SlideShare a Scribd company logo
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Cybersecurity Compliance &
Enforcement for Federal Contractors
Friday, September 30, 2022
12pm EST
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
About Jschaus & Associates:
Ø Washington DC based
Ø Consulting firm working with established Federal Contractors;
Ø Webinars, Events, Conferences;
Ø Newsletter – reaching 23K Federal Contractors;
Ø 500+ Webinars on YouTube;
Ø Advertising & Sponsor Opportunities
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
About Arnold & Porter:
Ø Top-ranked Government Contracts practice
Ø Represent the entire spectrum of domestic and international government
contractors: start-ups, Fortune 100 companies, and non-profits
Ø Help address the increasingly complex cyber issues confronting
commercial businesses, government contractors, and the special concerns
associated with work for DoD and intelligence agencies
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
MEET OUR SPEAKERS
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Sonia Tabriz
sonia.tabriz@arnoldporter.com
202.942.6574
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Tom Pettit
thomas.pettit@arnoldporter.com
202.942.6075
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Agenda
• Cybersecurity Requirements
• CMMC Overview and Updates
• Enforcement
7
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CYBERSECURITY REQUIREMENTS
8
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
FAR 52.204-21, Basic Safeguarding of Covered Contractor Information
Systems
• Applies to any information system “owned or operated by a contractor that processes,
stores, or transmits” “federal contract information” (FCI)
• FCI is any information “not intended for public release” obtained from or developed for the
Government in the performance of a contract
• Establishes baseline security standards, such as:
• Identifying users, processes, and devices (e.g., personal identity verification (PIV))
• Limiting access to information systems to only authorized users, processes, and devices (e.g., mandating passwords,
managing group policies, and maintaining the Windows Registry)
• Installing and updating antivirus software and other protections against malicious code; scanning for malware
• Regulating physical access to information systems and facilities
9
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Applies to DoD contractors with information systems that will store, process, or transmit controlled
unclassified information (CUI) collected, developed, received, transmitted, used, or stored by or on
behalf of the contractors in support of the performance of the contract
• Two key elements: security controls and cyber incident reporting
• Security Controls
• Implement security controls in NIST SP 800-171
• Document security controls in system security plan
• Develop plan of action for any controls not implemented
10
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Security Controls
• NIST SP 800-171 compliance is generally a self-assessment system with a few caveats:
• System security plans and plans of action can be (but typically are not) formal contract deliverables
• Contractor must submit requests to vary from NIST SP 800-171 to the contracting officer for review by the DoD
CIO
• DIBCAC Assessments, DFARS 252.204-7019, and DFARS 252.204-7020
• Cloud Services
• CSPs must meet security requirements equivalent to the Federal Risk and Authorization Management Program
(FedRAMP) Moderate baseline
11
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Cyber Incident Reporting
• Cyber Incident: Actions taken through the use of computer networks that result in a compromise
or an actual or potentially adverse effect on an information system and/or the information
residing therein
• Compromise: Disclosure of information to unauthorized persons or a violation of the security policy
of a system and unauthorized intentional or unintentional disclosure, modification, destruction, or
loss of an object or the copying of information to unauthorized media may have occurred
• Adverse Effect: Not defined, but it could include, among other things, exfiltration, malware, DDoS
attack, ransomware attack
• Conduct a review, including assessing scope of cyber incident and impact on covered defense
information as well as ability to provide operationally critical support
• Must “rapidly” report cyber incidents through DIBNet
12
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Cyber Incident Reporting
• Submit malicious software to the DoD Cyber Crime Center
• Preserve information (images of information systems and monitoring/packet capture data) for at
least 90 days after reporting cyber incident
• DoD has right to perform forensic analysis and damage assessment, and contractor must
cooperate
• Subcontract flow down
13
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments
• Apply to all solicitations and contracts that exceed the micro-purchase threshold and are not
exclusively for the acquisition of commercially available off-the-shelf (COTS) items
• Four Components:
• Weighted Score
• 110-point, weighted scoring system that measures the extent to which an offeror or contractor has implemented
the NIST SP 800-171 security controls.
• Standardized scoring methodology that assigns greater points to requirements that have greater impact on the
security of the network and its data than others.
• Confidence Levels
• Basic Assessment/Low Confidence: Self-assessment and self-generated score
• Medium Assessment/Confidence: DoD reviews Basic Assessment and associated documentation and discusses
any concerns with the contractor
• High Assessment/Confidence: Medium Assessment + verification, examination, and demonstration of SSP
14
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments
• Four Components:
• Rebuttal and Adjudication: Contractor may, within 14 days, dispute any aspect of a DoD assessment
• Reporting: Contractor must enter data into the Supplier Performance Risk System (summary level score,
