FIND BY MONTH
FIND BY LOCATION
IN-HOUSE TRAINING
Bring any seminar or course directly to your staff through the Federal Publications’ In-House Presentations Program.
Get 10% Off Your Next Purchase
SIGN UP FOR OUR EMAILS
Email Address * Name
Title Organization
Privacy Policy

THANK YOU FOR SIGNING UP

You'll soon be receiving updates about special offers, events, books & more.
Continue to browse our site to:
 
Public
In-House
This program explores the cybersecurity and IT contracting regulations, trends and practical concerns for agencies and contractors.

Topics covered:

The Statutory and Regulatory Framework of Cybersecurity Law and Contracting
Information Security Laws and Standards; Data Breaches; Personal Data and ID Threats; Economic Espionage and Trade Secrets; Intellectual Property; Targeting U.S. Technologies.

Cyber in the Public Sector
The Federal Data Treasure Trove; The Federal Information Security Management Act (FISMA); NIST Standards; OMB Guidance; FAR/DFARS; DoD Cyber Rules/GSA Regulations and Policy.

Federal Privacy Laws and Cybersecurity
The Privacy Act; The FAR Regulations; Fair Information Practices; HIPAA (Health Insurance Portability and Accountability Act); State Security Breach Laws; Data Breach Litigation.

Cloud Computing, Security and Acquisitions
Defining the Cloud; Cloud Basics; Securing the Cloud; The FedRAMP Program; Cloud Acquisition; Cyber Risks.
Dates and Locations

This course will be scheduled soon. Please enter your information below to receive a notification when the class is scheduled.

Email Address *
First Name
Last Name
Organization/Affiliation
Address 1
Address 2
City
State
Zip Code
*Required
DAILY SCHEDULE
8:00 AM - 3:00 PM
La Jolla Cybersecurity Institute
Federal Information Security Laws and Standards
  • Data Breaches/Consequences
  • Critical Infrastructure Threats 
  • Scope of Digital Threats
  • Personal Data and ID Threats
  • Economic Espionage and Trade Secrets
  • Intellectual Property
  • Targeting U.S. Technologies
  • Impact on Business and Industry

Cyber in the Public Sector
  • Federal Data Treasure Trove
  • Hackers and Their Targets
  • Interdependence of Public and Private Sectors
  • Federal IT Spending
  • Federal Security Spending
  • Global Cyber Markets
  • Information Sharing
  • Privacy and Cybersecurity 
  • Information Security Laws and Guidance
  • Federal Information Security Management Act (FISMA)
  • NIST Standards
  • OMB Guidance
  • FAR/DFARS
  • DoD Cyber Rules/GSA Regulations and Policy

Federal Privacy Laws and Cybersecurity 
  • Federal, State, and International Privacy Laws
  • Financial Institutions; Health Care Industry; Education; Telecommunications
  • The Privacy Act/The FAR Regulations
  • Privacy Breaches
  • Fair Information Practices
  • HIPAA (Health Insurance Portability & Accountability Act)
  • State Security Breach Laws
  • State Security Enforcement
  • Data Breach Litigation
  • Commercial Litigation

Cloud Computing, Security and Acquisitions
  • Defining the Cloud
  • NIST and GAO Definitions
  • Securing the Cloud
  • Key Security Issues
  • The FedRAMP Program
  • Cloud Acquisition
  • Cyber Risks
  • False Claims Act Actions
  • Suspensions
  • Protests
  • Shareholders
  • Investigations
  • Cyber Executive Orders
  • International Law
  • Summary and Resources
9:00 AM - 4:00 PM
McLean, VA
Federal Information Security Laws and Standards
  • Data Breaches/Consequences
  • Critical Infrastructure Threats 
  • Scope of Digital Threats
  • Personal Data and ID Threats
  • Economic Espionage and Trade Secrets
  • Intellectual Property
  • Targeting U.S. Technologies
  • Impact on Business and Industry

Cyber in the Public Sector
  • Federal Data Treasure Trove
  • Hackers and Their Targets
  • Interdependence of Public and Private Sectors
  • Federal IT Spending
  • Federal Security Spending
  • Global Cyber Markets
  • Information Sharing
  • Privacy and Cybersecurity 
  • Information Security Laws and Guidance
  • Federal Information Security Management Act (FISMA)
  • NIST Standards
  • OMB Guidance
  • FAR/DFARS
  • DoD Cyber Rules/GSA Regulations and Policy

