity Protection Services (IPS)
General Services Administration Federal Supply Schedule Government-Wide Blanket Purchase Agreement for Identity Protection Services (IPS) Changes incorporated with this BPA updated effective 5/6/2016:
U.S. General Services Administration. Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet
U.S. General Services Administration Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet May 2014 Quick Facts Infrastructure as a Service (IaaS) BPA was awarded in October 2010
Blanket Purchase Agreement Attachment C Ordering Guide. DLT Solutions/Autodesk. Blanket Purchase Agreement (BPA): N00104-12-A-ZF30
DLT Solutions/Autodesk Blanket Purchase Agreement (BPA): N00104-12-A-ZF30 1 Version Dated: January 23, 2015 DOD ESI BPA ORDERING GUIDE This Ordering Guide has been developed by the DoD ESI team to assist
2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]
EnCase Forensic Product Overview
GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has
Forecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
TOPIC 12 CONTRACT COST AND PRICE ANALYSIS
CONTRACT AUDIT GUIDE FRAMEWORK TOPIC 12 CONTRACT COST AND PRICE ANALYSIS Objective To determine whether the agency effectively conducts cost or price analysis to arrive at fair and reasonable prices for
Briefing Outline. Overview of the CUI Program. CUI and IT Implementation
Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation
DoD ESI & The Joint Information Environment (JIE)
DoD ESI & The Joint Information Environment (JIE) DISA Mission Partners Conference 2012 May 7, 2012 www.esi.mil Agenda DoD ESI Overview Economies of Scale for COTS IT Acquisition Alignment with JIE & DoD
Federal Strategic Sourcing Initiative
U.S. General Services Administration Federal Strategic Sourcing Initiative FSSI: Fundamentals of Strategic Sourcing Presentation for SBTDC MarketPlace Bruce Osborne, GSA May 29, 2013 Federal Strategic
STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending
United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549
Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA
Cloud Services The Path Forward Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA November 1, 2012 Agenda Integrated Technology Services (ITS) Cloud Acquisition
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
Palantir Software Enterprise Software Agreement. Blanket Purchase Agreement (BPA) N00104-13-A-ZF34. (Approved 5/21/15) (Approved
Palantir Software Enterprise Software Agreement Blanket Purchase Agreement (BPA) N00104-13-A-ZF34 (Approved 5/21/15) (Approved DOD ESI BPA ORDERING GUIDE This Ordering Guide has been developed by the DoD
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 July 14, 2015 DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This instruction: a. In accordance with
Vendor Landscape: Endpoint Encryption
Vendor Landscape: Endpoint Encryption Encryption from beginning to end(point) Introduction The Endpoint Encryption market is evolving alongside the data it protects by expanding its mobile encryption capabilities.
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection
GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable
Commercial Software Licensing
Commercial Software Licensing CHAPTER 6: Prepared by DoD ESI January 2013 Chapter Overview Government contracts must comply with FAR and DFARS. They include terms and conditions (Ts & Cs) from GSA, BPAs,
U.S. General Services Administration. Federal Acquisition Service
U.S. General Services Administration Federal Acquisition Service 1 Learning Objectives By the end of this lesson, you will be able to: Identify the program scope and governing regulation for Cooperative
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Benefits of the General Services Administration (GSA) Schedule. An introduction to the GSA Schedules Program and its process
Benefits of the General Services Administration (GSA) Schedule An introduction to the GSA Schedules Program and its process Learning Objectives At the end of this module, you will be able to understand:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing
UNCLASSIFIED/FOR OFFICIAL USE ONLY Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing What is CDM? UNCLASSIFIED/FOR OFFICIAL USE ONLY The CDM program is
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 February 12, 2009 ASD(NII)/DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES
M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503. December 5, 2012
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C. 20503 DEPUTY DIRECTOR FOR MANAGEMENT December 5, 2012 M-13-02 MEMORANDUM FOR TH~E HEADS OF EXECUTIVE DEPARTMENTS AND
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.
