This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
What’s next for GSA’s IT and ProfessionalServices Categories, including the Schedules and GWACs? What’s next for GSA’s General Supplies and Services, including e-commerce platforms? Prioritize as a key contract consideration the handling of data, including procedures for data management, accountability, and access.
What’s next for GSA’s IT and ProfessionalServices Categories, including the Schedules and GWACs? What’s next for GSA’s General Supplies and Services, including e-commerce platforms? What’s next for artificial intelligence (AI), cybersecurity, and cloud? What’s next for GSA’s Multiple Award Schedule (MAS) Program?
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; SupplyChain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update. James Peake , M.D.,
The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 The new draft guidance also shifts the focus away from “detecting, analyzing, prioritizing, and handling incidents” to incorporating incident response into overall cybersecurity riskmanagement activities.
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
PRISM offers the Office of the Undersecretary of Defense for Personnel and Readiness (OUSD P&R) and its strategic partners with innovative and cost-effective enterprise platforms and professionalservices “through the use of Streamline Task Order Ordering Procedures (STOOP).”
Part of that effort means improving the management of software purchasing. OFPP is revamping its goal of creating enterprisewide software licenses or developing requirements for professionalservices contracts right the first time or reducing risks in sole source or other similar types of contracts. “It
Ascend will include recently updated standards on supplychainriskmanagement (SCRM) and cyber SCRM (C-SCRM). It will provide access only to FedRAMP– or Department of Defense Cloud Authorization Services (DCAS)– authorized cloud solutions.
The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber SupplyChainRiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. To register, click here.
Contracting officers should consider cybersecurity, supplychainriskmanagement, data governance and other standards and guidelines just as they would with other IT procurements. And these tools may be available through professionalservice and system integrator contracts the agencies already have in place.
In its place, the realignment focuses and centralizes MAS contracting management structure for the Office of Information Technology Category, the Office of ProfessionalServices & Human Capital Categories, and the Office of General Supplies and Services Categories. We look forward to seeing you all there!
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber SupplyChainRiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors.
Aimed primarily at imports from key trading partners, these tariffs are set to significantly affect a wide array of goods, directly highlighting the impact of US tariffs on UK supplychains. For procurement professionals, this development presents new challenges in cost management, supplier relationships, and regulatory compliance.
Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber SupplyChainRiskManagement (C-SCRM) Assurance Questionnaire for information and communications technology vendors. Per the memo, in FY22, Federal agencies awarded SDBs a record-breaking $69.9
Office of Management and Budget (“OMB”) Releases Implementation Guidance Following President Biden’s AI Executive Order On November 1, 2023, OMB released draft guidance on Advancing Governance, Innovation, and RiskManagement for Agency Use of Artificial Intelligence.
As CISA has noted , [an SBOM] has emerged as a key building block in software security and software supplychainriskmanagement. SBOMs are defined by CISA as a formal record containing the details and supplychain relationships of various components used in building software.
In addition, for certain systems, contractors will be required to develop a System Security Plan, implement and maintain extensive security controls, conduct annual security assessments and cyber threat hunting and vulnerability assessments, and comply with continuous monitoring and supplychainriskmanagement requirements.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content