type of assessment, description of the SSP architecture, assessment date, and date when contractor will
achieve perfect score)
• American Fuel Cell & Coated Fabrics Co., B-420551, B-420551.2, June 2, 2022, 2022 CPD ¶ 139
15
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC OVERVIEW AND UPDATES
16
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Why CMMC?
• DFARS 252.204-7012 relies on contractor self-assessments
• There is no mandatory government oversight
• DoD concluded that the “Scout’s Honor” system was ineffective
• A 2018 National Defense Industrial Association (NDIA) survey revealed that 36% of contractors who responded were
not aware of DFARS 252.204-7012, and 45% of the respondents admitted that they had never read NIST SP 800-171
• A 2019 NDIA survey revealed that only 56% of defense contractors were prepared for a DCMA assessment of NIST SP
800-171 compliance
17
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• DoD determined that more must be done to harden the DIB's and defense supply chain's
cyber infrastructure
• Verification is not required
• Industry surveys have indicated that many contractors are noncompliant
• Cyber incidents have increased
• CMMC 1.0
• Released in January 2020
• Five maturity levels (two transitional) and would have to be certified to be eligible for contracts
incorporating CMMC requirements
18
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• CMMC 2.0
• “Announced” in November 2021
• Streamlined requirements
• CMMC-unique security practices removed
• New iteration will have three maturity levels instead of five (CMMC 1.0 Levels 2 and 3 removed)
• Level 1: Security controls for FCI
• Level 2: 110 NIST SP 800-171 security controls for CUI
• Level 3: 110 NIST SP 800-171 security controls for CUI, plus some subset of NIST SP 800-172
• Plans of action generally not allowed, with exceptions only for minor noncompliance
19
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• Assessments
• Level 1 is achieved through a self assessment and attestation of compliance
• Level 2 generally requires third-party assessments through accredited CMMC Third Party
Assessment Organizations (C3PAOs), but self-assessments are permitted if contract
requirements do not involve information critical to national security
• Level 3 must be assessed by USG officials
• Interim rule is expected around March 2023, and CMMC may be incorporated into
solicitations and RFIs shortly thereafter
20
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
ENFORCEMENT
21
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Contract-Based Remedies
• In June 2022, DoD issued a memorandum reminding Contracting Officers of available contract-based
remedies for noncompliance with DFARS 252.204-7012 and the corresponding NIST SP 800-171 requirements
22
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• In October 2021, the Department of Justice (DoJ) announced a new Civil Cyber-Fraud Initiative that leverages
the False Claims Act (FCA) to combat cyber threats
• Deputy Attorney General Lisa O. Monaco stated:
• “For too long, companies have chosen silence under the mistaken belief that it is less risky to hide a breach than to
bring it forward and to report it. Well that changes today. We are announcing today that we will use our civil
enforcement tools to pursue companies, those who are government contractors who receive federal funds, when
they fail to follow required cybersecurity standards — because we know that puts all of us at risk. This is a tool that
we have to ensure that taxpayer dollars are used appropriately and guard the public fisc and public trust.”
• In a recent Comprehensive Cyber Review report, DOJ confirmed that it plans to “lead the effort to enforce
cybersecurity requirements on federal contractors and grantees” and further announced its desire to
participate in developing those requirements
23
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• DoJ has identified the following benefits of the Civil Cyber-Fraud Initiative:
• Building broad resiliency against cybersecurity intrusions across the government, the public sector and key industry
partners
• Holding contractors and grantees to their commitments to protect government information and infrastructure
• Supporting government experts’ efforts to timely identify, create and publicize patches for vulnerabilities in
commonly-used information technology products and services
• Ensuring that companies that follow the rules and invest in meeting cybersecurity requirements are not at a
competitive disadvantage
• Reimbursing the government and the taxpayers for the losses incurred when companies fail to satisfy their
cybersecurity obligations
• Improving overall cybersecurity practices that will benefit the government, private users and the American public
24
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• DoJ has stated that the following types of contracts will be the focus of its enforcement efforts:
• Software and hardware procurement
• Developing, implementing or maintaining IT systems owned by the federal government
• Use of the contractor’s IT systems, especially if the systems maintain government data
• Cloud services
• Contracts that incorporate a regulatory, statutory or contractual requirement to monitor and report a cyber
breach or incident
• DoJ has also stated that it expects qui tam relators to play a significant role in implementing the
Civil Cyber-Fraud Initiative
• DoJ has already announced results of its enforcement efforts
25
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Other Potential Risks
• Bid protest litigation
• Subcontract flow down negotiations and disputes
• Suspension and debarment
26
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
QUESTIONS?
Please Contact Our Speakers:
Sonia Tabriz
sonia.tabriz@arnoldporter.com
202.942.6574
Tom Pettit
thomas.pettit@arnoldporter.com
202.942.6574
27
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
THANK YOU FOR ATTENDING
28