Federal Privacy Laws and Cybersecurity 
  • Federal, State, and International Privacy Laws
  • Financial Institutions; Health Care Industry; Education; Telecommunications
  • The Privacy Act/The FAR Regulations
  • Privacy Breaches
  • Fair Information Practices
  • HIPAA (Health Insurance Portability & Accountability Act)
  • State Security Breach Laws
  • State Security Enforcement
  • Data Breach Litigation
  • Commercial Litigation

Cloud Computing, Security and Acquisitions
  • Defining the Cloud
  • NIST and GAO Definitions
  • Securing the Cloud
  • Key Security Issues
  • The FedRAMP Program
  • Cloud Acquisition
  • Cyber Risks
  • False Claims Act Actions
  • Suspensions
  • Protests
  • Shareholders
  • Investigations
  • Cyber Executive Orders
  • International Law
  • Summary and Resources
Jeffery M. Chiow, Rogers Joseph O'Donnell

Jeffery M. Chiow is a Shareholder at the law firm of Rogers Joseph O'Donnell PC.  Mr. Chiow represents clients in litigation and government investigations that usually have some nexus to a government contract. He also provides counsel on business and compliance issues faced by government contractors. He is named an Up-and-Coming government contracts attorney nationally by Chambers USA® and a “Rising Star” among government contracts attorneys in Washington, DC by SuperLawyer®. Particular interests include aerospace and defense (he was a U.S. Marine Corps weapons and sensors officer in the F/A-18D Hornet before becoming a lawyer), bid protests, cybersecurity, technology services contracting, schedule contracting and contingency contracting.

MEET YOUR CONTINUING EDUCATION CREDIT REQUIREMENTS
SEE INDIVIDUAL COURSES FOR AVAILABLE CREDITS
Certificates of Completion are provided to all seminar participants who attend Federal Publications Seminars courses following the event, upon request.
NCMA: CONTRACT MANAGER CERTIFICATION
All Federal Publications Seminars courses meet the course requirements of the National Contract Management Association’s certification programs. We are a proud Education Partner of the NCMA.
CPE: CONTINUING PROFESSIONAL EDUCATION
Federal Publications Seminars is part of West Professional Development, which is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have the final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.
CPE HOURS
This Program is eligible for: 6.5 (CPE) hours of credit
Program Level: n/a
Program Prerequisite: n/a
Advance Preparation: n/a
Method: n/a
CLP: CONTINUOUS LEARNING POINTS
APPROVED FOR CLP BY
DEFENSE ACQUISITION UNIVERSITY
Defense Acquisition Workforce members must acquire 80 Continuous Learning Points (CLP) every two years from the date of entry into the acquisition workforce for as long as the member remains in an acquisition position per DoD Instruction 5000.66. We will provide you with documentation of points awarded for completing the event.
CLP HOURS
This Program is eligible for: 6.0 (CLP) hours of credit
CLE: CONTINUING LEGAL EDUCATION
States have widely varying regulations regarding MCLE credit. LegalEdcenter is an approved provider in AL, AK, AR, CA, GA, IL, ME, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, PA, RI, SC, TN, TX, UT, VA, VI, VT, WA, WI, and WV. Credit may be applied for in other jurisdictions on request and in accordance with state MCLE rules.
** Please note that because some states are changing their policy on CLE reporting, you will need to fill out the request for credit from Federal Publications Seminars within 10 business days, or we may not be able to issue credits for the program.
CLE HOURS
This Program is eligible for: 5.5 (60 minutes),
100
Basic or fundamental subject matter is covered. Courses are geared to general knowledge or can be taken as a refresher.
200
Specific topics or issues within a topic area are covered. Students should be familiar with terms of art and general concepts concerning the course topic.
300
Workshops and class discussions cover specific subject matter in-depth, and participation is strongly encouraged. Attendees should have at least 2-3 years' experience in the area of study.
400
Courses build upon students' knowledge and experience, and cover complex issues within the subject matter. Should have 4-5 years' mastery of subject for in-depth analysis.
500
Masters-level programs designed for professionals with 5+ years' experience. Courses cover in-depth and technical analysis on specific subjects and updates on current issues.
Register Now for:
The Statutory and Regulatory Framework of Cybersecurity Law and Contracting
close window
By Phone
Call (888) 494-3696