Please join Vinson & Elkins, Gray Analytics, and keynote speaker Stacy Bostjanick of the Department of Defense (DoD) Office of the Chief Information Officer for a CLE discussing the new Cybersecurity Maturity Model...more
On October 15, 2024, the Department of Defense (“DoD”) released its final rule (the “Final Rule”) formally establishing the Cybersecurity Maturity Model Certification (“CMMC”) program, nearly three years after first...more
11/22/2024
/ Code of Federal Regulations (CFR) ,
Compliance ,
Controlled Unclassified Information (CUI) ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
DCMA ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
NIST ,
Subcontractors
In 2023, the Department of Justice (DOJ) achieved a record-breaking number of recoveries under the False Claims Act (“FCA”), underscoring its ongoing commitment to combating fraud against the federal government. Government...more
A review of President Biden’s proposed Budget (“Budget”) for 2023 spotlights the enforcement priorities of the president’s Justice Department as the administration enters its third year. ...more
4/21/2022
/ Antitrust Division ,
Coronavirus/COVID-19 ,
Corporate Counsel ,
Crime Victims ,
Cybersecurity ,
Department of Justice (DOJ) ,
Environmental Justice ,
Environmental Protection Agency (EPA) ,
Federal Budget ,
Foreign Corrupt Practices Act (FCPA) ,
Fraud ,
Joe Biden ,
Popular ,
Procurement Collusion Strike Force ,
Securities and Exchange Commission (SEC) ,
The Clayton Act
On July 20, 2021, the Department of Homeland Security’s Transportation Security Administration (“TSA”) announced the issuance of a second Security Directive regarding further enhancements to pipeline cybersecurity (the “July...more
On May 27, 2021, against the backdrop of the Colonial Pipeline cybersecurity incident, the Department of Homeland Security’s Transportation Security Administration (“TSA”) announced Security Directive Pipeline-2021-01...more
6/1/2021
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Department of Homeland Security (DHS) ,
National Security ,
Pipelines ,
Popular ,
Ransomware ,
Risk Assessment ,
TSA