More Related Content

What's hot

Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
DATAVERSITY
 
Top 40 Federal Contractors - PROFILE #1 - Lockheed Martin
Top 40 Federal Contractors - PROFILE #1 - Lockheed MartinTop 40 Federal Contractors - PROFILE #1 - Lockheed Martin
Top 40 Federal Contractors - PROFILE #1 - Lockheed Martin
JSchaus & Associates
 
2022 Procurement Playbook - EPA - (06/03/2022)
2022 Procurement Playbook - EPA - (06/03/2022)2022 Procurement Playbook - EPA - (06/03/2022)
2022 Procurement Playbook - EPA - (06/03/2022)
JSchaus & Associates
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
CCG
 
Digital banking on AWS
Digital banking on AWSDigital banking on AWS
Digital banking on AWS
Pham Anh Vu
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration Success
FindWhitePapers
 
Subcontracting With The Primes - Top To Bottom - 2/1/2023
Subcontracting With The Primes - Top To Bottom - 2/1/2023Subcontracting With The Primes - Top To Bottom - 2/1/2023
Subcontracting With The Primes - Top To Bottom - 2/1/2023
JSchaus & Associates
 
Marketing to The Federal Government
Marketing to The Federal Government Marketing to The Federal Government
Marketing to The Federal Government
JSchaus & Associates
 
Data Migration Strategies PowerPoint Presentation Slides
Data Migration Strategies PowerPoint Presentation SlidesData Migration Strategies PowerPoint Presentation Slides
Data Migration Strategies PowerPoint Presentation Slides
SlideTeam
 
Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data Governance
Health Catalyst
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...
Pieter De Leenheer
 
Where Data Architecture and Data Governance Collide
Where Data Architecture and Data Governance CollideWhere Data Architecture and Data Governance Collide
Where Data Architecture and Data Governance Collide
DATAVERSITY
 
The Marriage of the Data Lake and the Data Warehouse and Why You Need Both
The Marriage of the Data Lake and the Data Warehouse and Why You Need BothThe Marriage of the Data Lake and the Data Warehouse and Why You Need Both
The Marriage of the Data Lake and the Data Warehouse and Why You Need Both
Adaryl "Bob" Wakefield, MBA
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
Ali Mirfallah
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
Kiran Kumar Chittoori
 
Azure Data Factory v2
Azure Data Factory v2Azure Data Factory v2
Azure Data Factory v2
Sergio Zenatti Filho
 
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
DATAVERSITY
 
Linking Data Governance to Business Goals
Linking Data Governance to Business GoalsLinking Data Governance to Business Goals
Linking Data Governance to Business Goals
Precisely
 
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Amazon Web Services
 
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Craig Milroy
 

What's hot (20)

Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Top 40 Federal Contractors - PROFILE #1 - Lockheed Martin
Top 40 Federal Contractors - PROFILE #1 - Lockheed MartinTop 40 Federal Contractors - PROFILE #1 - Lockheed Martin
Top 40 Federal Contractors - PROFILE #1 - Lockheed Martin
 
2022 Procurement Playbook - EPA - (06/03/2022)
2022 Procurement Playbook - EPA - (06/03/2022)2022 Procurement Playbook - EPA - (06/03/2022)
2022 Procurement Playbook - EPA - (06/03/2022)
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
 
Digital banking on AWS
Digital banking on AWSDigital banking on AWS
Digital banking on AWS
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration Success
 
Subcontracting With The Primes - Top To Bottom - 2/1/2023
Subcontracting With The Primes - Top To Bottom - 2/1/2023Subcontracting With The Primes - Top To Bottom - 2/1/2023
Subcontracting With The Primes - Top To Bottom - 2/1/2023
 
Marketing to The Federal Government
Marketing to The Federal Government Marketing to The Federal Government
Marketing to The Federal Government
 
Data Migration Strategies PowerPoint Presentation Slides
Data Migration Strategies PowerPoint Presentation SlidesData Migration Strategies PowerPoint Presentation Slides
Data Migration Strategies PowerPoint Presentation Slides
 
Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data Governance
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...
 
