November 20, (Via DFARS Case 2013-D018)

Size: px
Start display at page:

Download "November 20, (Via DFARS Case 2013-D018)"

Transcription

1 November 20, 2015 (Via DFARS Case 2013-D018) Mr. Dustin Pitsch Defense Acquisition Regulations System OUSD(AT&L)DPAP/DARS Room 3B Defense Pentagon Washington, DC Subject: Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018); Docket No. DARS Dear Mr. Pitsch: The U.S. Chamber of Commerce, the world s largest business federation representing the interests of more than 3 million businesses of all sizes, sectors, and regions, as well as state and local chambers and industry associations, and dedicated to promoting, protecting, and defending America s free enterprise system, appreciates the opportunity to comment on the Department of Defense s (DoD s) interim rule tied to implementing portions of recent National Defense Authorization Acts (NDAAs). The interim rule became effective on August 26, 2015, without adequate public input. 1 The NDAAs amend the Defense Federal Acquisition Regulation Supplement (DFARS) in two primary ways. The interim rule requires contractors and subcontractors to report cyber incidents that result in an actual or potentially adverse effect on a covered contractor information system or covered defense information... or on a contractor s ability to provide operationally critical support. In addition, this regulation also implements DoD policies and procedures for use when contracting for cloud computing services (Federal Register (FR) 51739). The Chamber does not attempt to address all roughly nine topics listed in the Discussion and Analysis section of DoD s notice (FR ). However, we try to explain our 1

2 2 concerns with the DFARS changes and ask questions that we urge DoD officials to address. The Chamber s letter emphasizes a half-dozen points, which we believe are crucial for Pentagon officials to consider in their decision making about next steps. Requiring Contractors to Comply Automatically With Dozens of New Security Controls Is Unrealistic and Costly The interim rule states that the security requirements in the National Institute of Standards and Technology (NIST) Special Publication (SP) Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST SP ) are mandatory for contractors to use at the time a solicitation is issued or as determined by a DoD contracting official (FR 51470). The Chamber believes that it is highly unrealistic for DoD to assert that contractors can swiftly implement the approximately 109 requirements referenced in the interim rule. Compliance with 109 new requirements contained in NIST SP must be implemented enterprise-wide by contractors as well as at DoD program levels. This will take substantial time and resources to accomplish. The interim rule specifically clause imposes security controls based on NIST SP , replacing the security requirement in NIST SP , Security and Privacy Controls for Federal Information Systems and Organizations. 2 The Council of Defense and Space Industry Associations (CODSIA s) comment letter captures that contractors will be compliant with some, but not all, of the required security controls in NIST SP Contractors will fully comply with 39 of the NIST SP requirements, will only partially comply with 22 of the NIST SP requirements, and will face 48 entirely new NIST SP requirements. Thus, of the new 109 security controls, contractors will have to grapple with 70 new or partially new requirements nearly two-thirds of the 109 security controls that need interpretation and implementation to meet the terms of Pentagon contracts. 3 The Chamber wants to underscore to DoD the significant resources it will take for industry to rapidly comply with dozens of requirements in the interim rule. Companies cannot 2 On September 10, 2015, the Chamber commented on OMB s proposed guidance memorandum Improving Cybersecurity Protections in Federal Acquisitions (guidance). The guidance focuses on implementing cybersecurity protections in federal acquisitions for products and services that collect, store, and provide access to controlled unclassified information (CUI) on behalf of government agencies. The Chamber s primary recommendation, which is applicable to DoD s interim rule, was that the guidance should be based on a maturity model allowing contractors to progress from one implementation tier to another to protect CUI. Also, OMB guidance needs to be dynamic and not become an ossified checklist of requirements that fails to respond to actual threats to agencies and contractors information networks and systems. Our organization offered critiques of the guidance sections, including stressing that agencies should develop workable means of improving the cybersecurity of federal information held by contractors and subcontractors through clear and mutually agreed upon solutions. The Chamber s letter is available at 3 The Chamber signed the November 13, 2015, CODSIA letter commenting on DoD s proposed rule and supports its recommendations. CODSIA s substantial letter, led by the Information Technology Alliance for Public Sector (ITAPS), is available at

