SlideShare a Scribd company logo
Cybersecurity Compliance
in Government Contracts
Robert E. Jones
CPA, CPCM, NCMA Fellow
Positive Share
“You don’t have to be
great to start, but you
have to start to be
great.”
~ Zig Ziglar
Safety Check
FAR Rule
52.204-21 Basic Safeguarding of Covered
Contractor Information System
15 items "a prudent business person would
employ…even if not covered by this rule.”
DFARS Rule
DFARS 252.204-7012 Safeguarding Covered
Defense Information and Cyber Incident Reporting
Note the “Cyber Incident Reporting”
Requires compliance with NIST (SP) 800-171
Controlled Unclassified Info (CUI)
115 categories and subcategories
Controlled Defense Information (CDI)
Controlled Technical Information (CTI)
NIST (SP) 800-171 R1
Protecting Controlled Unclassified Information in
Nonfederal Systems and Organizations
110 items across 14 categories of controls
Performance based requirements
One Size Fits All!
There are no scaled solutions for NIST 800-171
While some items may not apply to some entities,
the general requirement remains.
Internal Assessment
Do you process, store, or transmit CUI through
your network or systems?
Identify all data
Identify all networks, software, and apps
Review policies & procedures
Internal Assessment - Data
What kind of data do you process, store, or
transmit?
CDI/CTI – Controlled Defense/Technical
Information
PII – Personally Identifiable Information
PHI – Personal Health Information
Other
Internal Assessment - System
Where/how is it processed, stored, or transmitted?
Internal network
Cloud
Apps
Internal Assessment - Policies
Do you have written policies & procedures?
Configuration management
Access control & authorization
Physical access
Maintenance
Internal Assessment
Excel list of the NIST 800-171 requirements as a
starting point.
Yes – with links or references
No – with info for the POA&M
N/A – document why N/A
Hiring External Help
Technical firms – focus on the technical aspects of
installation and configuration
Consulting firms – focused on compliance
CPA firms – focused on audits and compliance
System Security Plan (SSP)
An overview of the security requirements of the
system and description of the controls in place or
planned, responsibilities and expected behavior of
all individuals who access the system.
Plan of Actions & Milestones
(POA&M)
Document to assist organizations in identifying,
prioritizing, and monitoring the progress of
corrective efforts for security
weaknesses/deficiencies/vulnerabilities found in
programs and systems.
External Reviews & Audits
DoD not accepting third-party verification
Primes may require third-party verification of subs
Cybersecurity in GovCon
Acquisition
Government may request SSP and/or POA&M as
part of RFP
May identify cybersecurity compliance as an
evaluation factor
Gov’t Ensuring Compliance
Evaluating SSP as part of the solicitation
Gov’t Ensuring Compliance
Making the POA&M part of contract oversight.
Tying progress reports and milestone payments to
the POA&M.
Cost of Non-Compliance
What if you don’t complete the POA&M tasks on
time?
You may not get paid!
Cost of Non-Compliance
What if the SSP is not solid or complete?
You may not win the award!
Cost of Non-Compliance
Liquidated damages for late delivery or non-
conforming data.
Cost of Non-Compliance
What if you deliver non-conforming data?
You may not get paid!
Failure to Properly Mark CUI
I believe this will be the number one failure point
for many companies.
Cost of Non-Compliance
Cure notices
Stop work orders
Terminations
Poor performance rating in CPAR
Compliance Strategies
Other frameworks
SANS/CIS 20
COBIT 5
ISO/IEC 27001
Sarbanes-Oxley*
*Mandatory for public issuers
Compliance Strategies
Rely on the cloud
Scalable
Affordable
Secure
Reliable
Know where your data is stored!
Compliance Strategies
Office 365 over Google
Google
Office 365
Compliance Strategies
Start with good personal cyber hygiene
Start with simple tools
Path Forward
Continuous process – not a “once and done.”
Train employees
Stay current
What’s Next?
Expect the DFARS rule to become the FAR rule.
(Or something very similar)
Not all agencies have rules or even follow the
FAR.
What’s Next?
Protests
Cyber Incidents/Breaches
Court Cases
Contact
Robert E. Jones, CPA, CPCM, NCMA Fellow
(614) 556-4415
robert@leftbrainpro.com
FAR Rule
1. Limit system access to authorized users
2. Limit system access to authorized types of
transactions
3. Limit connections to external systems
4. Control publicly accessible information
5. Identify system users and processes
FAR Rule
6. Authenticate users
7. Sanitize or destroy media before disposal
8. Limit physical access
9. Escort visitors and monitor activity
10.Monitor communications at external boundaries
FAR Rule
11.Separate publicly accessible systems
12.Identify and correct system flaws
13.Protect against malicious code
14.Update malicious code protections
15.Perform periodic system scans
NIST (SP) 800-171 R1
1. Access Control
2. Awareness & Training
3. Audit & Accountability
4. Configuration Management
5. Identification & Authentication
6. Incident Response
7. Maintenance
NIST (SP) 800-171 R1
8. Media Protection
9. Personnel Security
10.Physical Protection
11.Risk Assessment
12.Security Assessment
13.System & Communication Protection
14.System & Information Integrity
Surveys, Reviews, & Audits
Survey – consulting engagement with no
assurance ($)
Review – more formal with limited assurance ($$)
Audit – most formal (and intense) with assurance
($$$)

