Tag: policy

COOP in DoD – Part #1 of 10 – Define the Landscape

Click here to download “Coop in DoD – Part 01 of 10” now! This paper, the first in a ten-part series, analyzes how a full Continuity of Operations (COOP) program can be implemented for a small, non-mission-critical Army program operating

Tagged with: , , ,

“IA Fusion”: Cut costs / improve quality / compete better

Click here to download “IA Fusion for a DoD Contractor” now! This is a 2011 paper presented to FITSI.org and addresses an ambitious topic for me to cover: “IA Fusion”. My approach explores how DoD and Federal Government contractors can

Tagged with: , , ,

Whitepaper 03-04: IA Programs and Cost Control

Click here to download “DoD IA Programs and Cost Control” now! An IA program provides the confidentiality, integrity, and availability required by DoD information systems.Human beings constitute the weakest link of any organization; the risk posed by even the most

Tagged with: , ,

Whitepaper 03-03: Three Risk Management Methodologies

Click here to download “Risk Management Methodologies” now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to

Tagged with: , ,

Whitepaper 03-02: IT Policies and Procedures for DoD

Click here to download “P2SP for DoD Contractors” now! Effective and relevant organizational policies, practices, standards and procedures (P2SP) provide the direction and guidance necessary for vendors to work successfully with the Department of Defense (DoD). Successful implementation of P2SP creates a

Tagged with: , ,

Whitepaper 03-01: Awareness and Ethics in the Operations Environment

Click here to download “Awareness and Ethics in the Operations Environment” now! Working in the Department of Defense (DoD) demands providing excellent results, utilizing strong security measures, delivered in a cost-effective way. The DoD has high standards for industry and the

Tagged with: , ,

Whitepaper 02-04: Critical Analysis of an Organization Network

Click here to download “Critical Analysis Organizational Network” now! Government is demanding that private industry improve delivery efficiency while simultaneously decreasing costs – all the while meeting ever-more-stringent information assurance requirements. To achieve these goals, organizations of all sizes must

Tagged with: , ,

Whitepaper 02-03: Network Perimeter Security

Download the whitepaper “Network Perimeter Security” here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps

Tagged with: , ,

Whitepaper 02-02: Network Identification, Authentication, and Authorization Use Case

Download the Network IAA Use Case whitepaper here! The typical Small / Medium size Business (SMB) must provide both intranet (internal) and extranet (external) access for its employees and customers based on roles, permissions, and clearance. This white paper looks

Tagged with: , ,
Top