Latest Posts › Supply Chain

Share:

Get Ahead Of Compliance: The Proposed Rule For The Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!

As a lawyer working in a firm with a sophisticated legal team providing robust regulatory, government contract, and cybersecurity services, our Christmas present and holiday reading arrived early with the publication of the...more

Updating Government Contracting Documents for Cybersecurity

This article is the third and final installment in a series of articles about how lawyers can better serve their clients by involving themselves in cybersecurity planning at an early stage. Just like Return of the Jedi was...more

Supply Chain Vulnerability in the Healthcare Industry

The healthcare industry possesses invaluable data in the forms of patient health information, personal identifying information, and payment card information. The industry is a treasure trove of information to be exploited by...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide