DoD Small Business

DoD Small Business We maximize contracting opportunities for small business to respond to current and future Warfighter

The Department of Defense Office of Small Business Programs is dedicated to helping innovative small businesses work with the DoD.

In this week’s issue:👩🏽‍💼 Small business webinar training series launches Nov. 19🌎 NDIS Implementation Plan expands seve...
11/08/2024

In this week’s issue:
👩🏽‍💼 Small business webinar training series launches Nov. 19
🌎 NDIS Implementation Plan expands several small business programs
🏭 Support for Minority Business Enterprises
🪖 Download presentations from the Association of the United States Army
📅 Events: U.S. Small Business Administration, GSA, Naval Facilities Engineering Systems Command (NAVFAC)

https://www.linkedin.com/pulse/osbp-launches-small-business-training-series-dod-osbp-d3tce

📣 Public Input Sought: Proposed expansion of the "Rule of Two" to benefit small businessesThe U.S. Small Business Admini...
11/01/2024

📣 Public Input Sought: Proposed expansion of the "Rule of Two" to benefit small businesses

The U.S. Small Business Administration is proposing an expansion of its "Rule of Two" policy, which requires government contracts to be set aside for small businesses when at least two qualified small firms are capable of performing the work.

The new proposal aims to extend this rule to apply to orders off of multiple-award contracts, with certain exceptions. In addition, the SBA is calling for greater involvement from the SBA and agency Offices of Small and Disadvantaged Business Utilization (OSDBUs) in planning new multiple-award contracts. The SBA estimates the proposed changes could potentially funnel an additional $6 billion in contracts annually to small businesses.

Small business owners and interested stakeholders are encouraged to provide feedback on the proposed rule by December 24, 2024.

In this week’s issue:🖋️ DoD publishes National Defense Industrial Strategy Implementation Plan🎤 OSBP industry engagement...
11/01/2024

In this week’s issue:
🖋️ DoD publishes National Defense Industrial Strategy Implementation Plan
🎤 OSBP industry engagements at Defense Logistics Agency Aviation Roundtable, Pacific Tech Conference, and NSIN Propel Demo Day
✅ Public input sought on expansion of “Rule of Two” policy
📅 Events: The National Center APEX Accelerator, National Veterans Small Business Week

https://www.linkedin.com/pulse/week-review-dod-industrial-strategy-small-business-industry-engagements-kyf7e

The recently released updates to the Cybersecurity Maturity Model Certification (CMMC) streamlines and simplifies the pr...
10/29/2024

The recently released updates to the Cybersecurity Maturity Model Certification (CMMC) streamlines and simplifies the process for small-and medium-sized businesses by reducing the number of assessment levels from the five in the original program to three under the new program.

The DoD Chief Information Officer released new resources to help businesses understand these levels:

🛡️ CMMC Level 1: Basic protection of Federal Contract Information (FCI) will require self-assessment.
🛡️ CMMC Level 2: General protection of Controlled Unclassified Information (CUI) will require either third-party assessment or self-assessment.
🛡️ CMMC Level 3: A higher level of protection against risk from advanced persistent threats will be required for some CUI and require a Defense Industrial Base Cybersecurity Assessment Center-led assessment.

Visit Project Spectrum for these and related resources: https://lnkd.in/ehF45zEy

In this month's edition of the DoD Small Business Digest: 💻 Take action during National Cybersecurity Month❓ CMMC 2.0 FA...
10/25/2024

In this month's edition of the DoD Small Business Digest:

💻 Take action during National Cybersecurity Month
❓ CMMC 2.0 FAQs
👩🏾‍💼 OSBP, GT APEX Accelerator at MED Week
💰 Funds approved for government-backed investments for critical tech initiative
⚓ SecNav champions small businesses at Fleet Week
✏️ Small business on-ramp announced for intelligence analytical support services contract
📅 Events: ISOA, U.S. Small Business Administration, and The National Center APEX Accelerator

https://www.linkedin.com/pulse/strengthening-small-business-cyber-defenses-cmmc-final-rule-pypke

Keeping your software up to date isn't just a good habit—it's a necessity in today’s evolving threat landscape. 🔄 Automa...
10/24/2024

Keeping your software up to date isn't just a good habit—it's a necessity in today’s evolving threat landscape. 🔄 Automations ensure that critical patches and security fixes are applied immediately, without manual intervention.

Key Benefits:
🛡️ Real-time protection from emerging threats
⏱️ Minimizes human error and oversight
🔧 Reduces attack vectors by patching vulnerabilities

In a world where threat actors can exploit flaws within minutes of discovery, automating your updates can cut your risk by 85% or more. Don’t wait—secure your systems NOW!

Learn More: https://www.nist.gov/news-events/news/2023/08/nist-drafts-major-update-its-widely-used-cybersecurity-framework

Tired of installing software updates? There’s a tool for that – and it is more important than you think. The National In...
10/22/2024

Tired of installing software updates? There’s a tool for that – and it is more important than you think.

The National Institute of Standards and Technology says that applying software updates can reduce the likelihood of a successful attack by as much as 85%, especially when combined with other good cybersecurity practices.

With a software automation tool, you can ensure that critical software updates get installed as soon as available and best protect yourself and your business.

Learn More: https://lnkd.in/eYhE3Nem

Multi-factor authentication, or MFA, makes you 99% less likely to get hacked, according to the Cybersecurity and Infrast...
10/17/2024

Multi-factor authentication, or MFA, makes you 99% less likely to get hacked, according to the Cybersecurity and Infrastructure Security Agency (CISA). Yes, you need a strong password, but that password needs protection as well. MFA adds an extra layer of security, requiring a second authentication requirement for access to your information.

Some common types of MFA:
✅ Knowledge-based authentication: This includes methods like email codes.
✅ Possession-based authentication: Examples include text and call one-time passwords (OTPs), authenticator apps, and soft token software development kits (SDKs).
✅ Inherence-based authentication: This involves biometric verification.
✅ Location-based authentication: This can include physical keys or smartcards.

Learn more about MFA: https://lnkd.in/dTmH5TW

Today, the DoD Office of Small Business Programs honors Indigenous Peoples’ Day by recognizing the resilience, strength,...
10/14/2024

Today, the DoD Office of Small Business Programs honors Indigenous Peoples’ Day by recognizing the resilience, strength, and invaluable contributions of Indigenous communities to our nation. We reaffirm our commitment to help be an economic multiplier for Native Communities through our programs, including those that specifically promote expanded participation from Native American-owned business in the Defense Industrial Base.

Just in! The Cybersecurity Maturity Model Certification Program final rule was released and is expected to be published ...
10/11/2024

Just in! The Cybersecurity Maturity Model Certification Program final rule was released and is expected to be published in the Federal Register on Tuesday.

This final rule aligns the program with the cybersecurity requirements described in Federal Acquisition Regulation part 52.204-21 and National Institute of Standards and Technology (NIST) Special Publications (SP) 800-171 Rev 2 and -172. It also clearly identifies the 24 NIST SP 800-172 requirements mandated for CMMC Level 3 certification.

Read the release: https://www.defense.gov/News/Releases/Release/Article/3932947/cybersecurity-maturity-model-certification-program-final-rule-published

Support for small businesses: https://business.defense.gov/Programs/Cyber-Security-Resources

In this week's issue:✏️OSBP, SBA lead educational event focused on small business programs💻 Supporting smaller firms wit...
10/11/2024

In this week's issue:
✏️OSBP, SBA lead educational event focused on small business programs
💻 Supporting smaller firms with cybersecurity regulations
🎉 National APEX Accelerators Day highlights work of 90+ centers
🔤 National Cybersecurity Month campaign focuses on password health
❤️ SBA disaster aide for small businesses impacted by hurricanes Helene, Milton
📅 Events: Nevada APEX Accelerator, Defense Acquisition University

https://www.linkedin.com/pulse/osbp-sba-team-up-educate-small-businesses-dod-osbp-hshge

10/10/2024
Yes, your cat is cute, but using her name for each online account is a great way to get hacked. The Cybersecurity and In...
10/10/2024

Yes, your cat is cute, but using her name for each online account is a great way to get hacked.