3 3 simply flip a switch and automatically adhere to the new controls, as the interim rule apparently presumes. At a time of sequestration and additional public pressure to lower federal acquisition costs, the way in which the interim rule is written will likely serve to heighten the costs of Pentagon contracting programs. Deviating From Prescribed Controls: Allowing Alternative Security Measures Within a Certain Interval Would Be a Prudent Approach Subsections (c) and (d) of DFARS Compliance With Safeguarding Covered Defense Information Controls of the interim rule grant contractors the ability to request a deviation(s) from the security requirements in NIST SP The subsections also allow DoD s chief information officer (CIO) to approve or disapprove such requests or alternatives but equally effective security measures prior to contract award (FR ). Enabling the CIO to issue a decision at any time before awarding a contract could complicate procurements. For instance, an otherwise capable offeror may be deemed nonresponsive at the final moments of contract negotiations after neither the company nor DoD has time to address deviation-related issues through discussions or an amended proposal. Relatively hasty decision making could impact DoD s ability to obtain the best value in the acquisition market, especially when the offeror requesting a deviation could have fully implemented the NIST SP requirements with adequate time and resources. The Chamber recommends that DoD policy should be clarified. The interim rule should feature a time limit for the CIO or his or her authorized representative to approve or disapprove offerors deviation requests. Under the interim rule, determinations about whether deviations will be granted are seemingly arbitrary, so requests could go unaddressed for any length of time. The Chamber s impression is that many companies could end up seeking deviations from NIST SP controls in order to be responsive to acquisition requirements. A surge of deviation requests could become overwhelming for DoD to manage, thus undercutting officials intentions to complete contracts in short order. The Chamber believes that a certain period be made for the DoD CIO to consider a contractor s (1) deviation(s) from a particular security control or (2) alternative security measures. Deviation requests that go unanswered after a reasonable, established period should be presumed to be approved by the DoD CIO. The interim rule is vague about how a deviation request could impact the evaluation of offerors proposals. It is also unclear from the interim rule if subcontractors should request deviations directly through DoD or through the prime contractor and what, if any, role the process includes for the prime contractor in requesting deviations. The interim rule seemingly requires contractors to request a deviation every time a proposal is submitted. This transactionspecific requirement would place an inordinate strain and burden on both the DoD CIO and contractors. It would be more efficient and economical to allow contractors to receive a single blanket approval of their systems that would apply across many contracts with DoD for a specified period of time.

4 4 Such an approval process would lighten the regulatory burden on the DoD CIO and afford contractors insight into whether their request for deviation would be granted in advance of proposal submission. It would similarly provide some predictability to contractors investing bid and proposal funds into federal competitions. DoD should consider creating a preapproval designation or a certification of compliance for vendors that voluntarily seek approval in advance of looking for DoD contract work. Such a mechanism would reduce the burden on DoD and companies in the defense industrial base (DIB), which are likely to search for and receive approval prior to implementing an alternative security measure. DoD should clarify what factors it will take into account when processing deviation requests. The DoD CIO should issue guidance on how the department would approve or disapprove deviations and alternative security measures. The interim rule should say that agencies and departments shall not downgrade companies proposals or basically penalize offerors for requesting and being granted deviation authority. Guidance would be helpful to ensure consistency across offerors deviation requests and DoD s decision making. Providing such guidance would enable offerors to better prepare their requests and would establish reasonable criteria for contractors, subcontractors, and the DoD CIO to leverage. Establishing a safe harbor to help contractors comply with the DFARS requirements and mitigate cyber risks would help ensure that the interim rule does not create an undue burden or liability exposure for industry. The Chamber seeks clarity on why DFARS and are separate clauses. DFARS requires compliance with DFARS , except to the extent that an authorized representative of the DoD CIO approves a deviation. Any deviation from the requirements set forth in DFARS should occur in DFARS to ensure that they apply to the requirements in that clause. A Widespread Incident Reporting Regime Will Prove Unwieldy The interim rule mandates new reporting procedures by contractors. The new regulations increase both the scope of information networks and systems that contractors must apply security controls as well as the circumstances in which contractors must report incidents. The interim rule will create conflicts and confusion regarding other reporting requirements that need to be reconciled prior to the rule becoming final. Under the interim rule, a covered contractor information system is an information system that is owned, or operated by or for, a contractor and that processes, stores, or transmits covered defense information (CDI). The interim rule requires reporting of any cyber incident that affects a covered contractor information system or covered defense information residing therein, or that affects the contractor s ability to perform the requirements of the contract that are designated as operationally critical support. A cyber incident that affects the contractor s ability to perform operationally critical support could also include incidents on systems beyond covered information systems, and the interim rule requires that these incidents be reported too.

