My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 12 - Email Security and Cybersecurity Awareness Training
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
07/01/2025
>
Item 12 - Email Security and Cybersecurity Awareness Training
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
6/25/2025 5:21:16 PM
Creation date
6/25/2025 5:20:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
12
Date
7/1/2025
Destruction Year
P
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
85
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID:6E5E583C-AE8C-4945-A183-9F3A4F2397EC <br /> 88 Data, such as data modernization, data l: Yes We provide Sourcewell Members the strategy, <br /> backup, data and document processing and r No architecture, and migration paths required for everything <br /> storage, and assessment, validation, from complex database/data warehouse designs, data <br /> production, and management of Al and exploration and visualization, and data governance, to <br /> machine learning solutions; and advanced analytics and machine learning — whether <br /> starting with introductory concepts or building and <br /> deploying production models. <br /> CDWG works with Sourcewell Members to define <br /> and implement an effective data strategy, modernizing <br /> data platforms, and implementing DataOps best <br /> practices for scalability and agility. We help customers <br /> create new data pipelines that can be leveraged for <br /> organizational insights, analytics, and visualization. Our <br /> experts prove Artificial Intelligence/Machine Learning <br /> (AI/ML) business value through minimum viable model <br /> (MVM) creation and implement online-ML pipelines for <br /> production deployments. Our data architects and ML <br /> experts provide rapid, innovative outcomes across data <br /> operations; data warehouse modernization; data <br /> pipelines; visualization and insights; AI/ML; big data; <br /> and contact center Al. <br /> 89 Related solutions, such as endpoint security r Yes CDW's Security Practice has the depth and breadth to <br /> products, network security technologies, r No support Sourcewell Members on their entire <br /> identity and access management cybersecurity journey. <br /> technologies, security analytics, data security Security focus areas include: <br /> products, IP video monitoring systems, Program Strategy and Operations, which offers <br /> intelligent controllers, mission control systems, strategy workshops and program initiation; technology <br /> electronic locks, network infrastructure, and bakeoffs and proofs of concept; zero trust <br /> server room technology. assessments; and internal audit and IT audit services. <br /> Cyber Resilience and Compliance, which includes <br /> privacy compliance (GDPR, CCPA); privacy maturity <br /> assessments; framework maturity assessments; full- <br /> scope PCI DSS services; HIPAA security, privacy, and <br /> risk; third-party risk management; and Cybersecurity <br /> Maturity Model Certification (CMMC) assessments. <br /> Identity and Access Management (IAM), which <br /> includes rapid assessments and strategy; IAM <br /> implementation; user rights and access reviews; <br /> solution selection and bakeoff; SIEM deployment and <br /> configuration; managed IAM support; and white-glove <br /> managed identity. <br /> Cloud and Application Security, which includes <br /> secure access service edge; cloud native controls; <br /> cloud security posture management; cloud workload <br /> protection; cloud native application protection platforms; <br /> cloud identity and entitlement management; and cloud <br /> security architecture. <br /> Secure Infrastructure offerings, which include <br /> security architecture and design; physical security; next- <br /> generation firewall; endpoint protection; email and web <br /> security; intrusion detection and prevention; IoT device <br /> assessment and strategy; and managed firewall. <br /> Skills and Training, which includes cyber <br /> workforce development; offensive and defensive security <br /> courses; cloud security courses; programming and <br /> development security operations courses; data science <br /> and analytics; and solution training. <br /> Threat and Vulnerability offerings, which include <br /> penetration testing; blue/red team exercise; web app <br /> testing; threat/vulnerability platforms; endpoint detection <br /> and response; incident response; and managed <br /> scanning. <br /> Table 1613: Category 2 - Industry Specific Questions <br /> Table 1613: Industry Specific Questions relate to products and services offered in Category 2 (see Table 16A). <br /> Line Question Response <br /> Item <br /> Bid Number: RFP 121923 Vendor Name: CDW Government LLC <br />
The URL can be used to link to this page
Your browser does not support the video tag.