Since 2016, the federal government has implemented numerous procurement regulations and associated contract clauses to address cybersecurity by requiring contractors to adopt various controls and standards to protect...more
10/9/2024
/ Cyber Crimes ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Breach ,
Data Protection ,
Department of Defense (DOD) ,
DFARS ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Information Technology ,
Personally Identifiable Information ,
Risk Management
The Government Contracts Cyber Café provides coaching, training and analysis to help you work through the technical, legal, accounting and other requirements confronting your organization, with the goal of helping you achieve...more
Listen to the fifth installment of our 2019 webinar series covering the top issues in government contracts and cybersecurity — all in just 45 minutes. The Government Contracts Cyber Café provides coaching, training and...more
This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more
2/2/2017
/ Breach of Contract ,
Confidential Information ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
False Claims Act (FCA) ,
False-Certification of Conformance ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Information Technology ,
Liquidated Damages ,
Mandatory Disclosure Rules ,
Popular ,
Qui Tam ,
Subcontractors ,
Whistleblowers