News & Analysis as of

Supply Chain Cybersecurity Regulatory Requirements

McDermott Will & Schulte

Europe’s Cybersecurity Puzzle: NIS2 Progress in 30 Pieces

As cybersecurity rises to the top of the corporate agenda, businesses face growing pressure to comply with the EU’s evolving regulatory landscape. Whether your company falls directly under EU cybersecurity laws or is...more

A&O Shearman

Mitigating third-party provider cybersecurity risks navigating the Australian legal framework

A&O Shearman on

Cybersecurity breaches originating from third-party providers (TPPs) are an escalating concern for Australian businesses. As supply chain risks grow, there is a mounting public expectation that the entity that commissioned...more

Mitratech Holdings, Inc

How Continuity Management Solutions Build Resilience

Business continuity used to live in a binder, often reviewed once a year and quickly forgotten. Today, it has become a critical part of day-to-day risk management and operational strategy....more

Baker Botts L.L.P.

President Releases "America's AI Action Plan"

Baker Botts L.L.P. on

On July 23, 2025, the White House released America’s AI Action Plan, a comprehensive strategy designed to secure U.S. global dominance in artificial intelligence (AI). The plan, developed under the direction of President...more

Guidepost Solutions LLC

Future-Proofing Your Data Center: A Strategic Imperative

In 2023, a data center experienced a complete power loss during a scheduled electrical grid maintenance. Less than five months later, that same facility faced another major power outage. However, this time the impact was...more

Morrison & Foerster LLP

NIS 2: Strengthening Europe’s Cyber Defenses

European cybersecurity risk management and reporting obligations have received a substantial facelift. The Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the EU (“NIS 2”) became effective...more

Mitratech Holdings, Inc

The 2025 TPRM Study: Key Findings and Recommendations

The 2025 Mitratech Third-Party Risk Management (TPRM) Study conveys a clear message: the third-party risk landscape is evolving into a complex, interconnected ecosystem — one where every vendor, supplier, and partner plays a...more

Blake, Cassels & Graydon LLP

House of Commons Re-Introduces Federal Cybersecurity Legislation

On June 18, 2025, the Minister of Public Safety introduced Bill C-8, An Act respecting cyber security, amending the Telecommunications Act and making consequential amendments to other Acts (Bill C-8). If passed, Bill C-8...more

Woods Rogers

New Cybersecurity Executive Order Revises Specific Federal Policies While Retaining Core Security Principles

Woods Rogers on

On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

Sheppard Mullin Richter & Hampton LLP

Trump’s New Cybersecurity Executive Order: What Contractors Need to Know

On June 6, 2025, the Trump Administration released a new Executive Order (“EO”) on cybersecurity, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order...more

Dickinson Wright

FCC Expands National Security Measures for Telecom Industry

Dickinson Wright on

Last week, the Federal Communications Commission (FCC) took three separate actions to control foreign influence over US communications products and services. These decisions fit within the FCC’s broader efforts to safeguard...more

Holland & Knight LLP

DoD Publishes Organization-Defined Parameters for NIST SP 800-171 Rev. 3

Holland & Knight LLP on

The U.S. Department of Defense (DoD) recently issued a memorandum signaling that defense contractors soon will be required to comply with new cybersecurity compliance requirements. The memorandum establishes...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Mitratech Holdings, Inc

EU Cyber Resilience Act: How to Prepare Now

The EU Cyber Resilience Act (CRA), adopted by the European Parliament in 2024, marks a major milestone in European cybersecurity legislation. As the first EU-wide law focused on the cybersecurity of digital products, it...more

Eversheds Sutherland (US) LLP

Commercially Connected Shorts - 14 May 2025

Welcome to Commercially Connected shorts, our weekly bitesize newsletter summarising the latest updates in UK commercial law. This week we look at: - UK-US and UK-India trade deals - Eversheds Sutherland’s global supply...more

Hogan Lovells

Energy Buzz: Trends in construction contracts for energy transition projects

Hogan Lovells on

With plans for energy transition infrastructure projects well underway, their successful delivery demands that parties swiftly get to grips with the important issues when negotiating, administering and managing claims and...more

Hogan Lovells

The Cyber Security and Resilience Bill

Hogan Lovells on

On 1 April 2025, the UK Department for Science, Innovation and Technology issued a policy statement setting out its key proposals for the new Cyber Security and Resilience Bill. The Bill is intended to respond to an...more

McCarter & English Blog: Government Contracts...

The “Prestige”: DoD Unveils NIST SP 800-171 Revision 3, Organizationally Defined Parameters

On April 15, 2025, the Department of Defense (DoD) released official guidance on Organizationally Defined Parameters (ODPs) appearing in the newly published NIST SP 800-171 Revision 3. At the same time, the DoD reaffirmed...more

DLA Piper

UK: Will UK Cyber Reforms Keep Step with NIS2?

DLA Piper on

Since its announcement during the King’s Speech on 17 July 2024, there has been much anticipation over the contents of the Cyber Security and Resilience Bill (“CS&R Bill“) and in particular the extent to which it will bring...more

Pillsbury Winthrop Shaw Pittman LLP

The EU’s Cyber Resilience Act: New Cybersecurity Requirements for Connected Products and Software

The CRA will affect a broad range of digital products placed on the EU market (including by those based outside the EU), including connected hardware/devices, software and remote data processing solutions. The EU has adopted...more

Bradley Arant Boult Cummings LLP

Key Legal Issues Facing U.S. Government Contractors in 2025

As the regulatory environment continues to evolve in the new administration, U.S. government contractors are facing an increasingly complex array of legal challenges. Staying compliant and competitive requires close attention...more

Morgan Lewis

Data Center Operations: Aligning Supply Chain, Compliance, and Customer Expectations

Morgan Lewis on

The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more

Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Goodwin

Crossing Administrations: The Focus on Federal Cybersecurity Continues

Goodwin on

Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide