Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Federal Contractors Face New Cyber Security Standards – Here’s How to Prepare

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

In response to the unprecedented level of cyber attacks aimed at compromising government IT infrastructure, the Federal Government has introduced new security standards called the NIST SP 800-171, to begin December 31, 2017. In particular, section 3.5, “Identification and Authentication,” represents one of the most substantial changes that will affect the greatest number contractors. A simple username and password will no longer suffice to authenticate an individual’s identity. The new standard requires multifactor authentication including something you have (a credential), something you know (a PIN)  and something you are (biometrics). 

This paper explores how the PIV-I credential with multifactor authentication can enable federal contractors to achieve compliance.

Key Takeaways:

  • NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense
  • Leveraging PIV-I credentialing with multifactor authentication as a defense against cyberattacks
  • How PIV-I enables non-federal organizations to achieve security compliance.

Brought to You by