Where Data Architecture and Data Governance Collide
Where Data Architecture and Data Governance CollideWhere Data Architecture and Data Governance Collide
Where Data Architecture and Data Governance Collide
 
The Marriage of the Data Lake and the Data Warehouse and Why You Need Both
The Marriage of the Data Lake and the Data Warehouse and Why You Need BothThe Marriage of the Data Lake and the Data Warehouse and Why You Need Both
The Marriage of the Data Lake and the Data Warehouse and Why You Need Both
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Azure Data Factory v2
Azure Data Factory v2Azure Data Factory v2
Azure Data Factory v2
 
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
Keeping the Pulse of Your Data – Why You Need Data Observability to Improve D...
 
Linking Data Governance to Business Goals
Linking Data Governance to Business GoalsLinking Data Governance to Business Goals
Linking Data Governance to Business Goals
 
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...
 
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
 

Similar to Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors

Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
Government Technology and Services Coalition
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
Ignyte Assurance Platform
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
Government Technology and Services Coalition
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
Murray Security Services
 
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
William McBorrough
 
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdfA Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
Jack Nichelson
 
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last CallCybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Unanet
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Ignyte Assurance Platform
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
Citrin Cooperman
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
Robert E Jones
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
Unanet
 
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal ContractsGovernment Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
JSchaus & Associates
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
DaveNjoga1
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
Withum
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
Ignyte Assurance Platform
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
Highervista
 
CMMC 2.0 Explained: Impact for SMBs
CMMC 2.0 Explained:  Impact for SMBsCMMC 2.0 Explained:  Impact for SMBs
CMMC 2.0 Explained: Impact for SMBs
Ignyte Assurance Platform
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
Jack Nichelson
 

Similar to Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors (20)

Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdfA Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
 
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last CallCybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
 
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal ContractsGovernment Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
CMMC 2.0 Explained: Impact for SMBs
CMMC 2.0 Explained:  Impact for SMBsCMMC 2.0 Explained:  Impact for SMBs
CMMC 2.0 Explained: Impact for SMBs
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
 

More from JSchaus & Associates

2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
Federal Contractors Basic Marketing Guide
Federal Contractors Basic Marketing GuideFederal Contractors Basic Marketing Guide
Federal Contractors Basic Marketing Guide
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 35
2024: The FAR - Federal Acquisition Regulations, Part 352024: The FAR - Federal Acquisition Regulations, Part 35
2024: The FAR - Federal Acquisition Regulations, Part 35
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 332024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 33
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 192024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 19
JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 222024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 22
JSchaus & Associates
 

More from JSchaus & Associates (20)

2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
Federal Contractors Basic Marketing Guide
Federal Contractors Basic Marketing GuideFederal Contractors Basic Marketing Guide
Federal Contractors Basic Marketing Guide
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
2024: The FAR - Federal Acquisition Regulations, Part 35
2024: The FAR - Federal Acquisition Regulations, Part 352024: The FAR - Federal Acquisition Regulations, Part 35
2024: The FAR - Federal Acquisition Regulations, Part 35
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34
 
2024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 332024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 33
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
 
2024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 192024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 19
 
2024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 222024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 22
 

Recently uploaded

A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
Roger Valdez
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
viderakai
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
johnmarimigallon
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Christina Parmionova
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
Congressional Budget Office
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
elmerdalida001
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
OECDregions
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
ResolutionFoundation
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 

Recently uploaded (19)

