When stay-at-home orders are lifted, you’ll need to be ready to keep your customers and employees safe from COVID-19. Now is the time to start mapping out what a healthy reopening will look like at your business:
- How might you implement distancing measures?
- Would employees or customers need to wear face masks?
- Are there cleaning procedures that could help prevent the spread of the virus?
Join Greater Fort Wayne Inc. for “Roadmap to a Healthy Reopening”, a series of FREE webinars that will help you think through the procedures and protocols to consider implementing. Presented by Greater Fort Wayne Inc. and the Northeast Indiana Regional Partnership and led by doctors from Parkview Health and the Allen County Department of Health, each session is tailored to be industry-specific:
- Manufacturing/Warehousing: Thursday, April 30 at 9 a.m. (REGISTER)
- Restaurants/Hospitality: Thursday, April 30 at 11 a.m. (REGISTER)
- Retail: Thursday, April 30 at 1 p.m. (REGISTER)
- Other/Small Business: Thursday, April 30 at 3 p.m. (REGISTER)
- Professional Services/Office: Friday, May 1 at 9 a.m. (REGISTER)
- Personal Services/Real Estate: Friday, May 1 at 11 a.m. (REGISTER)
- Religious Organizations: Friday, May 1 at 1 p.m. (REGISTER)
- Schools/Education: Monday, May 4 at 1:00 p.m. (REGISTER)
The State of Indiana is seeking companies to provide Personal Protection Equipment (PPE). The kinds of equipment and associated specifications are provided in the file linked below. Luke Bosso is the first point of contact for the State of Indiana’s procurement of goods such as gowns, masks, and shields.
If your company is able to provide this type of equipment, please contact Luke directly – his contact information is below:
SVP, Chief of Staff
Indiana Economic Development Corporation
1 North Capitol Avenue, Suite 700
Indianapolis, IN 46204
Here are some informational documents prepared by the office of Senator Mike Braun:
Please find guidance from the U.S. Department of Homeland Security regarding critical infrastructure during shutdowns below:
The Defense Cybersecurity Assurance Program (DCAP) supports defense contractors across the supply chain by offering expert cybersecurity training, consulting services and technical assistance. Additionally, a limited amount of grant funding is available for qualifying defense suppliers that need assistance in becoming compliant with DFARs 252.202-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) using the NIST SP 800-171 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations) security guidelines.
Compliance with this Defense Federal Acquisition Regulation is a mandatory requirement for defense contractors who receive Controlled Unclassified Information (CUI).
This seminar includes informational sessions that describe DoD cyber contracting regulations and requirements, resources, and practical tools that your business can use to meet the requirements.
When registering, you have the option to choose which Track of training you feel is best for your situation:
- Attendees should attend Track 1 to learn about the DoD cyber contracting regulations, get an overview of the NIST cybersecurity controls, learn about free self-assessment tools/resources and get an introduction to cyber providers who can help them.
- Attendees should attend Track 2 if they have started a System Security Plan (SSP), developed a Plan of Action and Milestones (POA&M) to close gaps to NIST SP 800-171 and they have an Incident Response Plan (IRP). The leader of this group will answer detailed questions regarding NIST 800-171 controls and describe how those controls can be met at your business.
May 12, 2020 – 8:30am – 4:30pm EST
Purdue University Fort Wayne
Walb Student Union
Fort Wayne, IN 46805
Specific Topics Covered at this Seminar in Track 2
3.8 Media Protection
Media protection is a requirement that addresses the defense of system media, which can be described as both digital and non-digital. Examples of digital media include: diskettes, magnetic tapes, external/removable hard disk drives, flash drives, compact disks, and digital video disks. Examples of non-digital media include paper or microfilm. Media protections can restrict access and make media available to authorized personnel only, apply security labels to sensitive information, and provide instructions on how to remove information from media so that the information cannot be retrieved or reconstructed.
3.9 Personnel Security
Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs can also impact the system’s security posture. Almost no system can be secured without properly addressing these aspects of personnel security. Personnel security seeks to minimize the risk that staff (permanent, temporary, or contractor) pose to company assets through the malicious use or exploitation of their legitimate access to the company’s resources.
3.10 Physical Protection
Examples of physical and environmental requirements include: physical access authorizations, physical access control, monitoring physical access, emergency shutoff, emergency power, emergency lighting, alternate work site, information leakage, and asset monitoring and tracking. Companies should limit physical access to systems, equipment, and the respective operating environments to authorized individuals, protect the physical plant and support infrastructure for systems, provide supporting utilities for systems, protect systems against environmental hazards, and provide appropriate environmental controls in facilities containing systems.