Compliance with DFARS cybersecurity clause training created by the Georgia Tech PTAC: https://gtpac.org/cybersecurity-training-video/
GENEDGE resources: https://www.genedge.org/resources/cybersecurity-materials/
Comprehensive blog article with resources: NIST and DFARS and Cyber Compliance (oh my)!
Cybersecurity update presentation featured at DoD’s Beyond Phase II Mentor-Protégé Training Week (BPIIMPTW18) conference in Orlando, August 2018
Article from National Defense Feb 2019
A collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense. Includes webinars and other resources on Cybersecurity, Government Furnished Property (GFP), Unique Identification (UID), and eBusiness.
Resource Link: http://dodprocurementtoolbox.com/
Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program standardizes the way the Executive branch handles unclassified information that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Government-wide policies.
Resource Link: https://www.archives.gov/cui
United States Computer Emergency Readiness Team (US-CERT) is part of the Department of Homeland Security. US-CERT serves as a centralized hub of coordination and information sharing between federal organizations and their mission includes providing boundary protection for the federal civilian executive domain and cybersecurity leadership. See here for how it can be helpful: https://ics-cert.us-cert.gov/
Resource Link: https://ics-cert.us-cert.gov/
The National CyberWatch Center is a consortium of higher education institutions, public and private schools, businesses, and government agencies focused on collaborative efforts to advance cybersecurity education and strengthen the national cybersecurity workforce.
Resource Link: https://www.nationalcyberwatch.org/
The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. This approach uses a “do once, use many times” framework that saves cost, time, and staff required to conduct redundant agency security assessments.
Resource Link: https://www.fedramp.gov/