A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 

Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors

  • 1. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Cybersecurity Compliance & Enforcement for Federal Contractors Friday, September 30, 2022 12pm EST
  • 2. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors About Jschaus & Associates: Ø Washington DC based Ø Consulting firm working with established Federal Contractors; Ø Webinars, Events, Conferences; Ø Newsletter – reaching 23K Federal Contractors; Ø 500+ Webinars on YouTube; Ø Advertising & Sponsor Opportunities
  • 3. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors About Arnold & Porter: Ø Top-ranked Government Contracts practice Ø Represent the entire spectrum of domestic and international government contractors: start-ups, Fortune 100 companies, and non-profits Ø Help address the increasingly complex cyber issues confronting commercial businesses, government contractors, and the special concerns associated with work for DoD and intelligence agencies
  • 4. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors MEET OUR SPEAKERS
  • 5. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Sonia Tabriz sonia.tabriz@arnoldporter.com 202.942.6574
  • 6. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Tom Pettit thomas.pettit@arnoldporter.com 202.942.6075
  • 7. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Agenda • Cybersecurity Requirements • CMMC Overview and Updates • Enforcement 7
  • 8. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CYBERSECURITY REQUIREMENTS 8
  • 9. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems • Applies to any information system “owned or operated by a contractor that processes, stores, or transmits” “federal contract information” (FCI) • FCI is any information “not intended for public release” obtained from or developed for the Government in the performance of a contract • Establishes baseline security standards, such as: • Identifying users, processes, and devices (e.g., personal identity verification (PIV)) • Limiting access to information systems to only authorized users, processes, and devices (e.g., mandating passwords, managing group policies, and maintaining the Windows Registry) • Installing and updating antivirus software and other protections against malicious code; scanning for malware • Regulating physical access to information systems and facilities 9
  • 10. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Applies to DoD contractors with information systems that will store, process, or transmit controlled unclassified information (CUI) collected, developed, received, transmitted, used, or stored by or on behalf of the contractors in support of the performance of the contract • Two key elements: security controls and cyber incident reporting • Security Controls • Implement security controls in NIST SP 800-171 • Document security controls in system security plan • Develop plan of action for any controls not implemented 10
  • 11. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Security Controls • NIST SP 800-171 compliance is generally a self-assessment system with a few caveats: • System security plans and plans of action can be (but typically are not) formal contract deliverables • Contractor must submit requests to vary from NIST SP 800-171 to the contracting officer for review by the DoD CIO • DIBCAC Assessments, DFARS 252.204-7019, and DFARS 252.204-7020 • Cloud Services • CSPs must meet security requirements equivalent to the Federal Risk and Authorization Management Program (FedRAMP) Moderate baseline 11
  • 12. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Cyber Incident Reporting • Cyber Incident: Actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein • Compromise: Disclosure of information to unauthorized persons or a violation of the security policy of a system and unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object or the copying of information to unauthorized media may have occurred • Adverse Effect: Not defined, but it could include, among other things, exfiltration, malware, DDoS attack, ransomware attack • Conduct a review, including assessing scope of cyber incident and impact on covered defense information as well as ability to provide operationally critical support • Must “rapidly” report cyber incidents through DIBNet 12
  • 13. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Cyber Incident Reporting • Submit malicious software to the DoD Cyber Crime Center • Preserve information (images of information systems and monitoring/packet capture data) for at least 90 days after reporting cyber incident • DoD has right to perform forensic analysis and damage assessment, and contractor must cooperate • Subcontract flow down 13
  • 14. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments • Apply to all solicitations and contracts that exceed the micro-purchase threshold and are not exclusively for the acquisition of commercially available off-the-shelf (COTS) items • Four Components: • Weighted Score • 110-point, weighted scoring system that measures the extent to which an offeror or contractor has implemented the NIST SP 800-171 security controls. • Standardized scoring methodology that assigns greater points to requirements that have greater impact on the security of the network and its data than others. • Confidence Levels • Basic Assessment/Low Confidence: Self-assessment and self-generated score • Medium Assessment/Confidence: DoD reviews Basic Assessment and associated documentation and discusses any concerns with the contractor • High Assessment/Confidence: Medium Assessment + verification, examination, and demonstration of SSP 14
  • 15. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments • Four Components: • Rebuttal and Adjudication: Contractor may, within 14 days, dispute any aspect of a DoD assessment • Reporting: Contractor must enter data into the Supplier Performance Risk System (summary level score, type of assessment, description of the SSP architecture, assessment date, and date when contractor will achieve perfect score) • American Fuel Cell & Coated Fabrics Co., B-420551, B-420551.2, June 2, 2022, 2022 CPD ¶ 139 15
