Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
Marti Arvin and Anthony Buenger on the CMMC Framework
ITAR for Facility Security Officers
Jones Day Talks: Navigating Foreign Direct Investment in Germany
Bribery & Corruption in the Military. A Front-Line View (Part II)
Bribery & Corruption in the Military. A Front-Line View (Part I)
The U.S. Department of Defense (DOD) issued the proposed Defense Federal Acquisition Regulation Supplement (DFARS) rules that will implement the Cybersecurity Maturity Model Certification (CMMC) program. These rules, which...more
In an era where digital threats are ever-evolving, ensuring the security of sensitive government data is paramount, especially for government contractors working on defense contracts. Join PilieroMazza’s Cy Alba and Daniel...more
For over a year now, federal defense contractors have been required to comply with Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident...more
While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more
On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more