Cybersecurity: More
than a DoD Issue
Robert E. Jones
Government Contracts & Accounting Expert
CPA, CPCM, NCMA Fellow
Meet your presenter:
• Robert has over 15 years of Department of
Defense contract and accounting experience.
• He has successfully managed over $400 million
in federal contracts.
About us
Left Brain Professionals is a boutique accounting firm that
serves government contractors. We specialize in
accounting system design, implementation, and audit
support.
Our Services
Cybersecurity: More than A DoD Issue
Why we’re
here
To learn the basics of
cybersecurity compliance for your
business.
Learning
Objectives
• Identify the cybersecurity
requirements in your contracts
• Define the basic cybersecurity
requirements
• List simple steps you can take
towards compliance
• Get certified!
Identify Requirements
in Your Contracts
FAR 52.204-21
• Basic Safeguarding of Covered Contractor
Information Systems
DFARS 252.204-7012
• Safeguarding Covered Defense Information
and Cyber Incident Reporting
Focus on Systems vs Data
Identify Requirements
• Other agency
• Commercial requirements
Room Poll
What cybersecurity requirements exist in your contracts?
• FAR 52.204-21
• DFARS 252.204-7012
• Another agency
• Other/commercial
• I don’t know
Define Basic
Cybersecurity Reqs
• NIST (SP) 800-171
• COBIT 5
• SANS 20
• ISO/IEC 27001
NIST (SP) 800-171
• Access Control
• Awareness and Training
• Audit and Accountability
• Configuration
Management
• Identification and
Authentication
• Incident Response
• Maintenance
• Media Protection
• Personnel Security
• Physical Protection
• Risk Assessment
• Security Assessment
• System and
Communications
Protection
• System and Information
Integrity
Other Frameworks
• COBIT 5
• SANS 20
• ISO/IEC 27001
Room Poll
How many requirements are listed in NIST (SP) 800-171?
• 14
• 110
• 171
• 222
Simple Steps
Towards Compliance
• Train all employees
• Use multifactor authentication
• Inventory all devices and software
• Allow only certain devices to
connect
• Remote wipe devices
• Utilize cloud storage
Train All Employees
• Provide annual cybersecurity awareness training to all
employees
• Provide periodic threat updates
• Utilize phishing test services
• Provide advanced training to IT and other key individuals
Use Multifactor Authentication
• Enable multifactor authentication on all PCs and servers
• Enable multifactor authentication on all email, VPN, and
networks
• Enable multifactor authentication on as many software
and accounts as possible
Inventory All Devices and Software
• Take an inventory of all devices (PCs, servers, phones,
tablets, printers, scanners)
• Take an inventory of all software (including version and
licenses)
• Take an inventory of all users and access
Allow Only Certain Devices to
Connect
• Block access to all emails, networks, and servers by
default
• Allow access by exception
Remote Wipe Devices
Setup remote access with wipe capability on all devices
(laptops, phones, tablets)
Utilize Cloud Storage
Take advantage of the security built into cloud applications
and storage
• FedRAMP for CUI on government contracts
 Not required for commercial contracts
Room Poll
Which of the following is not a step towards compliance?
• Training a select few employees
• Taking an inventory of devices
• Setting up remote wipe of devices
• Utilizing cloud storage
Get Certified
• New CMMC from DoD
• Cybersecurity Maturity Model
Certification
• 5 levels
• Will be required by mid-2020
CMMC
18 domains that mimic 14
categories in NIST (SP) 800-
171
CMMC
5 levels of certification
Room Poll
Cybersecurity certification will soon be required for all
defense contractors?
• True
• False
Discussion
and Q & A
Connect
with us
Download the presentation
Left Brain
Professionals Inc.
@LeftBrainPro
@LeftBrainPro
Email: support@leftbrainpro.com
Melissa R. Metzger
MAFM
melissa@leftbrainpro.com
Robert E. Jones
CPA, CPCM, NCMA Fellow
robert@leftbrainpro.com

More Related Content

PPTX
Essential Layers of IBM i Security: System-Access Security
PPTX
An Introduction to South Seas Corporation
PPT
PPTX
Functions and features network management
PDF
I aspire instant call center
PPTX
10 Quick Cybersecurity Wins for Small Business
PDF
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
PPTX
BalaBit 2015: Control Your IT Staff
Essential Layers of IBM i Security: System-Access Security
An Introduction to South Seas Corporation
Functions and features network management
I aspire instant call center
10 Quick Cybersecurity Wins for Small Business
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
BalaBit 2015: Control Your IT Staff

What's hot (20)

PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
Cybersecurity
PPTX
Post Wannacry Update
PPTX
3 steps to 4x the risk coverage of CA ControlMinder
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PDF
CyberArk Cleveland Defend End Point Infection and Lateral Movement
PDF
Step Into Security Webinar - Physical Security Integration & Access Control -...
PPTX
Combatting Intruders on IBM i with IDS
PPTX
Sophos synchronized security in action @Netpluz CS Event Nov 2017
PPTX
OwnYIT CSAT + SIEM
PDF
Virtual Security
PPTX
6 Steps to Secure Network Devices
PDF
New VIPRE_DS_EndpointSecurity_2016
PPT
Check mate Barcode Tracking Solutions
PDF
Mobile payments and PCI DSS
PPT
UTM Basic Rev 1.2 (Modified)
PPTX
SecureTower General Info
PDF
MITRE ATT&CK and 2017 FSB Indictment
PPTX
PPTX
Managing and securing mobile devices
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Cybersecurity
Post Wannacry Update
3 steps to 4x the risk coverage of CA ControlMinder
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
CyberArk Cleveland Defend End Point Infection and Lateral Movement
Step Into Security Webinar - Physical Security Integration & Access Control -...
Combatting Intruders on IBM i with IDS
Sophos synchronized security in action @Netpluz CS Event Nov 2017
OwnYIT CSAT + SIEM
Virtual Security
6 Steps to Secure Network Devices
New VIPRE_DS_EndpointSecurity_2016
Check mate Barcode Tracking Solutions
Mobile payments and PCI DSS
UTM Basic Rev 1.2 (Modified)
SecureTower General Info
MITRE ATT&CK and 2017 FSB Indictment
Managing and securing mobile devices
Ad

Similar to Cybersecurity: More than A DoD Issue (20)

PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPTX
CMMC DFARS/NIST SP 800-171
PPTX
Practical Cybersecurity Compliance for Small Business Contractors
PPTX
CMMC rollout: How CMMC will impact your organization
PPTX
PPTX
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
PDF
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
PPTX
Webinar: Critical Steps For NIST Compliance
PPTX
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
PPTX
Performing PCI DSS Assessments Using Zero Trust Principles
PPTX
How I Woke Up from the CMMC Compliance Nightmare
PDF
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
PPTX
CMMC Certification
PPTX
Cybersecurity Compliance in Government Contracts
PPTX
Supporting your CMMC initiatives with Sumo Logic
PPTX
MCGlobalTech CMMC Managed Compliance Service
PPTX
Analyzing Your Government Contract Cybersecurity Compliance
PDF
The Legal Case for Cybersecurity
PPTX
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
PDF
Beyond NIST, CMMC certification_webinar.pdf
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
CMMC DFARS/NIST SP 800-171
Practical Cybersecurity Compliance for Small Business Contractors
CMMC rollout: How CMMC will impact your organization
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
Webinar: Critical Steps For NIST Compliance
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
Performing PCI DSS Assessments Using Zero Trust Principles
How I Woke Up from the CMMC Compliance Nightmare
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
CMMC Certification
Cybersecurity Compliance in Government Contracts
Supporting your CMMC initiatives with Sumo Logic
MCGlobalTech CMMC Managed Compliance Service
Analyzing Your Government Contract Cybersecurity Compliance
The Legal Case for Cybersecurity
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
Beyond NIST, CMMC certification_webinar.pdf
Ad

Recently uploaded (20)

PDF
The GDP double bind- Anders Wijkman Honorary President Club of Rome
PDF
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
PPTX
Neurons.pptx and the family in London are you chatgpt
PPTX
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
PPTX
Presentation on CGIAR’s Policy Innovation Program _18.08.2025 FE.pptx
PPTX
CHS rollout Presentation by Abraham Lebeza.pptx
PPTX
3.-Canvassing-Procedures49for election.pptx
PDF
AAAAAAAAAAAAAAAAAaaaaaaaAAAAAAAt - ĐV.pdf
PPTX
Part II LGU Accreditation of CSOs and Selection of Reps to LSBs ver2.pptx
PPTX
BHARATIYA NAGARIKA SURAKSHA SAHMITA^J2023 (1).pptx
PPTX
Parliamentary procedure in meeting that can be use
PPTX
Introduction to the NAP Process and NAP Global Network
PDF
4_Key Concepts Structure and Governance plus UN.pdf okay
PDF
Introducrion of creative nonfiction lesson 1
PPTX
Workshop introduction and objectives. SK.pptx
PPTX
cpgram enivaran cpgram enivaran cpgram enivaran
PPTX
DFARS Part 253 - Forms - Defense Contracting Regulations
PDF
Item # 8 - 218 Primrose Place variance req.
PDF
ESG Alignment in Action - The Abhay Bhutada Foundation
PDF
Item # 10 -- Set Proposed 2025 Tax Rate
The GDP double bind- Anders Wijkman Honorary President Club of Rome
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
Neurons.pptx and the family in London are you chatgpt
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
Presentation on CGIAR’s Policy Innovation Program _18.08.2025 FE.pptx
CHS rollout Presentation by Abraham Lebeza.pptx
3.-Canvassing-Procedures49for election.pptx
AAAAAAAAAAAAAAAAAaaaaaaaAAAAAAAt - ĐV.pdf
Part II LGU Accreditation of CSOs and Selection of Reps to LSBs ver2.pptx
BHARATIYA NAGARIKA SURAKSHA SAHMITA^J2023 (1).pptx
Parliamentary procedure in meeting that can be use
Introduction to the NAP Process and NAP Global Network
4_Key Concepts Structure and Governance plus UN.pdf okay
Introducrion of creative nonfiction lesson 1
Workshop introduction and objectives. SK.pptx
cpgram enivaran cpgram enivaran cpgram enivaran
DFARS Part 253 - Forms - Defense Contracting Regulations
Item # 8 - 218 Primrose Place variance req.
ESG Alignment in Action - The Abhay Bhutada Foundation
Item # 10 -- Set Proposed 2025 Tax Rate

Cybersecurity: More than A DoD Issue

  • 2. Robert E. Jones Government Contracts & Accounting Expert CPA, CPCM, NCMA Fellow Meet your presenter: • Robert has over 15 years of Department of Defense contract and accounting experience. • He has successfully managed over $400 million in federal contracts.
  • 3. About us Left Brain Professionals is a boutique accounting firm that serves government contractors. We specialize in accounting system design, implementation, and audit support.
  • 6. Why we’re here To learn the basics of cybersecurity compliance for your business.
  • 7. Learning Objectives • Identify the cybersecurity requirements in your contracts • Define the basic cybersecurity requirements • List simple steps you can take towards compliance • Get certified!
  • 8. Identify Requirements in Your Contracts FAR 52.204-21 • Basic Safeguarding of Covered Contractor Information Systems DFARS 252.204-7012 • Safeguarding Covered Defense Information and Cyber Incident Reporting Focus on Systems vs Data
  • 9. Identify Requirements • Other agency • Commercial requirements
  • 10. Room Poll What cybersecurity requirements exist in your contracts? • FAR 52.204-21 • DFARS 252.204-7012 • Another agency • Other/commercial • I don’t know
  • 11. Define Basic Cybersecurity Reqs • NIST (SP) 800-171 • COBIT 5 • SANS 20 • ISO/IEC 27001
  • 12. NIST (SP) 800-171 • Access Control • Awareness and Training • Audit and Accountability • Configuration Management • Identification and Authentication • Incident Response • Maintenance • Media Protection • Personnel Security • Physical Protection • Risk Assessment • Security Assessment • System and Communications Protection • System and Information Integrity
  • 13. Other Frameworks • COBIT 5 • SANS 20 • ISO/IEC 27001
  • 14. Room Poll How many requirements are listed in NIST (SP) 800-171? • 14 • 110 • 171 • 222
  • 15. Simple Steps Towards Compliance • Train all employees • Use multifactor authentication • Inventory all devices and software • Allow only certain devices to connect • Remote wipe devices • Utilize cloud storage
  • 16. Train All Employees • Provide annual cybersecurity awareness training to all employees • Provide periodic threat updates • Utilize phishing test services • Provide advanced training to IT and other key individuals
  • 17. Use Multifactor Authentication • Enable multifactor authentication on all PCs and servers • Enable multifactor authentication on all email, VPN, and networks • Enable multifactor authentication on as many software and accounts as possible
  • 18. Inventory All Devices and Software • Take an inventory of all devices (PCs, servers, phones, tablets, printers, scanners) • Take an inventory of all software (including version and licenses) • Take an inventory of all users and access
  • 19. Allow Only Certain Devices to Connect • Block access to all emails, networks, and servers by default • Allow access by exception
  • 20. Remote Wipe Devices Setup remote access with wipe capability on all devices (laptops, phones, tablets)
  • 21. Utilize Cloud Storage Take advantage of the security built into cloud applications and storage • FedRAMP for CUI on government contracts  Not required for commercial contracts
  • 22. Room Poll Which of the following is not a step towards compliance? • Training a select few employees • Taking an inventory of devices • Setting up remote wipe of devices • Utilizing cloud storage
  • 23. Get Certified • New CMMC from DoD • Cybersecurity Maturity Model Certification • 5 levels • Will be required by mid-2020
  • 24. CMMC 18 domains that mimic 14 categories in NIST (SP) 800- 171
  • 25. CMMC 5 levels of certification
  • 26. Room Poll Cybersecurity certification will soon be required for all defense contractors? • True • False
  • 28. Connect with us Download the presentation Left Brain Professionals Inc. @LeftBrainPro @LeftBrainPro Email: support@leftbrainpro.com
  • 29. Melissa R. Metzger MAFM melissa@leftbrainpro.com Robert E. Jones CPA, CPCM, NCMA Fellow robert@leftbrainpro.com