Preview

Request for Proposals

Powerful Essays
Open Document
Open Document
26335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Request for Proposals
RFP-427.04-107-08

STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION

REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08

CONTENTS
SECTION 1 2 3 4 5 INTRODUCTION RFP SCHEDULE OF EVENTS PROPOSAL REQUIREMENTS GENERAL REQUIREMENTS & CONTRACTING INFORMATION PROPOSAL EVALUATION & CONTRACT AWARD

RFP ATTACHMENTS: 6.1 Pro Forma Contract Contract Attachment A: Attestation Re Personnel Used in Contract Performance Contract Attachment B: Memorandum of Understanding (MOU) Contract Attachment C: HIPPA Business Associate Agreement 6.2 6.3 Proposal Transmittal/Statement Of Certifications & Assurances Technical Proposal & Evaluation Guide Section A – Mandatory Requirements Section B – Qualifications & Experience

RFP-427.04-107-08

Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates

2

RFP-427.04-107-08

1 1.1

INTRODUCTION Statement of Purpose The State Government, Department of Finance and Administration, hereinafter referred to as the State, has issued this Request for Proposal (RFP) to define the State's minimum service requirements; solicit proposals; detail proposal requirements; and, outline the State’s process for evaluating proposals and selecting the contractor. Through this RFP, the State seeks to buy the best services at the most favorable, competitive prices and to give ALL qualified businesses, including those that are owned by minorities, women, persons with a disability, and small business enterprises, opportunity to do business with the state as contractors and sub-contractors. The State intends to secure a contract for Information Security Assessment Services

You May Also Find These Documents Helpful

  • Powerful Essays

    No information included in this document or in discussions connected to it may be disclosed to any third party. The parties enter into this Stipulation and Protective Order under Federal Rule of Civil Procedure 26 to establish procedures for the handling of documents produced by the parties in response to requests from the parties.…

    • 1200 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The applicant’s contracts were developed using the Office of Grant Services (OGS) six component framework.…

    • 870 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    8 CONSULTANT’S PROPOSED DESIGN & CONSTRUCTION SCHEDULE ........................... 8 CONSULTANT DESIGN SCHEDULE ........................................................................................ 9 BID DOCUMENT CONSTRUCTION SCHEDULE…

    • 13739 Words
    • 88 Pages
    Powerful Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Submit a formal written proposal in response to the opportunity that you have selected.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Security and Gap Analysis

    • 632 Words
    • 7 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 3 IT Security Policy Framework Gap Analysis © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 632 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    This essay will examine how to best prepare a contract administration plan. The contract administration plan will examine different methods used in preparing a plan. This essay will explain how important it is to have technical and other support of personnel, the importance of surveillance, and to determine what functions need to be delegated, identify qualified personnel as well as authorized, it is necessary for the Contracting officer to be represented in administering contract requirements. Also there will be a discussion on what is determined from the contract administration functions and how they will be delegated.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The Children 's Internet Protection Act (CIPA) was brought before legislation in December of 2000 and signed off by President Clinton. The law was brought about to protect children from certain internet usage that could be accessed at public and school libraries. Although there were officials that tried to overturn this bill, stating that the bill limited ones First Amendment Rights the law is still in place and helps in the protection of children as they search the internet in federally funded libraries.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • *Villarroel, R, Fernandez-Medina, E. and Piattini, M., “Secure information systems development ' ' a survey and comparison”, Computers and Security, 24, 4, 2005, 308-321.…

    • 2113 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Managing People

    • 2716 Words
    • 16 Pages

    Section I General Specifications 1.1 Introduction and Background…………………………………… 2 1.2 Additional Information…………………………………………… 2 1.3 Response Deadline……………………………………………….. 2 1.4 Independence…………………………………………………….. 2 1.5 Response to RFP………………………………………………….. 2 1.6 Selection Criteria…………………………………………………. 3 1.7 Cost of Services……………………………………………………. 3 1.8 Fixed Price Period………………………………………………….. 3 1.9 Expenses………………………………………………………….. 3 1.10 Insurance…………………………………………………………. 3 1.11 Confidentiality……………………………………………………… 4 1.12 Records Retention………………………………………………… 4 1.13 Executed Contract to Include RFP……………………………….. 4 1.14 Subcontractors……………………………………………………. 4 Section II Technical Specifications Audit of Property & Liability Risk Management & Insurance Program 2.1 Scope of Work and Objectives……………………………………… 5 2.2 Specific Tasks……

    • 2716 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Overview of the Data Mining

    • 8497 Words
    • 34 Pages

    Jeffrey W. Seifert Analyst in Information Science and Technology Policy Resources, Science, and Industry Division…

    • 8497 Words
    • 34 Pages
    Good Essays