Presentations
Introduction
Module 1
Module 2
Module 3
Conclusion
Introduction to Effectively Integrating IT Security into the Acquisition Process
Part 1 of 5
SLIDE 1
Hello, my name is Leslie and I will be guiding
you through this course which is designed to
familiarize those involved in the acquisition
process with the Information Technology
security considerations that must be
addressed during the procurement process.
The need to provide protection for federal
information technology or (IT) has been
present since computers were first used.
Congress has passed several laws relevant
to IT security. The Department of Commerce
must comply with these laws and regulations.
To meet these legal requirements, The
Department of Commerce is training its
acquisition workforce to consider IT security
in all phases of the IT system life cycle,
which includes the procurement process.
The Department of Commerce along with the
entire federal government has seen incredible
advances in IT; but they have come at a price.
Sophisticated technologies aimed at making us
more productive have also made us more vulnerable
to increased threats. Our Department’s mission
to promote job creation and improved living
standards for all Americans is at risk if we
don’t consider protecting our information assets,
especially during the procurement process.
Security is a necessity during the acquisition of
IT. Including security early in the acquisition
process will usually result in less expensive and
more effective security than adding it after contract
award.
This course will provide you with resources to
learn more about IT security; it will also encourage
you to be proactive and to seek help from the
Department’s IT security professionals when you
need it.
As an acquisition initiator, program manager,
contracting officer representative, contracting
officer, or procurement professional, I hope that
you will find the information presented over the
next 40 minutes to be valuable and informative.
Module Index:
Slide 1
Evaluation
Print Course Materials
Useful Links
Email for your notes:
Type your notes here.
Click Send only after
the module has concluded.
Copyright © 1999—2004. All Rights Reserved.