Cybersecurity Department of Defense

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Africa Update - September 2015 #4

Leading the News - Burkina Faso: On September 17th, U.S. National Security Advisor Susan Rice condemned the unconstitutional seizure of power by elements of the Presidential Security Regiment in Burkina Faso and...more

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

OPM data breach update–$133 million contract awarded to vendor

The Office of Personnel Management (OPM) and the Defense Department announced this week that a Portland, OR based vendor has been selected to assist with breach notification and credit assistance for the almost 22 million...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

That is SO last week - August 2015 #5

That infamous Ashley Madison data became searchable last week. Spouses, friends, and employers can now search the data to see if they know anyone who registered with the site. This development caused some to wonder if an...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

Defense Department Issues Interim Rule Requiring Contractor and Subcontractor Reporting of Cyber Incidents

On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more

The shifting sands of cybersecurity: DOD's interim rule further burdens contractors

The Department of Defense (DOD) earlier today issued an interim rule, effective immediately, that significantly increases existing cybersecurity requirements for DOD contractors. The requirements in the interim rule, have...more

DoD Addresses Cybersecurity Preparedness, Incident Reporting, and Cloud Computing Acquisitions with new DFARS interim rule

Announced and effective today, August 26, 2015, DoD has issued an interim rule that significantly expands existing DFARS provisions and clauses requiring contractors and subcontractors to report cyber incidents. The interim...more

Weekly Update Newsletter - August 2015 #2

GOVERNMENT CONTRACTS - DOD Issues Report Entitled Defense Contracts: DOD’s Request for Information from Contractors to Assess Prices - The Department of Defense (DOD) has issued a report entitled Defense Contracts:...more

White House Provides Update on 2015 Cybersecurity Initiatives

On July 9, the White House released a fact sheet regarding the Administration’s 2015 cybersecurity efforts “both domestic and international, to improve our cyber defenses, enhance our response capabilities, and upgrade our...more

Actions Foreshadow Uniform Cybersecurity Regulations for Federal Contractors - Two Recent Executive Agency Actions Lay the...

Federal government contractors handling Controlled Unclassified Information (CUI) should take notice of two recent executive agency actions. Combined, they lay the groundwork for a new cybersecurity clause to be added to the...more

United States And Japan Pledge Closer Cooperation In Cyber Defense Matters

On May 30, the United States-Japan Cyber Defense Policy Working Group (“CDPWG”) issued a joint statement outlining increased cooperation between the two countries in the cyber realm. The CDPWG was founded in October 2013 to...more

New Cyber Strategy Issued By Pentagon

In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more

Weekly Update Newsletter - May 2015

SMALL BUSINESS ADMINISTRATION - SBA Issues Proposed Rule to Amend Women-Owned Small Business Federal Contract Program - The U.S. Small Business Administration (SBA) issued a proposed rule to amend its...more

Reed Smith's Government Contracts Weekly Rundown - April 2015 #4

Here is a rundown of last week’s top developments related to government contracts to get you back on track and ready for this week....more

Defense Department Releases Better Buying Power 3.0 Memorandum With New Focus On Cybersecurity

On April 9, the Department of Defense (“DOD”) issued a memorandum containing new directives to guide its procurement of new goods and services. The memorandum, the third in the Pentagon’s Better Buying Power initiative...more

Reed Smith's Government Contracts Weekly Rundown - April 2015 #2

Here is a rundown of last week’s top developments related to government contracts to get you back on track and ready for Monday....more

Reed Smith's Government Contracts Weekly Rundown

In case you spent last week (this morning) dealing with winter weather instead of reading the latest and greatest in the realm on federal contracting, here is a rundown of last week’s top developments related to government...more

Weekly Update Newsletter - January 2015 #4

GOVERNMENT CONTRACTS - SBA Considering Extending Comment Period for Proposed Rule on the Limitations on Subcontracting - Although not yet official, we anticipate that SBA will grant an extension until April 6th...more

Coming Soon to a FAR Near You: Cybersecurity Requirements

There are a growing number of cybersecurity requirements applicable to government contractors that work with the Department of Defense (DoD) and intelligence community. ...more

Top Three Trends From 2014 to Influence Government Contractors in 2015

This post is co-authored by Tamara Jack of LMI Government Consulting. Federal government contractors, especially those in the manufacturing sector, continue to experience the economic impact of budget cuts, decreased federal...more

Department of Defense Updates Its Instruction for Acquisitions of Software and Weapons Systems

On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more

2015 National Defense Authorization Act Requires New Cyber Breach Reporting - "Operationally Critical Contractors" Are Required to...

Congress passed the Carl Levin and Howard P. "Buck" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA or Act) on Dec. 12, 2014. The NDAA for 2015 creates a new cyber breach reporting requirement affecting...more

40 Results
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.