BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//The Michael R. McNulty Veteran Business Center - ECPv6.14.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:The Michael R. McNulty Veteran Business Center
X-ORIGINAL-URL:https://www.mcnultycenter.org
X-WR-CALDESC:Events for The Michael R. McNulty Veteran Business Center
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250925T130000
DTEND;TZID=America/New_York:20250925T143000
DTSTAMP:20260420T230526
CREATED:20250825T172815Z
LAST-MODIFIED:20250825T172815Z
UID:2823-1758805200-1758810600@www.mcnultycenter.org
SUMMARY:GOVOLOGY: Evolving DoD Contractor Cybersecurity Requirements
DESCRIPTION:Enter the code: 52VBOCR20 when you register! \nThe United States’ adversaries are actively stealing the country’s military and industrial competitive advantage. Ubiquitous access to every organization’s multi-interconnected information systems facilitates this theft. The US Federal government recognizes the risk of theft and sensitive information from its contractors’ information systems\, such as Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Therefore\, all Federal contractors have certain basic cybersecurity requirements they must implement in their internal information technology (IT) systems that process Federal contract-related data. \nREGISTER HERE
URL:https://www.mcnultycenter.org/event/govology-evolving-dod-contractor-cybersecurity-requirements-3/
ATTACH;FMTTYPE=image/png:https://www.mcnultycenter.org/wp-content/uploads/2025/08/Evolving-DoD-Contractor-Cybersecurity-Requirements.png
END:VEVENT
END:VCALENDAR