5 5 DFARS clauses (b) and (m)(2) require subcontractors to rapidly report cyber incidents to the government and the prime contractor (FR and FR 51747, respectively). The clauses require the subcontractor to provide the prime contractor with the incident report number, automatically assigned by DoD. But the clauses do not say what information must be provided to the prime contractor. Without guidance regarding what information must be disclosed, it is unclear whether the subcontractor may be required to reveal proprietary information as part of the disclosure and the extent to which the prime contractor is required to maintain the confidentiality of information tied to an incident. Moreover, the requirement that this information be rapidly reported may not allow private parties time to negotiate a nondisclosure agreement with respect to such information. It would be prudent for the clause to limit the subcontractor s disclosure responsibility so that it is only required to disclose that the event occurred and the incident report number. Alternatively, the clause should limit the prime contractor s use of any disclosed information as the rule does with respect to third-party contractors under DFARS (FR 51745). As currently drafted, the interim rule s provision regarding access to additional information or equipment necessary for forensic analysis in subsection (f) of clause requires contractors to provide DoD with access to additional information or equipment that is necessary to conduct a forensic analysis (FR 51746). Instead of this wording, the Chamber recommends modifying it to state that contractors provide DoD additional information as necessary to conduct a forensic analysis upon the request of DoD. The parties shall discuss in good faith whether additional information or equipment is necessary to conduct a forensic analysis. Subsection (g) of clause allows DoD to conduct an exhaustive cyber incident damage assessment. In the course of the review, DoD may request a complete copy of images of the accessed information systems for analysis (FR 51746). These images may contain third-party data that the DoD contractor may not be lawfully authorized to disclose. The Chamber requests that an exception be provided allowing contractors to refrain from disclosing complete images if there are legal or contractual reasons that preclude such sharing. Contractors should be permitted to use various means of providing DoD with the data it needs to conduct a damage assessment without running afoul of potential restrictions associated with handling the data. Mandating Security Requirements Throughout the Supply Chain Will Have Unwanted Consequences The interim rule creates a number of requirements that DoD intends to flow down throughout the defense industry supply chain, from prime contractors to thousands of subcontractors. Such a sweeping initiative will generate unintended consequences, not all of which are constructive. Virtually all contractors and subcontractors will need to significantly enhance their cyber capabilities because the security mandates in NIST SP will flow down throughout their respective supply chains. On the surface, this outcome is a good one. However, high-quality cybersecurity the type needed to counter nation-state adversaries and their proxies does not come cheaply.

6 6 The expense of complying with multiple new rules will be difficult for large firms and especially for small and midsize businesses. Small enterprises can find complying with NIST SP insurmountable because of the connected personnel (e.g., cybersecurity consultants) and capital (e.g., hardware and software) expenses. What is more, given the nature of business sales practices, commercial companies often will not know who or what the ultimate customer is and, among other things, commercial entities will have challenges complying with the interim rule. The flow-down requirements apply not only to subcontractors at any tier but even to those subcontractors that sell commercial parts and services. Applying DoD-specific regulatory burdens on commercial vendors will generate much uncertainty and added expense, creating a disincentive for affected vendors to remain in the defense market. DoD-unique requirements will also act as de facto barriers to potential market competitors. Cloud Computing Provisions Should Be Handled In a Separate, Proposed Rulemaking The Chamber recommends removing sections (Representation of Use of Cloud Computing) and (Cloud Computing Services) from the interim rule and publishing them as a proposed rule separately. Publishing the clauses on implementing cloud contracting policies with sections on network penetration reporting adds unnecessary complexity and confusion. In the absence of a separate rule, the Chamber recommends the following actions: First, based on the rule, certification should be waived if a contractor does not provide cloud computing services to the government. But if the contractor is using cloud computing services that cover protected information as defined in the interim rule, the contractor must meet NIST SP security requirements, with added resources and costs. Second, the Chamber recommends clarifying the definition of cloud services. The interim rule is replacing DFARS for unclassified controlled technical information (UCTI), which applied to any unclassified technical information. We understand that DFRAS is applicable only to cloud services provided by the enterprise (a nondeliverable). Deliverables are handled under separate acquisition documents (e.g., statements of work) raising questions for contractors about the certification requirement. Definitions Need to Be Workable for Industry and Government The interim rule defines covered defense information broadly to incorporate four categories of information (e.g., FR 51742, FR 51745). While, in some cases, it is clear that information would fall within one of the four categories, such as information specifically marked or delineated in the contract, in other instances, it is not clear. For example, where a contractor receives or generates information in the course of contract performance, it may be unclear whether it falls within a given category (e.g., information vitally needed by adversaries for them to plan and act effectively... ). Similarly, one of the four categories of CDI is critical information (operations security) (FR 51742). The Chamber understands that specific facts linked to the operations security process can differ among DoD commands and related entities. It is not clear from the

