Govology -- Evolving DoD Contractor Cybersecurity Requirements (Q1-2026 Update)
READ BEFORE REGISTRATION
This workshop requires you first to register with the UH APEX Accelerator by selecting the "Register Online" link below. After you have completed the UH APEX Accelerator registration, YOU MUST select the "Continue" link and you will be taken to the Govology website. On the Govology website select the "Buy now" link to complete the registration process. If you are an existing UH APEX Accelerator client, enter your coupon code during the Govology registration and the training is free for you to attend.
YOUR REGISTRATION TO ATTEND THE WEBINAR IS NOT COMPLETE UNTIL BOTH THE UH APEX Accelerator AND GOVOLOGY REGISTRATIONS ARE COMPLETED.
If you are a current client of the UH APEX Accelerator, when you register for the webinar please use the email address we currently have on file. If you do not know the email you have on file with us, please email uhapex@uh.edu and we will confirm your email address.
If you have a new email address, please let us know and we will update your record with us.
Please do not register for the webinar using your new email address until you have informed us of the new email address and we have updated your record.
Thank you!
The United States’ adversaries are actively working to steal the nation’s military and industrial competitive advantage. Today’s ubiquitous, highly interconnected information systems make that theft easier than ever. The U.S. federal government recognizes the risk to sensitive information housed in contractors’ systems—such as Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). As a result, all federal contractors must implement basic cybersecurity requirements in the internal IT systems that process federal contract-related data.
In addition, contractors that handle information related to Department of Defense contracts must comply with DFARS clauses 252.204-7012 / 7019 / 7020 / 7021, which require more advanced cybersecurity safeguards. These safeguards can be challenging for organizations of any size to implement.
In this course, Adam Austin, Co-Founder, Cybersecurity Lead, and CTO of Totem Technologies, will explain these requirements in layperson’s terms, outline common implementation challenges, and share resources to help you navigate the cybersecurity landscape.
Target Audience: APEX Accelerator counselors, MEP counselors, DoD contract officers and program managers, DoD contractors and IT staff, IT managed service providers, IT managed security service providers
Speaker(s): Adam Austin Co-Founder and Cybersecurity Lead, Totem.Tech
Co-Sponsor(s):
Fee: No Cost