This whitepaper serves to educate government contractors on the need for reliable, accessible and traceable data that reconciles internal billing information with federal contracts. In this paper, relevant experience from Government Contractors who are utilizing Microsoft Dynamics financial and operations management solutions successfully to meet the FAR requirements is provided. Additionally, industry experts comment on the best practices in industry and provide additional background as to what DCAA is expecting and how to accomplish that through foundational best practices.
File Type: .pdf
Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.
Some government contracting vehicles survive the test of time, and that certainly is true of the National Institute of Health’s CIO-CS contract. The contracting vehicle that was intended as tactical support for NIH’s CIO-SP3 and CIO-SP3 Small Business. But times changed and demand grew. Then, CIO-CS received the Office of Management and Budget’s Best-in-Class designation -- and became mandatory for desktops and laptops. The result is increased support for agencies as they march forward on modernization.
Cloud security is a complex issue that requires a multi-faceted approach. Agencies must tackle technology, policy, and governance issues, as well as organizational culture, as they move to the cloud. And there are different motivators for embracing the cloud — they may want to maximize value, bring new systems and services online, and deliver new solutions faster.
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.