TBIPS Bid Solicitation Security Consultant for CMHC
Source: Canada Buy and Sell
Stream 6 Cyber Protection Services C.1 Strategic IT Security Planning and Protection Consultant Senior Level Qty 1 Period: One year with options to extend for additional two years - total three years
Options to add two additional C.1 Strategic IT Security Planning and Protection Consultant Intermediate Level Qty 2 Period: One year with options to extend for additional two years - tot
Tender Information FAQ
Tender Information
Want to explore the full details? View the full report
Participants
Sponsoring Agency | Obfuscated Data |
Company | Obfuscated Data |
Status
Original status | expired |
Taiyo status | Obfuscated Data |
Taiyo last update | 00-00-0000 |
Available timestamps | 00-00-0000 |
Available timestamp type | Obfuscated Data |
Contact
Contact name | Obfuscated Data |
Phone | 0000000000 |
ObfuscatedData@email.com | |
Address | Obfuscated Data, Obfuscated data, obfuscated data, Obfuscated data |
Description
Description | Stream 6 Cyber Protection Services C.1 Strategic IT Security Planning and Protection Consultant Senior Level Qty 1 Period: One year with options to extend for additional two years - total three years Options to add two additional C.1 Strategic IT Security Planning and Protection Consultant Intermediate Level Qty 2 Period: One year with options to extend for additional two years - total three years BID SOLICITATION SEND TO THE FOLLOWING SA HOLDERS: 7792395 Canada Inc. Accenture Inc. ADGA Group Consultants Inc. ALTRUISTIC INFORMATICS CONSULTING INC. Calian Ltd. Ernst & Young LLP IBM Canada Limited/IBM Canada Limitée KPMG LLP MNP LLP Modis Canada Inc Onaki Création S.E.N.C., IBISKA TELECOM INC., in Joint Venture Pricewaterhouse Coopers LLP Raymond Chabot Grant Thornton Consulting Inc. The Bell Telephone Company of Canada or Bell Canada/La Compagnie de Téléphone Bell du Canada ou Bell Canada The Herjavec Group The Contractor will be required to produce a corporate wide cyber strategy, one that isn’t limited to the CIO organization only. It is intended to be a description of how CMHC’s cyber related investments will be used across the enterprise to achieve business success. The resulting strategy must be explicitly linked to business outcomes, rather than internal activities, such as cost, project delivery or service levels, which are activities that are documented as part of the IT operational plan. |
Original sub-sector | Obfuscated |
Original Currency | USD |
Original budget | 000000000000000 |
Procurement method | Obfuscated Data |
Budget | 000000000000000 |
Location
Region | Obfuscated |
Country | Obfuscated |
State | Obfuscated Data |
County | Obfuscated |
Location | Obfuscated Data, Obfuscated data, obfuscated data, Obfuscated data |
Source
Source reliability | High |
Data quality score | 100% |
Source | Obfuscated Data |
URL | obfuscated_data,obfuscateddata.com |
More Details
Project Type | Obfuscated Data |
Article Published Date | Obfuscated Data |
