Here are some informational documents prepared by the office of Senator Mike Braun:
Please find guidance from the U.S. Department of Homeland Security regarding critical infrastructure during shutdowns below:
The Defense Cybersecurity Assurance Program (DCAP) supports defense contractors across the supply chain by offering expert cybersecurity training, consulting services and technical assistance. Additionally, a limited amount of grant funding is available for qualifying defense suppliers that need assistance in becoming compliant with DFARs 252.202-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) using the NIST SP 800-171 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations) security guidelines.
Compliance with this Defense Federal Acquisition Regulation is a mandatory requirement for defense contractors who receive Controlled Unclassified Information (CUI).
This seminar includes informational sessions that describe DoD cyber contracting regulations and requirements, resources, and practical tools that your business can use to meet the requirements.
When registering, you have the option to choose which Track of training you feel is best for your situation:
- Attendees should attend Track 1 to learn about the DoD cyber contracting regulations, get an overview of the NIST cybersecurity controls, learn about free self-assessment tools/resources and get an introduction to cyber providers who can help them.
- Attendees should attend Track 2 if they have started a System Security Plan (SSP), developed a Plan of Action and Milestones (POA&M) to close gaps to NIST SP 800-171 and they have an Incident Response Plan (IRP). The leader of this group will answer detailed questions regarding NIST 800-171 controls and describe how those controls can be met at your business.
May 12, 2020 – 8:30am – 4:30pm EST
Purdue University Fort Wayne
Walb Student Union
Fort Wayne, IN 46805
Specific Topics Covered at this Seminar in Track 2
3.8 Media Protection
Media protection is a requirement that addresses the defense of system media, which can be described as both digital and non-digital. Examples of digital media include: diskettes, magnetic tapes, external/removable hard disk drives, flash drives, compact disks, and digital video disks. Examples of non-digital media include paper or microfilm. Media protections can restrict access and make media available to authorized personnel only, apply security labels to sensitive information, and provide instructions on how to remove information from media so that the information cannot be retrieved or reconstructed.
3.9 Personnel Security
Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs can also impact the system’s security posture. Almost no system can be secured without properly addressing these aspects of personnel security. Personnel security seeks to minimize the risk that staff (permanent, temporary, or contractor) pose to company assets through the malicious use or exploitation of their legitimate access to the company’s resources.
3.10 Physical Protection
Examples of physical and environmental requirements include: physical access authorizations, physical access control, monitoring physical access, emergency shutoff, emergency power, emergency lighting, alternate work site, information leakage, and asset monitoring and tracking. Companies should limit physical access to systems, equipment, and the respective operating environments to authorized individuals, protect the physical plant and support infrastructure for systems, provide supporting utilities for systems, protect systems against environmental hazards, and provide appropriate environmental controls in facilities containing systems.
Please see attached flier for the 2020 Spring Mastodon Career Fair at Purdue University Fort Wayne. The event is planned for Thursday, April 2 from 1230 PM until 330 PM in the Lutheran Health Fieldhouse on the Purdue University Fort Wayne campus. If you would like additional information, please check out the web page HERE.
We are also starting a new program called Tuesday Talent Launch (view flier here), in which we will host employers looking to connect with Purdue Fort Wayne students for part-time jobs or internships. There is no fee to reserve a table, and employers are limited to participating twice per semester. The events will take place every Tuesday from 11:30 a.m. to 3 p.m. on the first floor of Kettler Hall, and Career Services will publicize the names of companies attending each week.
And, as always, feel free to pass this information along to your colleagues and other businesses.
Director, Office of Engagement
Purdue University Fort Wayne
Meet academic, industry and law enforcement experts for intimate discussions about cyber threats, trends and technologies. This even is free and open to the public.
When & Where:
February 28, 2020 from 6-9pm
Ivy Tech Fort Wayne Coliseum Campus Auditorium
3800 North Anthony Blvd.
Fort Wayne, IN
Presenters will include:
- Special Agents from the FBI Cybercrime Unit will be discussing cybercrime and how it affects everyone
- Dark Rhino Information Security will be speaking about what every company needs to know about Cybersecurity and protecting their company and customers
- Information Security Officers from Parkview Health will be speaking about what every individual needs to know about the internet, cybersecurity and protecting themselves
Presentations will be followed by an open discussion where questions can be posed to the panel of presenters.
Ivy Tech School of Information Security and the Information Technology Club