Cybersecurity Risk Management Webinars
The Commonwealth of Virginia and GENEDGE webinar series for 2017 has ended, but feel free to review recorded audio recordings or view PDFs of each presentation. In the recorded webinar series below, you will discover ways to improve your Cybersecurity posture and use a risk management approach to mitigate your total losses due to cyber attacks.
Recorded topics include:
- What Your Management Needs to Know,
- Where to Get Help with Cybersecurity,
- Elements of a Cybersecurity / Information Security Plan,
- DFARS compliance and more!
For more information contact: Roy Luebke (276) 732-8372 • rluebke@genedge.org
Webinar: DoD Suppliers – Keeping Up With Changing CUI Cybersecurity Requirements
June 23, 2020
Cyber (In)Security: What Business Leaders Need to Know
Session One – July 12, 2017
Download slide deck in PDF (opens new window)
Cyber (In)Security: Where to Get Help
Session Two – July 26, 2017
Download slide deck in PDF (opens new window)
Cyber (In)Security: Tips on What to Do Now & Cybersecurity Fundamentals
Session Three – August 9, 2017
Download slide deck in PDF: Part 1 (opens new window) | Part 2 (opens new window)
Cyber (In)Security: A Risk Management Approach to Improve Security Posture and Prioritize Mitigation Efforts
Session Four – August 23, 2017
Download slide deck in PDF: Part 1 (opens new window) | Part 2 (opens new window)
Cyber (In)Security: Securing the Internet of Things and Industrial Control Systems & Cyber Apprenticeship
Session Five – September 13, 2017
Download slide deck in PDF: Part 1 (opens new window) | Part 2 (opens new window)
Cyber (In)Security: Elements of a Cybersecurity Information Security Plan: How and Why You Need One
Session Six – September 27, 2017
Download slide deck in PDF (opens new window)
GENEDGE Cybersecurity Framework Flyer

For more information contact: Roy Luebke (276) 732-8372 • rluebke@genedge.org
Links to Online Resources
Department of Defense Cybersecurity Certification Requirements for Suppliers

Cyber Insurance
- International Risk Management Institute
General Cyber Resources
- Centers of Excellence
- FCC Cyber Planner (opens new window)
- NIST Computer Security Resource Center (opens new window)
- Federal Trade Commission Business Center (opens new window)
Dark Reading
DOD FAR and DFARS
- Department of Defense (DOD) Office of Small Business Programs (opens new window)
- NIST MEP Self-Assessment for NIST SP800-171 Requirements to meet DFARS Cybersecurity compliance (opens new window)
- Controlled Unclassified Information CUI Definitions (opens new window)
- NIST latest primer (opens new window)
- Via Colorado MEP:
- FAR 52.204-21 (15 Basic Security Controls) (opens new window)
- DFARS 225.204-7012 (110 Security Controls) includes the NIST SP 800-171 specs
Department of Homeland Security
- Department of Homeland Security (DHS (opens new window))
- For critical infrastructure every day to provide energy, water, transportation, financial systems:
- https://www.dhs.gov/science-and-technology/cyber-security-divisionhttps://www.dhs.gov/science-and-technology/cyber-security-division (opens new window)
DISA – Defense Information Systems Agency
- Joint Information Environment (opens new window)
- Cyber Security/Information Assurance Program (opens new window)
When accessing this link select “Advanced” and then accept the site. - External Certificate Authority Program (opens new window)
(for third parties to to securely communicate with the DOD and authenticate to DOD Information Systems)
Industrial Controls Cyber Security
- The National Cybersecurity and Integration Center (NCCIC), a division of the Department of Homeland Security’s Office of Cybersecurity and Communications (DHS CS&C) (opens new window)
- Strategy for Securing Control Systems (PDF) (opens new window)
- SCADAhacker.com – Library of Resources (opens new window)
Kaspersky Lab
MACH37
www.mach37.com (opens new window)
NIST

- NIST Cybersecurity Framework Manufacturing Profile (PDF) (opens new window)
- U.S. Department of Commerce – National Institute of Technology (opens new window)
- NIST Cyber Framework (opens new window)
- NIST National Cybersecurity Center of Excellence (opens new window)
- NIST/DHS Vulnerabilty Database (opens new window)
- NIST SPECs: NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations (PDF) (opens new window)
- NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (opens new window)
Ponemon Institute
- 2016 Cost of Data Breach Study: Global Analysis (June 2016)
Benchmark research sponsored by IBM and independently conducted by Ponemon Institute LLC.
SANS Institute
The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face.
- Ponemon IBM Security report 2016 (opens new window)
- SANS Institute Website (opens new window)
- Training and Certifications Resources (opens new window)