d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
The Advantages of Using the GSA Schedule and Blanket Purchase Agreements
The Advantages of Using the GSA Schedule and Blanket Purchase Agreements Contact Beth Miller-Herholtz, Chief Strategy Officer, SNVC About SNVC SNVC has been solving business challenges through innovative
The Economic Benefit of Cloud Computing
The Economic Benefit of Cloud Computing An NJVC and Clear Government Solutions Executive White Paper Kevin L. Jackson General Manager, Cloud Services, NJVC Robert Williams President, Clear Government Solutions
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
Subject: Category Management Policy 16-1: Improving the Acquisition and Management of Common Information Technology: Software Licensing
January 21, 2016 Anne E. Rung Administrator, Office of Federal Procurement Policy Office of Management and Budget 725 17 th Street, NW Washington, DC 20503 Tony Scott Administrator and Federal CIO Office
How To Use Encase On A Computer Or A Hard Drive (For A Computer)
EnCase Version 7.10.01 Release Notes October 3, 2014 EnCase Version 7.10.01 Thank you for using Guidance Software products. The Release Notes for this version of EnCase contain important information regarding
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Comprehensive Endpoint Security
Comprehensive Endpoint Security Protecting Data-at-Rest Compliance with data and security regulations Joseph Belsanti Director, Marketing WinMagic Inc. Agenda Key Messages Company Snapshot Evaluation Criteria
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
Commercial Software Licensing
Commercial Software Licensing CHAPTER 3: Prepared by DoD ESI January 2013 Chapter Overview Publishers sell software products through multiple methods: Direct sales. Indirect sales (also called channel
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
National Exercise Program (NEP) and the Homeland Security Exercise and Evaluation Program (HSEEP)
National Program (NEP) and the Homeland Security and Evaluation Program (HSEEP) NEP and HSEEP: Interagency Strategy (NRT/RRT Co-Chairs Meeting) James Kish, Senior Director, and Evaluation Division National
Developing a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
Esri Managed Cloud Services and FedRAMP
Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP
TRADE AGREEMENTS ACT LIMITATIONS ON PROCUREMENT OF PHARMACEUTICALS AND POTENTIAL VA SOLUTIONS
TRADE AGREEMENTS ACT LIMITATIONS ON PROCUREMENT OF PHARMACEUTICALS AND POTENTIAL VA SOLUTIONS Donna Lee Yesner Morgan, Lewis & Bockius, LLP [email protected] (202)739-5887 The Trade Agreements Act,
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
GENERAL SERVICES ADMINISTRATION FACILITIES MAINTENANCE AND MANAGEMENT (03 FAC) Markon, Inc.
GENERAL SERVICES ADMINISTRATION FACILITIES MAINTENANCE AND MANAGEMENT (03 FAC) Markon, Inc. Federal Supply Service Authorized Federal Supply Schedule Price List (Effective May 20, 2014 as of Modification
GAO CONTRACTING STRATEGIES. Data and Oversight Problems Hamper Opportunities to Leverage Value of Interagency and Enterprisewide Contracts
GAO United States Government Accountability Office Report to Congressional Requesters April 2010 CONTRACTING STRATEGIES Data and Oversight Problems Hamper Opportunities to Leverage Value of Interagency
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
Federal Strategic Sourcing Initiative (FSSI) Office Supply Third Generation Contract (OS3)
Federal Strategic Sourcing Initiative (FSSI) Office Supply Third Generation Contract (OS3) Frequently Asked Questions (FAQs) Questions from Agency Purchasing Authorities and Cardholders 1. Where do I go
Information Technology Asset Management
Information Technology Asset Management HARDWARE SOFTWARE AND SERVICES AUBREY P. JONES, PMP DATA SYSTEMS ANALYSTS, INC SUMMARY Management of government/defense IT assets is an increasing target for cost
(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)
(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM Subject: Hardware and Software Management Approval: Brent Wahlquist Subject Number: IT-2 Transmittal
PGP Whole Disk Encryption Implementation
PGP Whole Disk Encryption Implementation Educause National Conference October 29, 2008 Gale Fritsche Tim Foley Lehigh University Library and Technology Services Lehigh Overview Founded in 1865. Private