7 7 interim rule which standards would apply in determining whether an item is CDI/critical information. The Chamber urges DoD to clarify what constitutes critical information generally, including under the operations security process. Any process should be appropriately centralized to ensure that information is treated consistently across DoD contracts and Pentagon bodies. Further, the Chamber requests DoD to clarify what methodology is applied when it determines whether a contractor reasonably complies with the interim rule, and when it determines whether specific information falls within a certain definition, such as CDI/critical information. The interim rule s definition of compromise in subsection (a) of DFARS includes the loss of an object, which may require contractors to investigate, preserve, report, and possibly produce laptops, mobile devices, and other media that store CDI. The Chamber requests that DoD consider adding a provision that eliminates any reporting requirements for objects where CDI was stored on the device using embedded encryption (e.g., whole disk encryption). Presumably, industry can argue that there is a higher level of confidence about the security of encrypted data. The interim rule defines cyber incident at DFARS as actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein [italics added] (FR51742). However, the cyber incident reporting requirement at DFARS (c)(1) only requires the reporting where a cyber incident affects a covered contractor information system or the covered defense information residing therein... [italics added] (FR 51746). There is a discrepancy between a potential incident and an actual incident. Thus, it is not entirely clear if cyber incidents with potentially (i.e., not actually) adverse effects must be reported. Requiring contractors to report potentially adverse effects a massive undertaking, given the number of incidents and the time it takes to adequately assess their severity would place a significant burden on both government and contractors. If contractors are required to report all potentially adverse effects they may incur significant expenses to report hundreds of innocuous incidents. Without further clarification, there is potential to create a substantial burden for contractors with no commensurate benefit to the government. Accordingly, the interim rule should address: (1) what is meant by the term potentially adverse effect, and what elements contractors should evaluate when determining whether an incident falls within this definition; and (2) whether contractors must report cyber incidents with a potentially adverse effect or just those cyber incidents that have an actual adverse effect. Given the difficulty in making such a determination, the Chamber requests that DoD consider either removing the word potentially or include language stating that an incident only includes actions that are likely to result in the exfiltration of CDI or the installation of unauthorized command-and-control capabilities. ***

8 8 The Chamber welcomes the chance to provide feedback to DoD on the interim rule on cyber incident reporting and contracting for cloud computing services. If you have any questions or need more information, please do not hesitate to contact me ) or my colleague Matthew Eggers ). Sincerely, Ann M. Beauchesne

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC 20301-3000 ACQUISITION, TECHNO LOGY. A N D LOGISTICS SEP 2 1 2017 MEMORANDUM FOR COMMANDER, UNITED ST A TES SPECIAL OPERATIONS

More information

ROADMAP TO DFARS COMPLIANCE

ROADMAP TO DFARS COMPLIANCE ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated

More information

DOD s New Cyber Requirements: Impacts on DOD Contractors and Subcontractors

DOD s New Cyber Requirements: Impacts on DOD Contractors and Subcontractors McKenna Government Contracts, continuing excellence at Dentons DOD s New Cyber Requirements: Impacts on DOD Contractors and Subcontractors Phil Seckman Mike McGuinn Quincy Stott Dentons US LLP Date: January

More information

Safeguarding Unclassified Controlled Technical Information

Safeguarding Unclassified Controlled Technical Information Safeguarding Unclassified Controlled Technical Information (DFARS Case 2011-D039): The Challenges of New DFARS Requirements and Recommendations for Compliance Version 1 Authors: Justin Gercken, TSCP E.K.

More information

Department of Defense Cybersecurity Requirements: What Businesses Need to Know?

