News & Analysis as of

Threat Management

DoD Issues Guidance for Compliance with Cybersecurity Regulations

by Holland & Knight LLP on

• In recently released guidance, the U.S. Department of Defense (DoD) confirms a "one size does not fit all" approach to contractor compliance with its cybersecurity clauses that cover the safeguarding of contractor networks,...more

DoD Contractor’s DFARS Cybersecurity Deadline

At this time last year, the Department of Defense issued a Defense Federal Acquisition Regulation Supplement (DFARS) intended to better protect controlled data and national security networks from cybersecurity threats....more

Workplace Violence Occurring At Alarming Rate: Time For Employers To Be Proactive

by Fisher Phillips on

It’s a news headline we’ve seen too often, including several times in recent weeks: another disgruntled employee or former employee has entered the workplace and killed or injured coworkers. What can you do to minimize the...more

NISPOM Change 2 Deadlines Coming for Cleared Contractors

by Hogan Lovells on

As industry comes up on the one-year anniversary of the publication of Change 2 to the National Industrial Security Program Operating Manual (NISPOM)1, a number of implementation deadlines are drawing near. This blog post...more

Government Deadline Looms for Training on Insider Threats

by Baker Donelson on

Almost one year ago, on May 18, 2016, the Department of Defense (DoD) published Change Two to DoD 5220.22-M, the Department of Defense's "National Industrial Security Operating Manual (NISPOM)." This change required all...more

DSS Issues NISPOM Revisions Requiring Cleared Contractors to Create Inside Threat Programs

by Holland & Knight LLP on

On May 18, 2016, the Defense Security Service (DSS) issued a much anticipated Change 2 to DoD-5220.22-M, known as the National Industrial Security Program Operating Manual (NISPOM). Change 2 requires all contractors that hold...more

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Threat Intelligence Tools Help Defend Networks

by BakerHostetler on

Threat intelligence services provide information about the identities, motivations, characteristics, and methods of attackers. See Rob McMillan, Khushbu Pratap, “Market Guide for Security Threat Intelligence Services,” 3,...more

California’s Governor Strengthens Cybersecurity Preparedness With Executive Order

by King & Spalding on

On August 31, 2015, California Governor Edmund G. Brown Jr. signed Executive Order B-34-15. The Order directs the Governor’s Office of Emergency Services to establish the California Cybersecurity Integration Center...more

“Simmering Ball Of Negativity” Dismissed After Threatening Statements

by Dentons on

An arbitrator has upheld the dismissal of a city “traffic operations” employee for threatening statements, a racist comment and one incident of dangerous and aggressive driving....more

Executive Order: A Start Toward Tackling Cyber Security Problems

by Ifrah PLLC on

President Obama’s February 12 State of the Union address included the announcement of an executive order intended to permit greater sharing of information about possible threats to the nation’s cyber security among private...more

11 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.