Last month we reported on the Department of Defense’s (DoD’s) issuance of Version 0.6 of its draft Cybersecurity Maturity Model Certification (CMMC) standard. That draft included DoD updates and revisions to CMMC’s domains,...more
12/20/2019
/ Bid Protests ,
Competitive Bidding ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Security ,
Department of Defense (DOD) ,
DFARS ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
NIST ,
Popular ,
Public Bidding ,
Supply Chain
Supply chain risks are on the rise. Protecting the supply chain is a critical aspect of our national security, health and public safety. Whether parts are electronic or not, if they aren’t what they are represented to be,...more
11/26/2019
/ Counterfeit Goods Regulation ,
Counterfeit Parts ,
Department of Defense (DOD) ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Final Rules ,
Manufacturers ,
Medical Devices ,
Quality Control Plan ,
Reporting Requirements ,
Rulemaking Process ,
Suppliers ,
Supply Chain
Previously we reported on the Department of Defense (‘DoD”) efforts to develop a Cybersecurity Maturity Model Certification (“CMMC”) program to verify the status of contractor cybersecurity and compliance. The CMMC program...more
11/22/2019
/ Certification Requirements ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Defense Sector ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Information Governance ,
Information Management ,
Information Technology ,
NIST ,
Popular ,
Regulatory Agenda ,
Rulemaking Process
In the face of increasing concern over the security of Navy and Marine Corps (Navy) programs, the Navy Marine Corps Acquisition Regulation Supplement (NMCARS) was updated on September 6, 2019 to incorporate significant...more
10/11/2019
/ Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Management ,
Data Protection ,
Defense Contracts ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Incident Response Plans ,
Popular ,
Public Procurement Policies ,
Reporting Requirements ,
U.S. Navy
Earlier this year, Assistant Secretary of Defense for Acquisition & Logistics Kevin Fahey announced that the Department of Defense (“DoD”) was working with Carnegie Mellon University and Johns Hopkins Applied Physics...more
9/12/2019
/ Best Practices ,
Comment Period ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Defense Contracts ,
Defense Sector ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Popular ,
Public Comment
In its recent decision in Criterion Systems, Inc. v. U.S., , the U.S. Court of Federal Claims (COFC) denied protester’s pre-award protest challenging the Agency’s rejection of its late submission of a revised quote in...more
Continuing threats to the supply chain pose increasing risks to our national security. The new interim Federal Acquisition Regulation (FAR) rule published on August 13, 2019, seeks to address certain of these threats by...more
8/24/2019
/ Comment Period ,
Due Diligence ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Huawei ,
Interim Rule ,
National Security ,
NDAA ,
Procurement Guidelines ,
Prohibited Transactions ,
Public Comment ,
Supply Chain ,
Surveillance ,
Telecommunications ,
US Trade Policies ,
Waivers
On July 15, 2019, President Trump signed his third Executive Order on the topic of buying American, “Executive Order on Maximizing Use of American-Made Goods, Products, and Materials.” ...more
8/12/2019
/ Buy America ,
Buy American Act ,
Construction Project ,
Executive Orders ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Infrastructure ,
Procurement Guidelines ,
Supply Chain ,
Trump Administration ,
US Trade Policies
Cybersecurity continues to be an imperative for the protection of the Department of Defense (DoD) and its contractors' supply chain. On June 19, 2019, the National Institute of Standards and Technology (NIST) issued two draft...more
6/26/2019
/ Cyber Attacks ,
Cybersecurity ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
Network Security ,
NIST ,
Popular ,
Security Controls ,
Security Standards ,
Supply Chain