Cybersecurity Department of Defense

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

2015 National Defense Authorization Act Requires New Cyber Breach Reporting - "Operationally Critical Contractors" Are Required to...

Congress passed the Carl Levin and Howard P. "Buck" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA or Act) on Dec. 12, 2014. The NDAA for 2015 creates a new cyber breach reporting requirement affecting...more

Breaching Bad: New Cyber Security Regs for Defense Contractors

Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more

Government Contracts Quarterly Update - February 2014

The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more

Cyber Espionage And Insurance Coverage

In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more

Department of Defense and General Services Administration Make Cybersecurity Recommendations for Contractors

On January 23, 2014, the Department of Defense and General Services Administration issued a final report making recommendations for the development of cybersecurity standards in the acquisition and contracting process. The...more

Acquisition Working Group Report Identifies Cybersecurity Considerations for Government Contractors

President Obama’s February 12, 2013 Executive Order, Improving Critical Infrastructure Cybersecurity, required the Department of Defense (DoD) and the General Services Administration (GSA) to make recommendations on the...more

Data Security Advisory for Federal Contractors: Safeguarding Unclassified Controlled Technical Information

The Department of Defense (DoD) has published its new final rule governing the security measures imposed on DoD unclassified technical information resident on or passing through the unclassified information systems of its...more

Defense Department Issues Final Rule Requiring Safeguards For Unclassified Technical Information And Cyber Incident Reporting

On November 18, 2013, the Department of Defense (DOD) published a Final Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS). The new rule, which is effective immediately, is likely to have broad...more

DOD Issues Interim Rule on Supply Chain Security

On November 18, 2013, the U.S. Department of Defense (DOD) published an interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) that will likely prove controversial through the inclusion of supply...more

CYBERSECURITY UPDATE: New Rules Require Defense Contractors To Protect Technical Information

The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more

DOD Final Rule on Contractors' Responsibilities for Safeguarding Unclassified Technical Data

On November 18, 2013, the Department of Defense (DOD) issued a final cyber security rule imposing requirements on contractors handling unclassified controlled technical information. While the new rule, which is effective...more

New DoD Rule Promotes Voluntary Sharing of Cyber-Security Threat Information Between DoD and Defense Contractors

On October 22, 2013, the Department of Defense (DoD) published its Final Rule establishing a program for promoting voluntary sharing of cyber threat information between the DoD and government contractors. The DoD intends this...more

Capital Thinking Update - June 3, 2013

General Legislative - The Senate will convene today, Monday, June 3, at 2:00 pm and begin a period of morning business. Thereafter, the Senate will resume consideration of S. 954, the Farm Bill, provided that alfalfa...more

Client Alert: GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Federal Procurement

President Obama’s February 12, 2013 Executive Order (“EO”) titled, “Improving Critical Infrastructure Cybersecurity,” defined the framework for improving the security of computer networks based on the designation of 16 areas...more

Government RFI on New Cybersecurity Measures for Federal Contracts

Last week, the General Services Administration (“GSA”) issued a Request for Information (“RFI”) soliciting comments from federal contractors on the feasibility of incorporating cybersecurity standards into federal...more

President Obama’s FY 2014 Budget Proposal - Analysis Related To Administration Funding And Policy Priorities

INTRODUCTION - On April 10th, President Obama submitted his FY 2014 Budget Proposal to Congress. In the normal course of events, the President would have unveiled his spending plan in early February as required by law....more

GOVERNMENT CONTRACTS AND CYBERSECURITY CLIENT ALERT: Cybersecurity 101: Government Contractors

If you are a contractor with the federal government, and if you are not already subject to regulations governing the security of your computer systems, you soon will be. On February 12, 2013, President Obama issued an...more

New FAR Rules Likely For "Critical Infrastructure" Contractors

On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more

CYBERSECURITY CLIENT ALERT: White House Issues Long-Awaited Cybersecurity Executive Order, New Presidential Directives for...

The White House issued a long-awaited Executive Order (EO) “Improving Critical Infrastructure Cybersecurity” which directs the U.S. Department of Homeland Security (DHS) and other agencies to quickly advance efforts to...more

National Defense Authorization Act for Fiscal Year 2013—New Procurement Rules Coming

In January, President Obama signed the National Defense Authorization Act for Fiscal Year 2013 (“NDAA”), which includes numerous new procurement policies directed at contractors and how they bid on and perform government...more

Capital Thinking Update - February 4, 2013

In This Issue: General Legislative; Debt Limit; Agriculture & Food; Budget, Appropriations; Cybersecurity; Education; Energy; Financial Services; Health Care; International Defense and Homeland Security; and,...more

This Week in Washington - January 11, 2013

In This Issue: - DOMESTIC POLICY MATTERS - Congress is in recess this week. The House returns on Monday, and the Senate returns January 21st. Debt Ceiling, Budget & the Economy. The President’s Fiscal...more

Cybersecurity Provisions Enacted under 2013 National Defense Authorization Act

On January 2, 2013, President Obama signed the 2013 National Defense Authorization Act for 2013 (NDAA) into law. Each year Congress passes the NDAA to authorize funding levels for Department of Defense (DoD) programs and...more

EPIC Comments on Federal Cybersecurity Plan

In response to a request for comments, EPIC submitted comments on the Federal Cybersecurity Research and Development Strategic Plan. The cybersecurity strategic plan calls for a coordinated research strategy across federal...more

Capital Thinking Update - December 10, 2012

General Legislative On Tuesday, December 11, the House will meet at noon for morning hour and at 2:00 for legislative business. The House will consider a Motion to go to Conference on H.R. 4310 – National Defense...more

26 Results
|
View per page
Page: of 2