On August 15, 2024, the Department of Defense (DoD) published a proposed rule to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to incorporate contractual requirements related to the Cybersecurity Maturity Model Certification (CMMC) 2.0 program rule. The CMMC 2.0 program provides a framework for assessing contractor implementation of cybersecurity requirements and enhancing the protection

Cybersecurity Awareness Month is a good time to highlight one trend in federal efforts to address cyber risk: proscriptive regulation of the information and communications technology and services (“ICTS”) supply chain.

Supply chain risk management is a broad field encompassing, among other things, federal efforts to improve software security, and proposals to revise the FAR

In the 2022 edition of our long-running annual podcast, partners in Mayer Brown’s Technology Transactions practice will discuss trends that will drive and shape technology transactions. This year’s program will focus on convergence of cloud, AI and data; innovation through new and complex collaborations; continued change in cybersecurity and privacy laws and priorities; increasing focus

What are the key priorities for businesses as they face cyber threats to industrial systems, including in manufacturing, infrastructure and other critical contexts? This panel, featuring in-house leaders from prominent multinational businesses, will address the practical tools used to manage industrial cyber risk and associated legal risk, including:

  • Assessing industrial cyber risk
  • Ensuring effective internal

Issued against the backdrop of recent high-profile cyber incidents, President Biden’s Executive Order on Improving the Nation’s Cybersecurity sets forth ambitious initiatives and aggressive timelines for strengthening the cybersecurity of the federal government and the companies with which it does business. Critically, it also seeks to shape cyber practices across the economy more broadly, including

President Biden issued the Executive Order on Improving the Nation’s Cybersecurity (“Cyber EO”) on May 12, 2021. The Cyber EO is ambitious in scope and sets aggressive timelines for its implementation. It seeks to both strengthen the cybersecurity of the federal government and push the private sector to further strengthen its approach to cybersecurity. Indeed,

In an increasingly interconnected world, preserving the free flow of data across borders is crucial to the prosperity of businesses operating in every industry. But over the last year, there have been a number of important data protection developments in Europe that have a direct impact on the supply chain and distribution arrangements operated by

Cyber attacks continue to grow against the wide range of industries that rely on connected systems to manufacture products, monitor industrial processes, operate critical infrastructure and perform countless other sensitive processes. These attacks against industrial systems—generally referred to as “Operational Technology” (OT)—threaten to stop production, impair the integrity of safety-critical systems or even cause physical

On October 19, 2020, the Cyberspace Solarium Commission released a new white paper, “Building a Trusted ICT Supply Chain.” Join us for a discussion of the threats identified, the challenges ahead, and the Solarium Commission’s recommendations as how to protect and promote a trusted supply chain.

To view this webinar, please visit the event website