9:00AM Regulatory and Technical Overview
1. Adversaries and Threats
2. Definitions from Denial of Service to Zero-Day Exploits
3. Regulations in Perspective
4. The NIST Framework
5. Federal Agencies – from Commerce through the DoD to the Veterans Administration
6. DFARS and new DFARS Requirements
7. Unclassified Controlled Technical Information
8. Safeguarding of Information
9. Proposed Regulations
10. Proposed/Pending Legislation
10:30AM Break
10:45AM Integrating Cybersecurity Into Federal Acquisitions
1. Federal Cybersecurity Guidance
a. Executive Orders
b. DoD Initiatives
c. OMB Guidance
2. Analysis of the Existing References
3. Cybersecurity Acquisitions from “Bolt-On” to “Baked-In”
4. Cyber Risk Management
5. Acquisition Life Cycle Impacts
a. Statements of Work
b. Solicitations
c. Evaluation Criteria
6. Acquisition Planning Best Practices
7. Source Selection Best Practices
8. Program and Project Management
9. The Shift from Compliance to a Risk-Based Management Framework
10. Cybersecurity Integration into Program Acquisition, Execution, and Support
12:00PM Lunch Break
1:00PM Compliance and Supply Chain Risk
1. The Supply Chain Focus and Significance
2. Supply Chain Safeguards
3. Cybersecurity Flowdowns
4. DoD Authority
5. Covered Procurements
6. Prime Contractor Considerations
7. Subcontractor Considerations
8. Subcontract Terms and Conditions
9. Export Issues
10. Cyber Certifications and Qualifications
2:30PM Break
2:45PM Mitigating Cybersecurity Risks
1. Risk Management and Insurance
2. Insurance as a Risk-Sharing Mechanism
3. Types of Insurance
4. Insurance Coverage, Terms and Conditions
5. Insurance Risk Assessment
6. Existing Policies and Coverage
7. Risk Exposure and Liability
8. Insurance Claims
9. The Cybersecurity Insurance Audit
10. Reputational Harm
11. Insurance Premiums
12. Coverage Decision-Making
4:00PM Adjournment