{"id":666,"date":"2025-08-24T21:49:15","date_gmt":"2025-08-25T01:49:15","guid":{"rendered":"https:\/\/sw.edu\/apex\/?post_type=tribe_events&#038;p=666"},"modified":"2025-08-25T13:09:55","modified_gmt":"2025-08-25T17:09:55","slug":"competitive-advantage-through-cybersecurity-compliance","status":"publish","type":"tribe_events","link":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/","title":{"rendered":"Competitive Advantage through Cybersecurity Compliance"},"content":{"rendered":"<p>Federal, State, and Local municipalities increasingly include requirements to implement cybersecurity protection plans as basis for contractual award. To effectively compete for contract award, offerors must adhere to published cybersecurity standards. The quicker and more effectively a small business can implement the required standard, the better chances they have of being awarded a contract. Additionally, more and more basic business liability insurance policies mandate adherence to cybersecurity standards. Furthermore, lack of basic cyber &#8220;hygiene&#8221; can lead to complete mission inoperability and costly loss of customer or proprietary information, which can bankrupt a small business.<\/p>\n<p>&nbsp;<\/p>\n<p>Presenter: Mr. Adam Austin, Co-Founder and Cybersecurity Lead at Totem.Tech, a small veteran-owned prime USAF contractor, will provide an overview of the cybersecurity standards commonly required for government contractors. He will also break down the first steps a small business can take to ensure basic cyber hygiene and adherence to these standards, thereby ensuring the business stays competitive in the marketplace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal, State, and Local municipalities increasingly include requirements to implement cybersecurity protection plans as basis for contractual award. To effectively compete for contract award, offerors must adhere to published cybersecurity<\/p>\n","protected":false},"author":13,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_tribe_events_status":"","_tribe_events_status_reason":"","_tribe_events_is_hybrid":"","_tribe_events_is_virtual":"","_tribe_events_virtual_video_source":"","_tribe_events_virtual_embed_video":"","_tribe_events_virtual_linked_button_text":"","_tribe_events_virtual_linked_button":"","_tribe_events_virtual_show_embed_at":"","_tribe_events_virtual_show_embed_to":[],"_tribe_events_virtual_show_on_event":"","_tribe_events_virtual_show_on_views":"","_tribe_events_virtual_url":"","footnotes":""},"tags":[],"tribe_events_cat":[2],"class_list":["post-666","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-apex","cat_apex"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.11 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Competitive Advantage through Cybersecurity Compliance - SWCC APEX Accelerator<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Competitive Advantage through Cybersecurity Compliance\" \/>\n<meta property=\"og:description\" content=\"Federal, State, and Local municipalities increasingly include requirements to implement cybersecurity protection plans as basis for contractual award. To effectively compete for contract award, offerors must adhere to published cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"SWCC APEX Accelerator\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T17:09:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/\",\"url\":\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/\",\"name\":\"Competitive Advantage through Cybersecurity Compliance - SWCC APEX Accelerator\",\"isPartOf\":{\"@id\":\"https:\/\/sw.edu\/apex\/#website\"},\"datePublished\":\"2025-08-25T01:49:15+00:00\",\"dateModified\":\"2025-08-25T17:09:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sw.edu\/apex\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/sw.edu\/apex\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Competitive Advantage through Cybersecurity Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sw.edu\/apex\/#website\",\"url\":\"https:\/\/sw.edu\/apex\/\",\"name\":\"SWCC APEX Accelerator\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sw.edu\/apex\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Competitive Advantage through Cybersecurity Compliance - SWCC APEX Accelerator","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Competitive Advantage through Cybersecurity Compliance","og_description":"Federal, State, and Local municipalities increasingly include requirements to implement cybersecurity protection plans as basis for contractual award. To effectively compete for contract award, offerors must adhere to published cybersecurity","og_url":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/","og_site_name":"SWCC APEX Accelerator","article_modified_time":"2025-08-25T17:09:55+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/","url":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/","name":"Competitive Advantage through Cybersecurity Compliance - SWCC APEX Accelerator","isPartOf":{"@id":"https:\/\/sw.edu\/apex\/#website"},"datePublished":"2025-08-25T01:49:15+00:00","dateModified":"2025-08-25T17:09:55+00:00","breadcrumb":{"@id":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sw.edu\/apex\/event\/competitive-advantage-through-cybersecurity-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sw.edu\/apex\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/sw.edu\/apex\/events\/"},{"@type":"ListItem","position":3,"name":"Competitive Advantage through Cybersecurity Compliance"}]},{"@type":"WebSite","@id":"https:\/\/sw.edu\/apex\/#website","url":"https:\/\/sw.edu\/apex\/","name":"SWCC APEX Accelerator","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sw.edu\/apex\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tribe_events\/666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/users\/13"}],"version-history":[{"count":2,"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tribe_events\/666\/revisions"}],"predecessor-version":[{"id":669,"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tribe_events\/666\/revisions\/669"}],"wp:attachment":[{"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/media?parent=666"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tags?post=666"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/sw.edu\/apex\/wp-json\/wp\/v2\/tribe_events_cat?post=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}