Educational Materials

PTAC 101

This brief presentation will illustrate the mission, strategy, and overall impact of the Kentucky PTAC, as well as describing our role in the broader framework alongside our partners.

KYPTAC Overview

Bid Matching Opportunities

This presentation is a truncated walk through of how to navigate our bid matching service to receive targeted and specific leads on bid opportunities. If you missed our demo, contact your counselor to learn how to navigate this free service.

Bid Match Presentation 

Proposal Strategies

This presentation was to discuss proposal strategies for government solicitations. The Webinar covered the procurement process and proposal development process and strategies for Government requirements. This is part of the ongoing series of “how to do business with the government” sponsored by your Kentucky Procurement Technical Assistance Center.

Proposal Strategies

Government Procurement Cycles

The Government Procurement Cycle presents a roadmap of the competitive solicitation process as well as key information to help businesses win contracts, regardless of government purchasing needs or size.

Government Procurement Cycle

Solicitation Review

Overview of solicitation contents, and Sections L ( Instructions to bidders or offerors) and Section M ( Evaluation of Bids or Proposals).

Solicitation Review

Reading Government Contracts

Overview of how to understand the language and requirements of government contracts.

Reading Government Contracts Presentation


Breaking News!

What is adequate Cybersecurity?  If you do business with the Department of Defense, you must comply with the following Cybersecurity standards by 31 December 2017.  It’s not as bad as it seems though.  Contact your counselor for more information and stay tuned for an upcoming webinar on the subject.

Minimum cybersecurity standards are described in NIST Special Publication 800-171 and break down into the following 14 areas:

  1. Access Control
  2. Awareness & Training
  3. Audit & Accountability
  4. Configuration Management
  5. Identification & Authentication
  6. Incident Response
  7. Maintenance
  8. Media Protection
  9. Personnel Security
  10. Physical Protection
  11. Risk Assessment
  12. Security Protection
  13. System & Communication Protection
  14. System & Info Integrity

Contractors must notify the DoD CIO within 30 days of contract award of any security requirements not implemented at the time of contract award. Contractors can propose alternate, equally effective measures to DoD’s CIO through their Contracting Officer.