Capstone: Security and Project Management Approach

Topics: Computer security, Security, Project management Pages: 9 (1810 words) Published: August 26, 2013
ITT Technical Institute
IS4799 Information systems and Cyber-security
Capstone Project
August 26, 2013
Proprietary and confidential

REQUEST FOR PROPOSAL
-------------------------------------------------

-------------------------------------------------

Table of Contents

TEMPLATE CONTENTS3
INTRODUCTION AND BACKGROUND3
PURPOSE OF THE REQUEST FOR PROPOSAL3
ADMINISTRATIVE3
TECHNICAL CONTACT3
CONTRACTUAL CONTACT3
DUE DATES3
SCHEDULE OF EVENTS3
GUIDELINES FOR PROPOSAL PREPARATION3
PROPOSAL SUBMISSION3
DETAILED RESPONSE REQUIREMENTS3
EXECUTIVE SUMMARY3
SCOPE, APPROACH, AND METHODOLOGY3
DELIVERABLES3
PROJECT MANAGEMENT APPROACH3
DETAILED AND ITEMIZED PRICING3
APPENDIX: REFERENCES3
APPENDIX: PROJECT TEAM STAFFING3
APPENDIX: COMPANY OVERVIEW3
EVALUATION FACTORS FOR AWARD3
CRITERIA3
SCOPE OF WORK3
REQUIREMENTS3
DELIVERABLES3

INTRODUCTION AND BACKGROUND

PURPOSE OF THE REQUEST FOR PROPOSAL

The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars. The Firm is interested in conducting a security assessment that will allow it to:

* Gain a better understanding of potential corporate network vulnerabilities that may be visible from the Internet.

* Determine if the current wireless network is configured securely.

These activities are part of The Firm ongoing risk management program and are focused on identifying the risk level The Firm is currently exposed to so that an appropriate set of responses to those threats can be developed.

The Firm is seeking to identify and select an outside independent organization to perform the activities listed above. The remainder of this document provides additional information that will allow a service provider to understand the scope of the effort and develop a proposal in the format desired by The Firm.

ADMINISTRATIVE
TECHNICAL CONTACT

Any questions concerning technical specifications or Statement of Work (SOW) requirements must be directed to:

Name| |
Address| 25 Center Drive Costa Mesa CA 92626|
Phone| 1-714-555-5555|
FAX| 1-714-555-1555|
Email| |

CONTRACTUAL CONTACT

Any questions regarding contractual terms and conditions or proposal format must be directed to:

Name| |
Address| 25 Center Drive Costa Mesa CA 92626|
Phone| 1-714-555-5555|
FAX| 1-714-555-1555|
Email| |

DUE DATES
A written confirmation of the Vendor’s intent to respond to this RFP is required by 08/01/11. All proposals are due by 12:00am on 08/27/13. Any proposal received at the designated location after the required time and date specified for receipt shall be considered late and non-responsive. Any late proposals will not be evaluated for award

SCHEDULE OF EVENTS

Event| Date|
1. RFP Distribution to Vendors | 08/01/2013|
2. Written Confirmation of Vendors with Bid Intention| 08/01/2013| 3. Questions from Vendors about scope or approach due| 08/01/2013| 4. Responses to Vendors about scope or approach due| |

5. Proposal Due Date | 08/27/2013|
6. Target Date for Review of Proposals| 08/27/2013|
7. Final Vendor Selection Discussion(s)--Week of| 08/27/2013| 8. Anticipated decision and selection of Vendor(s)| 08/27/2013| 9. Anticipated commencement date of work| 08/27/2013|

GUIDELINES FOR PROPOSAL PREPARATION
PROPOSAL SUBMISSION
Award of the contract resulting from this RFP will be based upon the most responsive Vendor whose...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security Project Essay
  • Effective and Efficient Project Management Essay
  • Project Management Essay
  • project management Essay
  • project management Essay
  • Project Management Essay
  • project management Essay
  • An Approach to Information Security Management Essay

Become a StudyMode Member

Sign Up - It's Free