More Related Content

What's hot

QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
Tripwire
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
FitCEO, Inc. (FCI)
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
Tripwire
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
ecarrow
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
EC-Council
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
Graeme Hein
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
Bernie Leung, P.E., CISSP
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
prevalentnetworks
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
ControlCase
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
ControlCase
 
Risk Presentation
Risk PresentationRisk Presentation
Risk Presentation
Kathy_67
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
ControlCase
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent Compliance
BMC Software
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
Tuan Phan
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
kCura_Relativity
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
ControlCase
 
Isms3
Isms3Isms3
Isms3
aaditya
 

What's hot (20)

QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Risk Presentation
Risk PresentationRisk Presentation
Risk Presentation
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent Compliance
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Isms3
Isms3Isms3
Isms3
 

Similar to Cybersecurity Compliance in Government Contracts

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
KellyMcBrair
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
Appsian
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | Symmetry
Symmetry™
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
AlienVault
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
MargenePurnell14
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
Ignyte Assurance Platform
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
Maarten BOONEN
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
EstelaJeffery653
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
SoniaCristina49
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 

Similar to Cybersecurity Compliance in Government Contracts (20)

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | Symmetry
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA event
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 

Recently uploaded

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Lviv Startup Club
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 

Recently uploaded (20)

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 

Cybersecurity Compliance in Government Contracts

  • 1. Cybersecurity Compliance in Government Contracts Robert E. Jones CPA, CPCM, NCMA Fellow
  • 2. Positive Share “You don’t have to be great to start, but you have to start to be great.” ~ Zig Ziglar
  • 4. FAR Rule 52.204-21 Basic Safeguarding of Covered Contractor Information System 15 items "a prudent business person would employ…even if not covered by this rule.”
  • 5. DFARS Rule DFARS 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting Note the “Cyber Incident Reporting” Requires compliance with NIST (SP) 800-171
  • 6. Controlled Unclassified Info (CUI) 115 categories and subcategories Controlled Defense Information (CDI) Controlled Technical Information (CTI)
  • 7. NIST (SP) 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations 110 items across 14 categories of controls Performance based requirements
  • 8. One Size Fits All! There are no scaled solutions for NIST 800-171 While some items may not apply to some entities, the general requirement remains.
  • 9. Internal Assessment Do you process, store, or transmit CUI through your network or systems? Identify all data Identify all networks, software, and apps Review policies & procedures
  • 10. Internal Assessment - Data What kind of data do you process, store, or transmit? CDI/CTI – Controlled Defense/Technical Information PII – Personally Identifiable Information PHI – Personal Health Information Other
  • 11. Internal Assessment - System Where/how is it processed, stored, or transmitted? Internal network Cloud Apps
  • 12. Internal Assessment - Policies Do you have written policies & procedures? Configuration management Access control & authorization Physical access Maintenance
  • 13. Internal Assessment Excel list of the NIST 800-171 requirements as a starting point. Yes – with links or references No – with info for the POA&M N/A – document why N/A
  • 14. Hiring External Help Technical firms – focus on the technical aspects of installation and configuration Consulting firms – focused on compliance CPA firms – focused on audits and compliance
  • 15. System Security Plan (SSP) An overview of the security requirements of the system and description of the controls in place or planned, responsibilities and expected behavior of all individuals who access the system.
  • 16. Plan of Actions & Milestones (POA&M) Document to assist organizations in identifying, prioritizing, and monitoring the progress of corrective efforts for security weaknesses/deficiencies/vulnerabilities found in programs and systems.
  • 17. External Reviews & Audits DoD not accepting third-party verification Primes may require third-party verification of subs
  • 18. Cybersecurity in GovCon Acquisition Government may request SSP and/or POA&M as part of RFP May identify cybersecurity compliance as an evaluation factor
  • 19. Gov’t Ensuring Compliance Evaluating SSP as part of the solicitation
  • 20. Gov’t Ensuring Compliance Making the POA&M part of contract oversight. Tying progress reports and milestone payments to the POA&M.
  • 21. Cost of Non-Compliance What if you don’t complete the POA&M tasks on time? You may not get paid!
  • 22. Cost of Non-Compliance What if the SSP is not solid or complete? You may not win the award!
  • 23. Cost of Non-Compliance Liquidated damages for late delivery or non- conforming data.
  • 24. Cost of Non-Compliance What if you deliver non-conforming data? You may not get paid!
  • 25. Failure to Properly Mark CUI I believe this will be the number one failure point for many companies.
  • 26. Cost of Non-Compliance Cure notices Stop work orders Terminations Poor performance rating in CPAR
  • 27. Compliance Strategies Other frameworks SANS/CIS 20 COBIT 5 ISO/IEC 27001 Sarbanes-Oxley* *Mandatory for public issuers
  • 28. Compliance Strategies Rely on the cloud Scalable Affordable Secure Reliable Know where your data is stored!
  • 32. Compliance Strategies Start with good personal cyber hygiene Start with simple tools
  • 33. Path Forward Continuous process – not a “once and done.” Train employees Stay current
  • 34. What’s Next? Expect the DFARS rule to become the FAR rule. (Or something very similar) Not all agencies have rules or even follow the FAR.
  • 36. Contact Robert E. Jones, CPA, CPCM, NCMA Fellow (614) 556-4415 robert@leftbrainpro.com
  • 37.
  • 38. FAR Rule 1. Limit system access to authorized users 2. Limit system access to authorized types of transactions 3. Limit connections to external systems 4. Control publicly accessible information 5. Identify system users and processes
  • 39. FAR Rule 6. Authenticate users 7. Sanitize or destroy media before disposal 8. Limit physical access 9. Escort visitors and monitor activity 10.Monitor communications at external boundaries
  • 40. FAR Rule 11.Separate publicly accessible systems 12.Identify and correct system flaws 13.Protect against malicious code 14.Update malicious code protections 15.Perform periodic system scans
  • 41. NIST (SP) 800-171 R1 1. Access Control 2. Awareness & Training 3. Audit & Accountability 4. Configuration Management 5. Identification & Authentication 6. Incident Response 7. Maintenance
  • 42. NIST (SP) 800-171 R1 8. Media Protection 9. Personnel Security 10.Physical Protection 11.Risk Assessment 12.Security Assessment 13.System & Communication Protection 14.System & Information Integrity
  • 43. Surveys, Reviews, & Audits Survey – consulting engagement with no assurance ($) Review – more formal with limited assurance ($$) Audit – most formal (and intense) with assurance ($$$)

Editor's Notes

  1. Most organizations need external help with technical expertise, compliance strategies, bandwidth, and audit reports. External parties can assist with the internal assessment/gap analysis and preparation of the SSP and POA&M. Technical firms help you with the hardware, software, and configuration issues. These are the people working in or on your system. Consulting firms help you evaluate your compliance, develop strategic plans, and manage the project. CPA firms help you with formal audits and reviews. Most offer consulting services and many have technical teams on staff or as business partners. A good auditor and audit program are doing more than checking the box, they are evaluating the effectiveness of the control.
  2. IPKeys – awardee had a higher ranking than the protestor. GAO denied the protest. Synernen did not propose accredited software and did not address accreditation in its proposal even though cybersecurity was clearly identified in the RFP.
  3. Close the barn doors first. We’ll worry about the windows, grooves, and cracks later.
  4. Surveys can be performed by technical and consulting firms since there is no assurance. Reviews and audits are performed by CPAs and auditors, following strict guidelines.