On August 15, 2024, the Department of Defense (DoD) published a proposed rule to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to incorporate contractual requirements related to the Cybersecurity Maturity Model Certification (CMMC) 2.0 program rule. The CMMC 2.0 program provides a framework for assessing contractor implementation of cybersecurity requirements and enhancing the protection
Supply Chain
Round-Up: Proscriptive ICTS Supply Chain Regulation as a Means of Addressing Cyber Risk
Cybersecurity Awareness Month is a good time to highlight one trend in federal efforts to address cyber risk: proscriptive regulation of the information and communications technology and services (“ICTS”) supply chain.
Supply chain risk management is a broad field encompassing, among other things, federal efforts to improve software security, and proposals to revise the FAR…
Trends for Technology Transactions
In the 2022 edition of our long-running annual podcast, partners in Mayer Brown’s Technology Transactions practice will discuss trends that will drive and shape technology transactions. This year’s program will focus on convergence of cloud, AI and data; innovation through new and complex collaborations; continued change in cybersecurity and privacy laws and priorities; increasing focus…
Cyber Spotlight: Managing Cyber Legal Risks to Industrial Systems
What are the key priorities for businesses as they face cyber threats to industrial systems, including in manufacturing, infrastructure and other critical contexts? This panel, featuring in-house leaders from prominent multinational businesses, will address the practical tools used to manage industrial cyber risk and associated legal risk, including:
- Assessing industrial cyber risk
- Ensuring effective internal
…
President Biden’s Impact on the US-Sino Relationship
The Cyber Executive Order: What You Need to Know in 30 Minutes
Issued against the backdrop of recent high-profile cyber incidents, President Biden’s Executive Order on Improving the Nation’s Cybersecurity sets forth ambitious initiatives and aggressive timelines for strengthening the cybersecurity of the federal government and the companies with which it does business. Critically, it also seeks to shape cyber practices across the economy more broadly, including…
President Biden Issues Executive Order to Improve Nation’s Cybersecurity
President Biden issued the Executive Order on Improving the Nation’s Cybersecurity (“Cyber EO”) on May 12, 2021. The Cyber EO is ambitious in scope and sets aggressive timelines for its implementation. It seeks to both strengthen the cybersecurity of the federal government and push the private sector to further strengthen its approach to cybersecurity. Indeed,…
Data Protection Developments in Europe – Supply Chain and Distribution
In an increasingly interconnected world, preserving the free flow of data across borders is crucial to the prosperity of businesses operating in every industry. But over the last year, there have been a number of important data protection developments in Europe that have a direct impact on the supply chain and distribution arrangements operated by…
Managing OT Cyber Risk: Lessons from the Front Lines
Cyber attacks continue to grow against the wide range of industries that rely on connected systems to manufacture products, monitor industrial processes, operate critical infrastructure and perform countless other sensitive processes. These attacks against industrial systems—generally referred to as “Operational Technology” (OT)—threaten to stop production, impair the integrity of safety-critical systems or even cause physical…
Building a Trusted Supply Chain: The Threats and Challenges Ahead A View from the Cyberspace Solarium Commission
On October 19, 2020, the Cyberspace Solarium Commission released a new white paper, “Building a Trusted ICT Supply Chain.” Join us for a discussion of the threats identified, the challenges ahead, and the Solarium Commission’s recommendations as how to protect and promote a trusted supply chain.
To view this webinar, please visit the event website