Guide to compliance and information security requirements and best practices for ITAR compliance
Comply with ITAR regulations and establish an effective ITAR compliance and information security program using this comprehensive checklist of best practices.
You will learn:
- What is ITAR and who does it apply to?
- What is ITAR-controlled Technical Data?
- Best Practices for establishing an overall compliance program.
- Data security considerations to control access and protect ITAR-controlled data.
Who should read this:
- ITAR Program Leads
- US Defense Contractors
- US Defense Manufacturers and supply chain
- IT Teams responsible for SharePoint, OneDrive and File Shares governance
- Information Security Teams