(Webinar) Evolving DoD Contractor Cybersecurity Requirements
Wed, Jul 19
|register: david.b.miller@ttu.edu
The United States’ adversaries are actively stealing the country’s military and industrial competitive advantage. Ubiquitous access to every organization’s multi-interconnected information systems facilitates this theft. Webinar free for NW TX APEX clients. Not one yet? Become one today!


Time & Location
Jul 19, 2023, 12:00 PM – 1:30 PM CDT
register: david.b.miller@ttu.edu
About the event
Webinar at no charge for clients. Not a client? Become one easily today! Call (806) 834-5958.
The United States’ adversaries are actively stealing the country’s military and industrial competitive advantage. Ubiquitous access to every organization’s multi-interconnected information systems facilitates this theft. The US Federal government recognizes the risk of theft and sensitive information from its contractors’ information systems, such as Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Therefore, all Federal contractors have certain basic cybersecurity requirements they must implement in their internal information technology (IT) systems that process Federal contract-related data.
Additionally, contractors that process information related to the Department of Defense contracts are beholden to DFARS clause 252.204-7012/7019/7020/7021, which requires significant cybersecurity safeguards. These safeguards are a challenge for any organization of any size to implement.
In this webinar, Adam Austin, Co-Owner and CTO of Totem Technologies, will give an overview of these requirements in layman’s terms, describe some of the implementation challenges, and provide resources that you can use to navigate the cybersecurity landscape.
Instructor: ADAM AUSTIN, Co-Owner & CTO, Totem Technologies
Adam Austin has a decade of experience securing classified and HIPAA-environment US Government IT systems, having worked with NASA, the Centers for Medicare and Medicaid (CMS), and all branches of the Department of Defense. Adam holds a Master’s in Information Assurance from Capitol Technology University, and is an ISACA Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA). Adam’s goal is to leverage his experience and education to help small businesses implement affordable risk-based cybersecurity programs.