Photo of Luke Levasseur

Luke Levasseur’s litigation practice focuses on government contract matters. He advises and represents clients regarding federal procurement practices and activities. For the past several years, Luke’s practice has focused on litigating large contract disputes and bid protests before the US Court of Federal Claims and the Government Accountability Office. He has also represented clients and performed substantial work with respect to False Claims Act litigation. Luke also has experience handling a variety of other federal court litigation for clients, involving such matters as antitrust claims, a trademark dispute and alleged fraud.

Read Luke's full bio.

Last week, the government announced two sets of proposed revisions to the Federal Acquisition Regulation (FAR) to improve the cybersecurity of the government’s information systems. Both sets of revisions relate to President Biden’s May 2021 Executive Order 14028 on Improving the Nation’s Cybersecurity.

First, the Department of Defense (DoD), the General Services Administration

Cyber threats continue to evolve, and data privacy considerations continue to grow more complex. Whether defending against global ransomware campaigns or adjusting to new legal regimes governing international data transfers, companies of all sizes today face unprecedented cybersecurity and data privacy challenges.

Our practical guide, Staying Ahead of the Curve: Cybersecurity and Data Privacy—Hot Topics

Cybersecurity and data privacy issues continued to grow in significance for multinational businesses over the past 12 months, further heightening the importance of preparing and responding in a strategic, coordinated and enterprise-wide manner in 2017.

The Trump administration has publicly provided limited details so far about its plans for cybersecurity and data privacy policy. Reports

Companies across industry sectors have developed risk-based cybersecurity programs to respond to the substantial and complex cyber threats they face. Managing regulatory risk has become an important element of these cybersecurity programs, as regulators use rules, enforcement actions, and guidance to establish an increasingly complex framework of regulatory expectations.

This 80-page book offers insights on