Length: 2 Days
Print Friendly, PDF & Email

Cybersecurity in the Defense Acquisition System Training by Tonex

6G Cybersecurity Training Bootcamp | 3GPP Version

Cybersecurity is a critical aspect of the defense acquisition system. This comprehensive training course by Tonex equips professionals with the knowledge and skills necessary to navigate the complex intersection of cybersecurity and defense procurement. Participants will gain an in-depth understanding of the evolving threats and regulations that impact defense acquisition, ensuring that the products and systems procured by the Department of Defense (DoD) remain secure in the face of ever-evolving cyber threats.

Learning Objectives: By the end of this course, participants will be able to:

  • Understand the foundational principles of cybersecurity in the defense acquisition system.
  • Identify and assess cybersecurity risks and vulnerabilities in defense acquisition programs.
  • Comprehend the regulatory framework and compliance requirements specific to the defense industry.
  • Develop and implement effective cybersecurity strategies within the context of defense acquisitions.
  • Evaluate the impact of cybersecurity on the DoD’s procurement processes and supply chain.
  • Demonstrate the ability to communicate and collaborate effectively on cybersecurity issues within the defense acquisition ecosystem.

Audience: This course is designed for professionals and stakeholders within the defense acquisition system, including but not limited to:

  • Defense procurement officers and project managers
  • Information security and cybersecurity professionals
  • Compliance officers and auditors
  • Government and industry personnel involved in defense acquisitions
  • Engineers and technical staff working on defense projects
  • Anyone seeking a comprehensive understanding of cybersecurity in defense procurement.

Course Outline:

Introduction to Cybersecurity in Defense Acquisition

  • The role of cybersecurity in the defense acquisition system
  • Key cybersecurity challenges in defense procurement
  • The importance of proactive cyber risk management

Cybersecurity Frameworks and Regulations

  • Overview of cybersecurity standards and regulations in the defense industry
  • NIST SP 800-171 compliance and its impact on defense contractors
  • The Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity requirements

Identifying and Assessing Cyber Risks

  • Methods for identifying cyber threats and vulnerabilities
  • Cyber risk assessment and mitigation strategies
  • The role of risk management in defense acquisition

Cybersecurity Strategies for Defense Acquisitions

  • Developing a cybersecurity strategy for defense projects
  • Integrating cybersecurity into the systems engineering process
  • Supply chain cybersecurity considerations

Compliance and Auditing

  • Preparing for cybersecurity audits in defense acquisitions
  • Assessing compliance with NIST and DFARS requirements
  • Handling non-compliance and remediation

Communication and Collaboration in Defense Acquisition Cybersecurity

  • Effective communication within the defense acquisition ecosystem
  • Collaboration between government and industry stakeholders
  • Building a culture of cybersecurity awareness and responsibility

This comprehensive course equips professionals with the knowledge and skills necessary to navigate the complex landscape of cybersecurity in the defense acquisition system, ensuring that critical defense assets remain protected in the digital age.

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.