Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
Marti Arvin and Anthony Buenger on the CMMC Framework
ITAR for Facility Security Officers
Jones Day Talks: Navigating Foreign Direct Investment in Germany
Bribery & Corruption in the Military. A Front-Line View (Part II)
Bribery & Corruption in the Military. A Front-Line View (Part I)
The U.S. and the U.K. are focused on common national security risks, including preventing foreign access to key emerging technologies, the integrity of the defense supply chain, protection of critical infrastructure, and...more
The 10th episode of "Are We All Clear? Facilitating Security Clearances" explores the mitigation of foreign ownership, control or influence (FOCI) in a cleared company. Host Molly O'Casey and International Trade attorney...more
Concerns regarding the integrity of the U.S. defense industrial base supply chain continue to grow. Similar to national cybersecurity risks, national security risks to the defense supply chain are asymmetric and can arise at...more
Current and future U.S. defense contractors, and entities interested in acquiring these contractors, should prepare for increased regulatory scrutiny of mergers and acquisitions (M&A) transactions. Congress is signaling that...more
On Jan. 11, the Department of Defense (DOD) released its first-ever National Defense Industrial Strategy (NDIS). The NDIS outlines a multifaceted approach to strengthen U.S. defense capabilities, innovation and global defense...more
Welcome to Holland & Knight's monthly defense news update. We are excited to bring you the latest in defense policy, regulatory updates and other significant developments....more
In this episode of "Regulatory Phishing," former U.S. Department of Defense Chief Information Security Officer (CISO) Katie Arrington joins Government Contracts and Cybersecurity attorney Eric Crusius to discuss the state of...more
In this episode of "Regulatory Phishing," government contracts and cybersecurity attorney Eric Crusius examines the newly released Cybersecurity Maturity Model Certification (CMMC) program documents. Mr. Crusius breaks down...more
The U.S. Department of Defense (DOD) has finalized a proposed rule authorizing the acquisition of commercial products and services using general solicitation competitive procedures known as a "commercial solutions opening"...more
Welcome to Holland & Knight's monthly defense news update. We are excited to bring you the latest in defense policy, regulatory updates and other significant developments. ...more
The Cybersecurity Maturity Model Certification (CMMC) program, first announced in 2019 by the Department of Defense (DoD), aims to enhance the cybersecurity profile of DoD contractors. The original iteration of DoD’s...more
Welcome to Holland & Knight's monthly defense news update. We are excited to bring you the latest in defense policy, regulatory updates and other significant developments. Legislative Updates: - General Congressional...more
Amid the 4,000 pages of provisions in the recently enacted Fiscal Year 2023 National Defense Authorization Act (NDAA) are prohibitions and associated requirements relating to the federal procurement of certain Chinese...more
ACI’s 5th National Forum on FOCI is back IN PERSON this September! Don’t miss the only comprehensive, practical FOCI event of its kind. The Defense Counterintelligence Security Agency (DCSA) is heightening its scrutiny and...more
Even a layperson understands that the U.S. government regulates the export of military hardware. Defense contractors involved in such international transactions adhere to the International Traffic in Arms Regulation, or ITAR...more
With the announcement of a revamped Cybersecurity Maturity Model Certification (known as CMMC 2.0),1 for the third time in five years, the U.S. Department of Defense (DOD) announced new, comprehensive cybersecurity standards...more
In today’s world, companies in various industries are increasingly running into issues that have national security implications. Research universities and other academic institutions can face issues involving national...more
Tom McVey and Rosanne Jacuzzi of Williams Mullen discuss important issues under ITAR and EAR for FSOs and other compliance professionals, including requirements under the law and strategies for compliance....more
[co-authors: Alex Monié, Policy Advisor and Gabriel Harrison, Public Policy Specialist] The annual “must-pass” defense authorization legislation contains provisions to address supply chain domestication in light of the...more
The US Department of the Treasury recently began accepting loan applications from qualifying Defense Industrial Base contractors, with a short deadline of May 1, 2020, to submit the application for expedited review....more
On January 30, 2020, the U.S. Department of Defense (“DoD”) released Version 1.0 of its Cybersecurity Maturity Model Certification (“CMMC”) framework (CMMC overview here; CMMC Version 1.0 and appendices here). By 2026, DoD...more
Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more
The Department of Defense (DoD) is planning to release Volume 1.0 of the Cyber Maturity Model Certification (CMMC) framework, which will affect the award and continued performance of all DoD contracts. In response to the...more
On November 25, 2019, the Government Accountability Office (“GAO”) published a report examining the financial and nonfinancial fraud and national security risks to the Department of Defense (“DoD”) when contractors employ...more