Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

June 18, 2007 M. Pedrosa de Barros ANACOMs Comments to the ARECI Study r.
Successful Project Management Justice, E-Government, & the Internet June 28, 2000 – Dallas, Texas Lawrence P. Webster.
1 General Services Department State Purchasing Division ePROCUREMENT PHASE II Project Certification – Initiation/Planning Phase October 28, 2009.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Civilian Agency Acquisition Council Ralph De Stefano Director Contract Policy Division Civilian Agency Acquisition Council.
U.S. General Services Administration Presentation to: ITIC Improving Cybersecurity through Acquisition Emile Monette Senior Advisor for Cybersecurity GSA.
CENTRAL CONTRACTOR REGISTRATION (CAGE CODES) DFARS Case 2003-D040 DFARS Parts 204, 212, 213 and 252 are amended to remove policy on Central Contractor.
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
U.S. General Services Administration Presentation to: ACT-IAC Cybersecurity SIG Improving Cybersecurity through Acquisition Emile Monette Senior Advisor.
PESO Meeting | June 11, TAC 213 Electronic and Information Resources Rule Review Jeff Kline Statewide Accessibility Coordinator Lon Berquist Technology.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Proper Use of Non-DoD Contracts SAF/AQCP 6 December 2004.
Homeland Infrastructure Foundation Level Data (HIFLD) Working Group HIFLD Partners Brief Feb FGDC Subcommittee Charter Update.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
1 LBNL Enterprise Computing (EC) January 2003 LBNL Enterprise Computing.
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
Successful Project Management Justice, E-Government, & the Internet June 28, 2000 – Dallas, Texas Lawrence P. Webster.
COMMERCIAL “SOLE SOURCE” PROPOSAL ANALYSIS ROADMAP 1. Is information available within the Government? Step 1 – Information within the Government If Yes.
Financial Management For Project Administrators. How Feds View Themselves.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Office of Management and Budget Program Management Systems Committee February 8, 2005 EVMS Actions in Process David Muzio.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Section 508 of the Rehabilitation Act of 1973 Mr. Wayman I. Braxton.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT Alan Chvotkin Senior Vice President and Counsel Professional Services Council DEFENSE ACQUISITION.
The Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards The OMB SuperCircular Information for FTA Grantees.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
1 This Presentation is printed on recycled materials.
Procurement Division Procurement Reform Recommendation #19  “DGS shall authorize individual signature authority for contracting and procurement officials.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Homeland Security UNCLASSIFIED Executive Order Presidential Policy Directive (PPD) - 21 Implementing the Presidential Executive Order (EO) on cybersecurity.
Implementing the Regulatory Flexibility Act. 2 Background The Regulatory Flexibility Act (5 U.S.C. 601–612) requires Federal agencies to— –Consider the.
Policies and procedures for developing acquisition plans; determining whether to use commercial or Government resources; whether it is more economical.
Office of Management and Budget NDIA Program Management Systems Committee May 3, 2005 EVMS Compliance Requirements David Muzio.
Project Management Processes for a Project
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Of XX Data Rights, Intellectual Property, Information Technology and Export Controls in Government Contracting Fernand Lavallee, Partner, Jones Day ©2015.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
C-DERL is an application designed to be a Federal- wide, online repository for data standards, definitions, and context. It was authorized jointly by the.
CYBER SECURITY in UKRAINE NATO LIAISON OFFICE, KYIV
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
This session is sponsored by the Federal Acquisition Institute The primary organization providing knowledge and support to the federal civilian acquisition.
Acquisition Policy SCM-OC July Lesson Outline  US DOD Acquisition Policy and Authority  Acquisition Framework  USG, Foreign Government and Industry.
1 Cost Price and Finance Robin Schulze, Senior Procurement Analyst Friday, October 26, 2007 Defense Acquisition Regulations System
Framework contracts (unit-price based) for frequently purchased commercial products Contracted by PPS, available for all public entities for.
FITARA Revamping IT in the Federal Government Presentation to DIR Information Security Forum Richard A. Spires April 14, 2016.
Buying Energy Efficient Products: Policy Requirements, Purchasing Tools, and Agency Experiences Christopher Payne Lawrence Berkeley National Laboratory.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Federal Procurement of Energy-Efficient Products: Policy Requirements & Purchasing Tools Christopher Payne Lawrence Berkeley National Laboratory June 17,
Juanita Syljuberget Alabama Cooperative Extension System May 23, 2012.
1DoD Cloud Computing Read the provided excerpts from - The “25 Point Implementation Plan to Reform Federal IT” - DoD Cloud Computing Strategy - The National.
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT
Presenter: Mohammed Jalaluddin
HOW TO DO BUSINESS WITH THE FEDERAL GOVERNMENT
PSC Guidelines and Recommendations
Transactional Data Reporting
Cybersecurity in Belarus a general overview of support areas
TPM – A Tailored Approach Project Management Web Button Design
UNLV Data Governance Executive Sponsors Meeting
Perspectives on Defense Cyber Issues
Cybersecurity ATD technical
Understanding the New Micro-Purchase Thresholds
An Executive Summary: The Issue the Profile Addresses, Its Development as a Solution, Its Benefits, and Support The Issue: Domestic and international regulatory.
Uniform Guidance and Grants Accounting
Step 3. Initiate Proposal
Presentation transcript:

Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition

Executive Order & Presidential Policy Directive 21  EO Sec 8(e): Within 120 days, joint report on feasibility, security benefits, and merits of incorporating cybersecurity-relevant standards in acquisition planning and contract administration; include actions to harmonize existing procurement rules.  GSA-DoD Joint Working Group on Improving Cybersecurity and Resilience through Acquisition chartered to draft recommendations (June 12, 2013)  PPD-21: DoD, DHS, and GSA to provide or support government-wide contracts for critical infrastructure systems and ensure that such contracts include audit rights for security of critical infrastructure.  To the extent applicable, the recommendations in the report will lay the foundation for establishment or identification of the contracts required by the PPD.  The agencies plan to address PPD-21 requirements after June 12th 1

Federal Register Notice - Request for Information  Feasibility  How can the government increase cyber security in federal acquisitions while minimizing barriers to entry?  Are there specific categories of acquisitions to which federal cyber security standards should (or should not) apply?  Commercial Practice  Is there a widely accepted cyber security risk analysis framework?  Harmonization  What are conflicts in rules, standard practices, or terms and conditions affecting procurement practices related to cyber security and how can the federal government best resolve those conflicts? 2

DRAFT Recommendations 1.Institute Baseline Cybersecurity Requirements as a Condition of Contract Award. 2.Develop Common Cybersecurity Definitions for Federal Acquisitions. 3.Institute a Federal Acquisition Cyber Risk Management Strategy. 4.Include a Requirement to Purchase from Original Equipment Manufacturers, Their Authorized Resellers, or Other Trusted Sources in Appropriate Overlays. 5.Increase Government Accountability for Cyber Risk Management. 6.Address Cybersecurity in Relevant Training. 3