Preview

IS4799

Satisfactory Essays
Open Document
Open Document
675 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4799
IS4799 Information Systems and
Cybersecurity Capstone Project
Unit 2
RFP Bidder’s Conference

© ITT Educational Services, Inc. All rights reserved.

Learning Objective and Key
Concepts
Learning Objective
 Explain the procedures of a vendor bidder’s conference Key Concepts
 Bidder’s conference purpose
 Using the opportunity to request more information
 Evaluating applicability
 Evaluating the competition

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 2

EXPLORE: CONCEPTS

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 3

Bidder’s Conference
 What it is
• Meeting of prospective Request for Proposal

(RFP) respondents
• Hosted by the RFP creator—the client

 Purpose
• Elaborate on the RFP
• Answer questions

 Importance
• Significant amount of supplemental information

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 4

Key Concepts
 Clarification
• Additional information to clarify RFP contents

 Lateral information
• Information gathered from other bidders

Procurement
• Process of acquiring (purchasing)

 Contracts
• Legal agreements between provider and client

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 5

Additional Information
 Client preferences
• How client conducts business
 Data expectations
• Format and delivery mechanism
 Process expectations
• “How things should work”

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 6

RFP Procedures
 Contact procedures
• Methods to interact with client
• During and after the bidder’s conference
 Information opportunities
• Client presentations
• Supplemental information
• Formal and informal questions
• Questions from other

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Math533

    • 558 Words
    • 3 Pages

    The above pie chart and frequency distribution, illustrate that the largest number of customers are those in the rural category (42%), followed by those in the suburban category (30%). There are only 28% of the customers that fall into the urban category.…

    • 558 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Acc421

    • 899 Words
    • 4 Pages

    Kudler Fine Foods was founded in 1998 by Kathy Kudler in San Diego, CA. Since the beginning of operation of one store, the business has grown to a total of three stores. By concentrating on the market research this will help with expansion of more locations.…

    • 899 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cis499

    • 402 Words
    • 2 Pages

    Question #1: DNA is made up of two separate strands of base sequences. The same sequence is found on both strands, but running in opposite directions. What word describes this characteristic? Palindrome…

    • 402 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3120 Ass 1

    • 330 Words
    • 2 Pages

    The Johnson Company will be able to reach out to its customers by basically creating a good “Web Page” where customers will be able to find all of their products and also pay online and order online. In addition orders will not be taken by hand anymore but online orders will be the main method used to order networking products.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CCSI460BeckyDavislab5

    • 961 Words
    • 3 Pages

    Summary of Findings: On April 9, 2015, the following investigation to place at the forensic lab located in Madison Wisconsin, where I was given a Bid rigging and Cyber-Stalking case to investigate pertaining to two companies (Denver Construction Inc.) that is operated in Colorado and (Dells Construction) that operates in Wisconsin. I was also given instruction to research a real-world bid rigging current event. After analyzing the information that was presented to me about both companies, I first attempted to analyze the case of bid rigging which is a scheme in which businesses collude so that a competing business can secure a contract for goods or services at a pre-determined price. Bid rigging stifles free-market competition, as the rigged price will be unfairly high. The Sherman Act of 1890 makes bid rigging illegal under U.S. antitrust law. Bid rigging is a felony punishable by fines, imprisonment or both.…

    • 961 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Iscom 473

    • 507 Words
    • 3 Pages

    The Hula Hoop, Disneyland, The Mickey Mouse Club, Interstate Highways, Dishwashers, Hi-fis and Stereos, Poodle Skirts, McDonald’s, Drive-in Theaters, Levittown, Dr. Spock, Ozzie and Harriett, Leave it to Beaver, I Love Lucy, Father Knows Best, The Honeymooners, Amos ‘n Andy, My Little Margie, Echo Park, Persistent Poverty, Black Urban Migration, Urban Renewal, Massive Resistance, Beats; American Bandstand; Elvis Presley; James Dean…

    • 507 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    PHI445

    • 1275 Words
    • 6 Pages

    The public Broadcasting Service is a non-profit public television network with a collective of member stations across the county. PBS’s goal is to broadcast educational media which helps prepare children for success in school and opens up a world to them in an age appropriate way.…

    • 1275 Words
    • 6 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    AI in cyber Defense

    • 2430 Words
    • 9 Pages

    Cyber security is a multidisciplinary field that is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. Modern systems have become much complex. Need for an intelligent, adaptive and multimodal solution raises here for which best suited approach is artificial…

    • 2430 Words
    • 9 Pages
    Powerful Essays