The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
Earlier this year, the Department of Defense (DoD) published an “Intellectual Property Guidebook for DoD Acquisition.” It is the culmination of many years of work and the most insightful data rights guidance out of the...more
As of January 17, 2025, the Department of Defense’s data rights regulations and contract clauses look a little different, yet substantively very little has changed. The update is to formally incorporate changes the Small...more
As the new administration embarks on its first 100 days, contractors and grant recipients face a pivotal moment. With a clear emphasis on reducing government spending and shifting resources toward energy independence and...more
On October 15, 2024, the Department of Defense (DoD) published the final rule for the Cybersecurity Maturity Model Certification (CMMC) Program that not only finalizes the long-anticipated CMMC Rule but also foreshadows what...more
After numerous fits and starts, on October 14, the Department of Defense (DoD) published a final rule implementing the Cybersecurity Maturity Model Certification (CMMC) program. Borne from documented deficiencies in the...more
The Justice Department’s global settlement included a significant False Claims Act resolution, resulting in a second deferred prosecution agreement (“DPA”) for a three-year term. A criminal information was filed in the...more
Raytheon’s criminal conduct cut across a variety of topics — it is difficult to imagine but Raytheon’s misconduct occurred in separate parts of the company, involving violations of different laws. Like most cases, I always...more
The CMMC program is designed to ensure that federal contract information (“FCI”) and Controlled Unclassified Information (“CUI”) are sufficiently protected by government contractors. For example, the CMMC program requires...more
U.S. Attorney Nikolas P. Kerest recently highlighted the severity of fraud by government contractors and subcontractors, emphasizing the importance of upholding the integrity of government procurement programs. These remarks...more
Stay on top of the complexities in aerospace, defense, and government compliance - Few industries are as heavily regulated as aerospace, defense, and government contracting, and few also have such a large investment in...more