SBA’s Final Rule Is Here: Key Takeaways on Updates to HUBZone Program, Other Small Business Programs, and Various Small Business Matters
Analyzing the Overlap Between CFIUS and FOCI
A Comprehensive Overview of FOCI Mitigation
Preparing for — and Surviving — an OFCCP Audit
12 Days of Regulatory Insights: Day 4 - A Focus on the FCA – Regulatory Oversight Podcast
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Mitigating FOCI Under Section 847
Podcast - Staying Compliant When Sharing Employees or Services
Corruption, Crime & Compliance: Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Navigating Bid Protest Choices at GAO and COFC
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Podcast - Discussing a DOJ Lawsuit Under the Civil-Fraud Initiative
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
DE Talk | If It’s Not in Writing, It Never Happened: Applicant Tracking & Recordkeeping Strategies to Ensure OFCCP Compliance
Podcast - Cybersecurity Roundup: Analyzing New and Proposed Rules for Contractors
Understanding FOCI Mitigation
Work This Way: A Labor & Employment Law Podcast - Episode 28: Construction Compliance with Joan Moore and Mim Munzel of The Arbor Consulting Group
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
To kick off the New Year (and as is now tradition, since we put out a similar Recap & Forecast last year), Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2024...more
Merger and acquisition (M&A) activity is often the lifeblood of corporate growth. While whole treatises can be, and have been, written on cybersecurity and legal challenges during M&A activity, the following are a few key...more
WHAT: The U.S. Department of Defense (DOD) just published the second of two proposed rules setting forth key requirements for its long-anticipated Cybersecurity Maturity Model Certification (CMMC) 2.0 program. The earlier...more
On December 21, 2023, the Department of Defense (DoD) issued a memorandum (Memo) providing guidance and clarification on the security and cyber incident management requirements applicable for the use of external Cloud Service...more
The legislation would require all federal contractors to report potential and actual cybersecurity incidents to the Department of Homeland Security. The Act would impose a 24-hour reporting requirement on federal...more
The Department of Defense (DoD) continues to enhance cybersecurity requirements in its supply chain. A new rule requires some contractors to assign a numerical score to their current cybersecurity practices. Additionally, the...more
From the comfort of your own home office, join us at ACI's virtual Annual Advanced Forum on DCAA & DCMA Cost, Pricing, Compliance & Audits taking place on August 25-26, 2020 which addresses the latest developments on business...more
In the face of increasing concern over the security of Navy and Marine Corps (Navy) programs, the Navy Marine Corps Acquisition Regulation Supplement (NMCARS) was updated on September 6, 2019 to incorporate significant...more