BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//The Michael R. McNulty Veteran Business Center - ECPv6.14.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:The Michael R. McNulty Veteran Business Center
X-ORIGINAL-URL:https://www.mcnultycenter.org
X-WR-CALDESC:Events for The Michael R. McNulty Veteran Business Center
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250626T130000
DTEND;TZID=America/New_York:20250626T143000
DTSTAMP:20260421T051257
CREATED:20250527T142151Z
LAST-MODIFIED:20250527T142212Z
UID:2671-1750942800-1750948200@www.mcnultycenter.org
SUMMARY:GOVOLOGY: Evolving DoD Contractor Cybersecurity Requirements
DESCRIPTION:USE CODE 52VBOCR20 WHEN YOU REGISTER! \nThe United States’ adversaries are actively stealing the country’s military and industrial competitive advantage. Ubiquitous access to every organization’s multi-interconnected information systems facilitates this theft. The US Federal government recognizes the risk of theft and sensitive information from its contractors’ information systems\, such as Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Therefore\, all Federal contractors have certain basic cybersecurity requirements they must implement in their internal information technology (IT) systems that process Federal contract-related data. \nAdditionally\, contractors that process information related to the Department of Defense contracts are beholden to DFARS clauses 252.204-7012 / 7019 / 7020 / 7021\, which requires more advanced cybersecurity safeguards. These safeguards are a challenge for any organization of any size to implement. \nIn this webinar\, Adam Austin\, Co-Founder\, Cybersecurity Lead\, and CTO of Totem Technologies\, will give an overview of these requirements in layperson’s terms\, describe some of the implementation challenges\, and provide resources that you can use to navigate the cybersecurity landscape. \nREGISTER HERE
URL:https://www.mcnultycenter.org/event/govology-evolving-dod-contractor-cybersecurity-requirements-2/
ATTACH;FMTTYPE=image/jpeg:https://www.mcnultycenter.org/wp-content/uploads/2025/05/Evolving-DoD-.jpg
END:VEVENT
END:VCALENDAR