Fiscal Year 2023 started on October 1 and, without a final set of Department of Defense (DoD) authorizations and appropriations, the DoD currently is operating under continuing resolution. A version of the National Defense...more
10/21/2022
/ Department of Defense (DOD) ,
Drones ,
Federal Contractors ,
Federal Procurement Systems ,
National Security ,
NDAA ,
Procurement Guidelines ,
Proposed Regulation ,
Regulatory Agenda ,
Semiconductors ,
Supply Chain ,
Unmanned Aircraft Systems
This week the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA) issued a “SHIELDS UP” advisory. While it does not identify specific threats in the advisory, CISA states that the “Russian...more
2/21/2022
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
National Security ,
Popular ,
Risk Management ,
Russia ,
Threat Management ,
Vulnerability Assessments
Published on June 9, 2021, President Biden’s Executive Order on Protecting America’s Sensitive Data from Foreign Adversaries is the latest Executive Order seeking to strengthen national security by improving public and...more
6/24/2021
/ Biden Administration ,
Connected Items ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Executive Orders ,
Foreign Adversaries ,
Information Technology ,
Mobile Apps ,
National Security ,
Personally Identifiable Information ,
PHI ,
Privacy Concerns ,
Software ,
TikTok
Previously we reported on President Trump’s Executive Orders banning U.S. nationals’ investment in designated Chinese companies that pose a threat to our national security under the International Emergency Economic Powers...more
6/15/2021
/ Biden Administration ,
China ,
Cybersecurity ,
Defense Sector ,
Executive Orders ,
Foreign Policy ,
Foreign Relations ,
Investment ,
National Security ,
Popular ,
Supply Chain
If you live on the East Coast and tried to get gasoline last week, you already know firsthand of the impacts that a cyber incident can wreck on the supply chain. As a result of the Colonial Pipeline cyber incident, a...more
Numerous pieces of legislation and regulation have been issued in recent years to address the increased threats to the supply chain. We previously reported on the various aspects of the Section 889 ban on the Government and...more
Recent weeks have brought news on multiple fronts regarding supply chain risks and actions in response thereto:
Commerce ICTS Regulations to Go Into Effect; Chinese ICTS Companies, Products and Services in the...more
3/22/2021
/ Biden Administration ,
China ,
Cybersecurity ,
Department of Defense (DOD) ,
DFARS ,
FCC ,
Foreign Policy ,
International Emergency Economic Powers Act (IEEPA) ,
Internet of Things ,
National Security ,
Regulatory Oversight ,
Risk Management ,
Supply Chain ,
Telecommunications
As a preface to this blog, I recently gave a presentation with Nate Picarsic and Emily de la Bruyere at the American Bar Association Public Contract Law Section Fall Procurement Symposium on “China’s Military-Civil Fusion...more
11/24/2020
/ China ,
Defense Sector ,
Executive Orders ,
Foreign Policy ,
Foreign Relations ,
National Security ,
Office of Foreign Assets Control (OFAC) ,
Prohibited Transactions ,
Publicly-Traded Companies ,
Risk Management ,
Securities Transactions ,
Supply Chain ,
Trump Administration
Our blogs and alerts have reported on the increasing legislative and regulatory requirements to promote the security of the U.S. supply chain, including its cybersecurity....more
8/3/2020
/ China ,
Coronavirus/COVID-19 ,
Cyber Crimes ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Security ,
Department of Justice (DOJ) ,
Federal Contractors ,
Foreign Adversaries ,
Hackers ,
Indictments ,
National Security ,
Popular ,
Risk Management ,
Supply Chain ,
Vulnerable Victims
Preparing the defense budget is not an easy thing. Typically, the goal is to have the bills passed by the House and Senate, and then to go into conference to resolve differences and develop a single bill that can pass through...more
7/9/2020
/ 5G Network ,
Cybersecurity Maturity Model Certification (CMMC) ,
Department of Defense (DOD) ,
Infrastructure ,
Legislative Agendas ,
National Security ,
NDAA ,
Procurement Guidelines ,
Research and Development ,
Supply Chain ,
Telecommunications ,
Trump Administration
House Version Still in Committee -
Preparing the defense budget is not an easy thing. Typically, the goal is to have the bills passed by the House and Senate, and then to go into conference to resolve differences and...more
Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more
2/4/2020
/ Controlled Defense Information (DDI) ,
Cybersecurity ,
Defense Sector ,
DFARS ,
Federal Contractors ,
Information Security ,
Just Compensation ,
Microsoft ,
National Security ,
National Security Agency (NSA) ,
Network Security ,
NIST ,
Popular ,
Security and Privacy Controls ,
Security Controls ,
Software ,
Supply Chain ,
Vulnerability Assessments
The Department of Commerce (Commerce) recently issued a proposed regulation to better secure the United States’ information and communications technology and services (ICTS) supply chain. The ICTS supply chain supports how...more
1/17/2020
/ Agricultural Sector ,
Banking Sector ,
Information Technology ,
National Security ,
Prohibited Transactions ,
Proposed Rules ,
Risk Assessment ,
Rulemaking Process ,
Suppliers ,
Supply Chain ,
Technology ,
Telecommunications ,
U.S. Commerce Department
Continuing threats to the supply chain pose increasing risks to our national security. The new interim Federal Acquisition Regulation (FAR) rule published on August 13, 2019, seeks to address certain of these threats by...more
8/24/2019
/ Comment Period ,
Due Diligence ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Huawei ,
Interim Rule ,
National Security ,
NDAA ,
Procurement Guidelines ,
Prohibited Transactions ,
Public Comment ,
Supply Chain ,
Surveillance ,
Telecommunications ,
US Trade Policies ,
Waivers