  • 16. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC OVERVIEW AND UPDATES 16
  • 17. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Why CMMC? • DFARS 252.204-7012 relies on contractor self-assessments • There is no mandatory government oversight • DoD concluded that the “Scout’s Honor” system was ineffective • A 2018 National Defense Industrial Association (NDIA) survey revealed that 36% of contractors who responded were not aware of DFARS 252.204-7012, and 45% of the respondents admitted that they had never read NIST SP 800-171 • A 2019 NDIA survey revealed that only 56% of defense contractors were prepared for a DCMA assessment of NIST SP 800-171 compliance 17
  • 18. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • DoD determined that more must be done to harden the DIB's and defense supply chain's cyber infrastructure • Verification is not required • Industry surveys have indicated that many contractors are noncompliant • Cyber incidents have increased • CMMC 1.0 • Released in January 2020 • Five maturity levels (two transitional) and would have to be certified to be eligible for contracts incorporating CMMC requirements 18
  • 19. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • CMMC 2.0 • “Announced” in November 2021 • Streamlined requirements • CMMC-unique security practices removed • New iteration will have three maturity levels instead of five (CMMC 1.0 Levels 2 and 3 removed) • Level 1: Security controls for FCI • Level 2: 110 NIST SP 800-171 security controls for CUI • Level 3: 110 NIST SP 800-171 security controls for CUI, plus some subset of NIST SP 800-172 • Plans of action generally not allowed, with exceptions only for minor noncompliance 19
  • 20. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • Assessments • Level 1 is achieved through a self assessment and attestation of compliance • Level 2 generally requires third-party assessments through accredited CMMC Third Party Assessment Organizations (C3PAOs), but self-assessments are permitted if contract requirements do not involve information critical to national security • Level 3 must be assessed by USG officials • Interim rule is expected around March 2023, and CMMC may be incorporated into solicitations and RFIs shortly thereafter 20
  • 21. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors ENFORCEMENT 21
  • 22. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Contract-Based Remedies • In June 2022, DoD issued a memorandum reminding Contracting Officers of available contract-based remedies for noncompliance with DFARS 252.204-7012 and the corresponding NIST SP 800-171 requirements 22
  • 23. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • In October 2021, the Department of Justice (DoJ) announced a new Civil Cyber-Fraud Initiative that leverages the False Claims Act (FCA) to combat cyber threats • Deputy Attorney General Lisa O. Monaco stated: • “For too long, companies have chosen silence under the mistaken belief that it is less risky to hide a breach than to bring it forward and to report it. Well that changes today. We are announcing today that we will use our civil enforcement tools to pursue companies, those who are government contractors who receive federal funds, when they fail to follow required cybersecurity standards — because we know that puts all of us at risk. This is a tool that we have to ensure that taxpayer dollars are used appropriately and guard the public fisc and public trust.” • In a recent Comprehensive Cyber Review report, DOJ confirmed that it plans to “lead the effort to enforce cybersecurity requirements on federal contractors and grantees” and further announced its desire to participate in developing those requirements 23
  • 24. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • DoJ has identified the following benefits of the Civil Cyber-Fraud Initiative: • Building broad resiliency against cybersecurity intrusions across the government, the public sector and key industry partners • Holding contractors and grantees to their commitments to protect government information and infrastructure • Supporting government experts’ efforts to timely identify, create and publicize patches for vulnerabilities in commonly-used information technology products and services • Ensuring that companies that follow the rules and invest in meeting cybersecurity requirements are not at a competitive disadvantage • Reimbursing the government and the taxpayers for the losses incurred when companies fail to satisfy their cybersecurity obligations • Improving overall cybersecurity practices that will benefit the government, private users and the American public 24
  • 25. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • DoJ has stated that the following types of contracts will be the focus of its enforcement efforts: • Software and hardware procurement • Developing, implementing or maintaining IT systems owned by the federal government • Use of the contractor’s IT systems, especially if the systems maintain government data • Cloud services • Contracts that incorporate a regulatory, statutory or contractual requirement to monitor and report a cyber breach or incident • DoJ has also stated that it expects qui tam relators to play a significant role in implementing the Civil Cyber-Fraud Initiative • DoJ has already announced results of its enforcement efforts 25
  • 26. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Other Potential Risks • Bid protest litigation • Subcontract flow down negotiations and disputes • Suspension and debarment 26
  • 27. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors QUESTIONS? Please Contact Our Speakers: Sonia Tabriz sonia.tabriz@arnoldporter.com 202.942.6574 Tom Pettit thomas.pettit@arnoldporter.com 202.942.6574 27
  • 28. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors THANK YOU FOR ATTENDING 28