Tag Archives: regulations

How COVID-19 Outbreak Affects DoD CMMC Implementation; Katie Arrington Quoted

blank

Katie Arrington, 2020 Wash100 Award recipient and the chief information security officer for the Department of Defense (DoD) acquisition, stated that training of third party assessors for the Cybersecurity Maturity Model Certification (CMMC) program was slated to start in mid-April, but the coronavirus (COVID-19) outbreak may affect the projected implementation. 

Read More »

A Look Into CMMC Maturity Framework and its 5 Levels

blank

In January, the U.S. Department of Defense released Version 1.0 of its Cybersecurity Maturity Model Certification framework (CMMC). By 2026, DoD plans to require CMMC certification for all defense contracts. Contractors in the defense industry supply chain will be required to develop, assess, and augment cybersecurity practices, earning different maturity levels. 

Read More »

DoD Announced Designated “Protected Information” Under CMMC Regulations

blank

In January, the U.S. Department of Defense released Version 1.0 of its Cybersecurity Maturity Model Certification framework. By 2026, DoD plans to require CMMC certification for all defense contracts. Contractors in the defense industry supply chain will be required to develop, assess, and augment cybersecurity practices.

Read More »

How will CMMC Directly Affect Defense Contractors: What You Need to Stay Informed as Regulations Change; Katie Arrington Quoted

blank

The Department of Defense (DoD) has noted that cybersecurity requirements for the Department of Defense contractors will view the model as being in a “constant state of evolution” over the next few years, so what can contractors do to keep up with the current changes? 

Read More »

From NIST Information Security Guidelines to CMMC: What Do the New Regulations Entail?

blank

With the Department of Defense’s (DoD) new security regulations around the corner, it is imperative for government contractors to stay up to date with how the guidelines and expectations have shifted from NIST SP 800-171 and NIST SP 800-53 to Cybersecurity Maturity Model Certification (CMMC).

Read More »

K2 FIN Launch CFIUS Advisory Services to Help Navigate CFIUS/FIRRMA National Security Requirements; Robert Brenner, Juan Zarate Quoted

blank

K2 Intelligence and Financial Integrity Network (FIN) has unveiled CFIUS Advisory Services to help clients with investments, mergers and acquisitions that involve the Committee on Foreign Investment in the United States (CFIUS) and foreign investment review tools outside of the United States, the company announced on Wednesday.

Read More »

Ajit Pai Planning to Revise FCC’s Smallsat Application Procedures

blank

Ajit Pai, chairman of the Federal Communications Commission, said that he seeks to simplify the approval process for satellites below 400 pounds during a Chamber of Commerce event, FCW reported Tuesday. Pai noted that small satellites have the potential to expand broadband access to underserved areas and that the streamlined application process will promote better spectrum use while also mitigating radiofrequency interference.

Read More »

NIST Releases Risk Management Guide for Internet of Things Devices

blank

The National Institute of Standards and Technology's Computer Security Resource Center released a publication on internet of things risk management. The document, entitled "Considerations for Managing IoT Cybersecurity and Privacy Risks," is intended to help federal employees understand and handle IoT risks affecting privacy and cybersecurity across a device's life cycle, the agency said.

Read More »

Sen. Josh Hawley Intros 2019 China Tech Transfer Control Act

blank

Sen. Josh Hawley, R-Mo., introduced a bill to exert more control on U.S. exports to China and admonish the latter for trade practices intended to exploit American technology. Hawley’s office said in a statement published Tuesday that the 2019 China Technology Transfer Control Act intends to prevent China from acquiring U.S. intellectual property to develop its military capabilities. 

Read More »