Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
W HO A RE W E A group consisting of grant managers, financial specialists, government administrators and associated employees of the State of Florida.
CENTRAL CONTRACTOR REGISTRATION (CAGE CODES) DFARS Case 2003-D040 DFARS Parts 204, 212, 213 and 252 are amended to remove policy on Central Contractor.
The new Hungarian cybersecurity landscape Dr. Ferenc Suba Vice-Chair, European Network and Information Security Agency Chairman, National CERT Working.
National Infrastructure Protection Plan
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Office for Domestic Preparedness Overview Briefing National Governors Association March 13, 2003 Department of Homeland Security Andrew T. Mitchell Acting.
Federal Protective Service National Protection and Programs Directorate U.S. Department of Homeland Security 2010 Gary W. Schenkel Director.
Office of Technology Partnerships September 17, 2007 State and Local Collaboration Michigan’s Cross Boundary Program.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
2012 Outlook for Federal Contractors Kevin Plexico Vice President, Federal Information Services Deltek, Inc. September 15, 2011.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
1 Amy Williams, Senior Procurement Analyst February 5, 2008 Defense Acquisition Regulations System
Seán Paul McGurk National Cybersecurity and Communications
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT Alan Chvotkin Senior Vice President and Counsel Professional Services Council DEFENSE ACQUISITION.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
0 ©2009 KPMG LLP, a U.S. limited liability partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International,
DEPARTMENT OF MANAGEMENT SERVICES OFFICE OF INSPECTOR GENERAL.
Stepped Up ERM Teresa McKay Director, Defense Finance and Accounting Service ASMC Washington Chapter September 17, 2008.
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Veterans Health Administration Shared Training Partnerships June 4, 2009.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
Homeland Security UNCLASSIFIED Executive Order Presidential Policy Directive (PPD) - 21 Implementing the Presidential Executive Order (EO) on cybersecurity.
2 2 Eleanor Spector Vice President, Contracts Lockheed Martin Corporation August 5, :30-10:15AM Industry Acquisition Issues.
Houston Emergency Center FY12 Budget Presentation June 8, 2011 Dennis J. Storemski, Director Mayor’s Office of Public Safety and Homeland Security David.
Office of Management & Budget Office of Federal Procurement Policy Breaking News May 2011.
Contract Management Body of Knowledge Pre-Award Competencies Section 1.1 Laws and Regulations Part 2 Pre-Award Competencies Section 1.1 Laws and Regulations.
Of XX Government Contracts Statutes, Regulations, Executive Orders and Policies Rand Allen, Partner, Wiley Rein LLP ©2015 PubKLearning. All rights reserved.1.
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
Students will be educated annually about appropriate online behavior, including interacting with other individuals on social networking websites and in.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Integrity: Vendor’s Role Christian Laverdure Senior Director Policy, Risk, Integrity and Strategic Management Sector Acquisitions Branch Public Works and.
Cybersecurity : Optimal Approach for PSAPs
Ms. Sandra Stanar-Johnson
Of XX Cybersecurity in Government Contracting, Acquisition and Procurement Nicholas R. Schacht ©2015 PubKLearning. All rights reserved.1 KnowCyber improves.
Cyndi Dawson, MPA Policy Advisor September 22, 2015 ©Ana Ponza © CA Marine Sanctuary Foundation © Michelle Hoalton Marine Protected Area Statewide Leadership.
OMB Memorandum M Implementation of the Government Charge Card Abuse Prevention Act of 2012 (Charge Card Act) September 2013.
Of XX Data Rights, Intellectual Property, Information Technology and Export Controls in Government Contracting Fernand Lavallee, Partner, Jones Day ©2015.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
 Section 808(d) of the Fair Housing Act, as amended, provides:  All executive departments and agencies shall administer their programs and activities.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Overview September 2015 Centers of Excellence and Expertise.
Office for Domestic Preparedness Overview Briefing Bob Johns Branch Chief State and Local Program Management Division June 4, 2003 Department of Homeland.
Final HIPAA-HITECH Rules, Cybersecurity, and Privacy Dino TsibourisMehmet Munur (614) (614)
CO – CART Project Status Protocol Revision Subcommittee Update 08/17/2006.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
Role Responsibilities
ICT for Masses New Environment Opportunities and Threats
Small Business Committee
DoD Cyberspace Workforce Definitions
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
California Cybersecurity Integration Center (Cal-CSIC)
Know Your Revised Alternate Security Program (ASP) Jen Wilk
DoD Cyberspace Workforce Definitions
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
2018 NOHA Business Summit Conference
Perspectives on Defense Cyber Issues
Presentation transcript:

of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1 Carl Levin and Howard P. “Buck” McKeon National Defense Authorization Act for FY 2015, Pub. L. No , 128 Stat (Dec. 19, 2014) –37 procurement related provisions –Includes cyber incident reporting, unallowable cost issues, prohibitions on contracting with the enemy, IT acquisition planning revisions, and expansion of whistleblower protections Cybersecurity Enhancement Act of 2014, Pub. L. No , 128 Stat (Dec. 18, 2014) –Encourages cyber threat information sharing by establishing a Public-Private Collaboration on Cybersecurity –Authorizes Government to support research, raise public awareness of cyber risks, and improve the nation’s cybersecurity workforce National Cybersecurity Protection Act of 2014, Pub. L. No , 128 Stat (Dec. 18, 2014) –Establishes National Cybersecurity and Communications Integration Center in the Department of Homeland Security

of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.2 Cybersecurity Workforce Assessment Act, Pub. L. No , 128 Stat (Dec. 18, 2014) –Directs the Secretary of Homeland Security to conduct an assessment of the cybersecurity workforce of the Department of Homeland Security and establish an agency workforce strategy within one year of enactment Intelligence Authorization Act of FY15, Pub. L. No , 128 Stat (Dec. 19, 2014) –Requires the Director of National Intelligence to develop a comprehensive national intelligence strategy, develop a plan for the management of the intelligence community, and report on the status of reducing administrative costs for the intelligence community Federal Information Security Modernization Act of 2014, Pub. L. No , 128 Stat (Dec. 18, 2014) –Updates 2002 Federal Information Security Modernization Act (FISMA) –Delegates implementation authority for defense-related and intelligence-related information security

of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.3 Consolidated and Further Continuing Appropriations Act, 2015, Pub. L. No , 128 Stat (Dec. 16, 2014) –Prohibits the appropriation of federal funds on future government contracts whose confidentiality policies restrict employees from reporting fraud, waste, or abuse to investigative agencies –Requires certain agencies to assess risk of cyberespionage before acquiring IT systems Statutes Proposed for FY 2016 (as of September 14, 2015) –National Defense Authorization Act 2016 (H.R. 1735) –Protecting Cyber Networks Act (PCNA) (H.R. 1560) –Cybersecurity Information Sharing Act (S.754) –Intelligence Authorization Act for Fiscal Year 2016 (H.R.2596)