The Cybersecurity and Infrastructure Security Agency (CISA) recommends passwords that are more than 16 characters long, avoid personal information, and use a mix of unique characters.

Learn more about generating smart passwords to secure your data and our world: https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords

Today, we celebrate the incredible impact of APEX Accelerators and the dedication of the 90+ centers across the nation h...
10/09/2024

Today, we celebrate the incredible impact of APEX Accelerators and the dedication of the 90+ centers across the nation helping businesses enter and thrive in the government supply chain.

These APEX Accelerators play a vital role in connecting businesses of all sizes with opportunities in the federal marketplace, guiding them through complex procurement processes, and opening doors to contracts that drive economic growth.

A big thank you to the entire APEX Accelerators network for your tireless commitment to empowering businesses with the tools, knowledge, and support they need to succeed. Your work is instrumental in strengthening local economies and fostering innovation across industries.

Learn more and find your local APEX Accelerator: https://www.apexaccelerators.us

You wouldn’t leave your front door wide open while away on vacation, so why rely on outdated methods like simple passwor...
10/09/2024

You wouldn’t leave your front door wide open while away on vacation, so why rely on outdated methods like simple passwords to protect valuable information? Using the right tools and technology is crucial to safeguarding your data.

The National Institute of Standards and Technology (NIST) recommends a password manager to generate, store, and autofill strong, unique passwords for each account, as well as other frequently used information.

With the help of a password manager, you only need to remember one master (strong and unique) password to access your encrypted virtual vault. People often use simple passwords or reuse the same password because they are easy to remember. A password manager creates complex passwords and stores them, allowing for a unique, complex password for each portal.

A password manager has become an essential and indispensable tool for secure operations. Embrace the right tool and technology to protect what matters.

Learn More in the NIST Special Publication 800-63B: https://pages.nist.gov/800-63-3/sp800-63b.html

Relying on old-fashioned defenses is liking hoping a scarecrow will stop a bank robbery. A scarecrow is effective at sca...
10/07/2024

Relying on old-fashioned defenses is liking hoping a scarecrow will stop a bank robbery. A scarecrow is effective at scaring off birds but is useless against criminals.

Think about it: leaving your defenses to outdated methods is like relying on a scarecrow to fend off hackers armed with cutting-edge technology.

They’re not scared, and they’re certainly not stopping.

Cyber threats are evolving every day and one way you can protect yourself and your business is by using strong passwords on your accounts.

The Cybersecurity and Infrastructure Security Agency (CISA) offers guidance to help you build stronger defenses. They recommend passwords are at least 12 characters long with a mix of upper and lowercase letters, numbers, and symbols.

Some good things to avoid when creating a strong password:
🔒 Personal information such as children, spouse, or pet names (sorry Fluffy)
🔒Numbers related to birthdays, anniversaries, or other notable dates (criminals love easily guessed details)
🔒Repetitive or sequential characters
🔒Using “password” as your password (it’s 2024 – don’t make it easy for them!)

Just as you wouldn’t trust a scarecrow with guarding your valuables, don’t trust outdated methods to keep cybercriminals at bay. Use the right methods and stay one step ahead of the threats.

Learn more about creating strong passwords from CISA: https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords

In this issue:💰 Nearly $1 billion available in loans to help companies scale production in critical sectors🎣 National Cy...
10/04/2024

In this issue:
💰 Nearly $1 billion available in loans to help companies scale production in critical sectors
🎣 National Cybersecurity Month campaign kicks off with focus on phishing
🧑‍💼 OSBP leaders speak at Ohio APEX Accelerator at Ohio University manufacturing summit, Advanced Functional Fabrics of America (AFFOA) event
📅 Events from Professional Services Council, Illinois APEX Accelerator, and the Contract Opportunities Center APEX Accelerator

https://www.linkedin.com/pulse/dod-makes-nearly-1-billion-loans-available-scale-technology-production-b25te

Address

3300 Defense Pentagon, Room 3B854
Washington D.C., DC
20301

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Friday 9am - 5pm

Alerts

Be the first to know and let us send you an email when DoD Small Business posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Organization

Send a message to DoD Small Business:

Videos

Share

Nearby government services