About: Continuous Diagnostic and Mitigation Program   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Department of Homeland Security (DHS) has established a Continuous Diagnostic and Mitigation Program (CDM). Under this program, DHS coordinated with the General Services Administration (GSA) to establish a government-wide Blanket Purchase Agreement (BPA) under Multiple Award Schedule 70, which Federal, State, local and tribal governments can leverage to deploy a basic set of capabilities to support continuous monitoring of security controls in Federal information systems and environments of operation.

AttributesValues
rdfs:label
  • Continuous Diagnostic and Mitigation Program
rdfs:comment
  • The Department of Homeland Security (DHS) has established a Continuous Diagnostic and Mitigation Program (CDM). Under this program, DHS coordinated with the General Services Administration (GSA) to establish a government-wide Blanket Purchase Agreement (BPA) under Multiple Award Schedule 70, which Federal, State, local and tribal governments can leverage to deploy a basic set of capabilities to support continuous monitoring of security controls in Federal information systems and environments of operation.
dcterms:subject
abstract
  • The Department of Homeland Security (DHS) has established a Continuous Diagnostic and Mitigation Program (CDM). Under this program, DHS coordinated with the General Services Administration (GSA) to establish a government-wide Blanket Purchase Agreement (BPA) under Multiple Award Schedule 70, which Federal, State, local and tribal governments can leverage to deploy a basic set of capabilities to support continuous monitoring of security controls in Federal information systems and environments of operation. The BPA, awarded on August 12, 2013, provides a consistent, government-wide set of information security continuous monitoring (ISCM) tools to enhance the Federal government's ability to identify and respond, in real-time or near real-time, to the risk of emerging cyber threats. It also capitalizes on strategic sourcing to minimize the costs associated with implementing requirements of the risk management framework.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software