The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
Earlier this year, the Department of Defense (DoD) published an “Intellectual Property Guidebook for DoD Acquisition.” It is the culmination of many years of work and the most insightful data rights guidance out of the...more
The Defense Logistics Agency (DLA), is cracking down on procurement fraud and contract fraud. It has recently issued multiple referrals for suspension or debarment, and it is targeting not only prime vendors, but...more
In October 2024, the Department of Justice (DOJ) and the Securities and Exchange Commission (SEC) announced settlements with Raytheon Company, a division of multinational defense contractor RTX, over defective pricing and...more
As of January 17, 2025, the Department of Defense’s data rights regulations and contract clauses look a little different, yet substantively very little has changed. The update is to formally incorporate changes the Small...more
In one of his last major acts in office, former President Biden signed into law a massive defense spending bill that could have significant implications both for companies that contract with the Department of Defense (DoD)...more
As the new administration embarks on its first 100 days, contractors and grant recipients face a pivotal moment. With a clear emphasis on reducing government spending and shifting resources toward energy independence and...more
Stay on top of the complexities of government contracting - Few industries are as heavily regulated or complex as government contracting. If your organization performs government-contracted services, or if you are charged...more
On May 13, 2024 the U.S. Department of Defense (DoD) published Instruction 5205.87: Mitigating Risks Related to Foreign Ownership, Control, or Influence for Covered DoD Contractors and Subcontractors (the Instruction), which...more
The Department of Defense (DoD) published the updated Cybersecurity Maturity Model Certification (CMMC) Program to enforce existing cybersecurity standards across the defense industrial base. This program is designed to...more
On October 15, 2024, the Department of Defense (DoD) published the final rule for the Cybersecurity Maturity Model Certification (CMMC) Program that not only finalizes the long-anticipated CMMC Rule but also foreshadows what...more
After numerous fits and starts, on October 14, the Department of Defense (DoD) published a final rule implementing the Cybersecurity Maturity Model Certification (CMMC) program. Borne from documented deficiencies in the...more
The Justice Department’s global settlement included a significant False Claims Act resolution, resulting in a second deferred prosecution agreement (“DPA”) for a three-year term. A criminal information was filed in the...more
Raytheon’s comprehensive settlement included FCPA violations and failures to make required disclosures to the Defense Department concerning fees and commissions. This portion of the settlement was filed in the Eastern...more
Raytheon’s criminal conduct cut across a variety of topics — it is difficult to imagine but Raytheon’s misconduct occurred in separate parts of the company, involving violations of different laws. Like most cases, I always...more
The CMMC program is designed to ensure that federal contract information (“FCI”) and Controlled Unclassified Information (“CUI”) are sufficiently protected by government contractors. For example, the CMMC program requires...more
Raytheon Company (Raytheon) — a subsidiary of defense contractor, RTX (formerly known as Raytheon Technologies Corporation) — agreed to pay over $950 million to resolve the Justice Department’s investigations into: (i) a...more
The Department of Defense (DoD) published a Final Rule earlier this month formally implementing the Cybersecurity Maturity Model Certification (CMMC) Program. This Final Rule is the culmination of five years of work to...more
The federal government's recent False Claims Act suit against Georgia Tech highlights the importance of complying with cybersecurity standards when working on federal contracts. This action signifies the U.S. Department of...more
The U.S. Department of Defense (DOD) issued the proposed Defense Federal Acquisition Regulation Supplement (DFARS) rules that will implement the Cybersecurity Maturity Model Certification (CMMC) program. These rules, which...more
The U.S. and the U.K. are focused on common national security risks, including preventing foreign access to key emerging technologies, the integrity of the defense supply chain, protection of critical infrastructure, and...more
Government Contracts and cybersecurity attorney Eric Crusius was interviewed by Federal News Network about the forthcoming final rule on the U.S. Department of Defense's (DOD) Cybersecurity Maturity Model Certification (CMMC)...more
U.S. Attorney Nikolas P. Kerest recently highlighted the severity of fraud by government contractors and subcontractors, emphasizing the importance of upholding the integrity of government procurement programs. These remarks...more
Two years after announcing the second iteration of the U.S. Department of Defense's (DoD) Cybersecurity Maturity Model Certification (CMMC) program, the DoD released its proposed rule that, if adopted, will implement the...more
The Inspector General (IG) for the U.S. Department of Defense (DOD) issued a report critical of recent efforts by contractors to protect Controlled Unclassified Information (CUI). The report, which followed the DOD IG's...more
Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more