Enabling Digital Transformation and Cybersecurity Compliance
Configuration Management Course CM2-08
Product Lifecycle Management (PLM) tools excel in two major areas…managing documented product requirements and change process workflows. Properly architected PLM tools provide the functionality needed to support as-planned/ as-released baselines, a closed-loop change process and the necessary cybersecurity protocols (defined by NIST Special Publication (SP) 800-123 and SP 800-53) to protect all intellectual property.
How to maintain the Digital Thread from the baseline to the planning bill, then from the planning bill to the order bill, and finally from the order bill to the actual as-built configuration is a major challenge. Maintaining and complying with proper cybersecurity protocols, as that information is evolving and changing, also represents a major challenge
This course will describe how properly defined IT systems and process protocols can ensure an organizations compliance to NIST SP 800-123 and SP 800-53 cybersecurity requirements. It will describe how to use work authorizations to close the loop on order bills and ensure that the correct documents are utilized. It will describe the CM2 approach for managing and leveraging metadata and how to optimize reuse.
This course will establish a detailed process for defining the core elements that must be present to ensure organizational success and survival. It describes standard CM2-600 Enabling Tool Pre-Assessment Guide for assessing and certifying the ability of enabling tools, and the enabling characteristics of the IPE/CM2 business model relative to achieving all NIST SP 800-123 and SP 800-53 cybersecurity requirements.
This course is recommended for:
- Project Managers, Project Leaders, Project Controllers, and Project Members.
- Quality Assurance Managers, General Managers, Engineering Managers, and Process Implementation Team Members.
- IT Managers, Software Controllers, Developers, and Testers.
- Support Managers, Application Engineers, and Support Technicians.
- Lab Managers and Lab Technicians.
- Service Managers, Service Controllers, Service Technicians
- Configuration/Build Managers.
Choose a CM2-08: Enabling Digital Transformation and Cybersecurity Compliance class from the list below
CM2-08: Enabling Digital Transformation and Cybersecurity Compliance class not listed for your required date or location?
Get a quote for the course and let us know the location where you require training
Executive Classes and Overview Training can also be provided. Management understanding and recognition is important to improving any process.
Get Custom Training
Contact us to learn how the CM2-08: Enabling Digital Transformation and Cybersecurity Compliance course can be included in custom training for your business