Department of Defense Cybersecurity Requirements: What Businesses Need to Know? Department of Defense Cybersecurity Requirements: What Businesses Need to Know? Why is Cybersecurity important to the Department of Defense? Today, more than ever, the Department of Defense (DoD) relies

More information

Get Compliant with the New DFARS Cybersecurity Requirements

Get Compliant with the New DFARS Cybersecurity Requirements Get Compliant with the New DFARS 252.204-7012 Cybersecurity Requirements Reginald M. Jones ( Reggie ) Chair, Federal Government Contracts Practice Group rjones@foxrothschild.com; 202-461-3111 August 30,

More information

Cyber Security Challenges

Cyber Security Challenges Cyber Security Challenges Navigating Information System Security Protections Vicki Michetti, DoD CIO, Director, DIB Cybersecurity Program Mary Thomas, OUSD(AT&L), Defense Procurement and Acquisition Policy

More information

Cybersecurity for Government Contractors: Preparing for Cyber Incidents in 2017

Cybersecurity for Government Contractors: Preparing for Cyber Incidents in 2017 Cybersecurity for Government Contractors: Preparing for Cyber Incidents in 2017 March 23, 2017 By Keir Bancroft By Louverture Jones Partner Senior Manager, Deloitte Advisory Venable LLP Deloitte & Touche

More information

DFARS Safeguarding Covered Defense Information The Interim Rule: Cause for Confusion and Request for Questions

DFARS Safeguarding Covered Defense Information The Interim Rule: Cause for Confusion and Request for Questions DFARS 252.204.7012 Safeguarding Covered Defense Information The Interim Rule: Cause for Confusion and Request for Questions By Jonathan Hard, CEO And Carol Claflin, Director of Business Development H2L

More information

INTRODUCTION TO DFARS

INTRODUCTION TO DFARS INTRODUCTION TO DFARS 800-171 CTI VS. CUI VS. CDI OVERVIEW COPYRIGHT 2017 FLANK. ALL RIGHTS RESERVED. INTRODUCTION TO DFARS 800-171 CTI VS. CUI VS. CDI OVERVIEW Defense contractors having to comply with

More information

Cybersecurity Challenges

Cybersecurity Challenges Cybersecurity Challenges Protecting DoD s Information NAVSEA Small Business Industry Day August 8, 2017 1 Outline Protecting DoD s Information DFARS Clause 252.204-7012 Contractor and Subcontractor Requirements

More information

Safeguarding unclassified controlled technical information (UCTI)

Safeguarding unclassified controlled technical information (UCTI) Safeguarding unclassified controlled technical information (UCTI) An overview Government Contract Services Bulletin Safeguarding UCTI An overview On November 18, 2013, the Department of Defense (DoD) issued

More information

Safeguarding of Unclassified Controlled Technical Information. SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013)

Safeguarding of Unclassified Controlled Technical Information. SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013) Page 1 of 7 Section O Attach 2: SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013) 252.204-7012 Safeguarding of Unclassified Controlled Technical Information. As prescribed in 204.7303,

More information

2018 SRAI Annual Meeting October Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA

2018 SRAI Annual Meeting October Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA 2018 SRAI Annual Meeting October 27-31 Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA Controlled Unclassified Information Regulations: Practical Processes and Negotiations

More information

Cybersecurity Risk Management

Cybersecurity Risk Management Cybersecurity Risk Management NIST Guidance DFARS Requirements MEP Assistance David Stieren Division Chief, Programs and Partnerships National Institute of Standards and Technology (NIST) Manufacturing

More information

NIST Special Publication

NIST Special Publication NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Ryan Bonner Brightline WHAT IS INFORMATION SECURITY? Personnel Security

More information

June 27, Via Electronic Mail. Federal Trade Commission Office of the Secretary Room H Pennsylvania Avenue, NW Washington, D.C.

June 27, Via Electronic Mail. Federal Trade Commission Office of the Secretary Room H Pennsylvania Avenue, NW Washington, D.C. June 27, 2005 Via Electronic Mail Federal Trade Commission Office of the Secretary Room H-159 600 Pennsylvania Avenue, NW Washington, D.C. 20580 Re: CAN-SPAM Act Rulemaking, Project No. R411008 Ladies

More information

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries

More information

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA CYBER SECURITY BRIEF Presented By: Curt Parkinson DCMA September 20, 2017 Agenda 2 DFARS 239.71 Updates Cybersecurity Contracting DFARS Clause 252.204-7001 DFARS Clause 252.239-7012 DFARS Clause 252.239-7010

More information

PilieroMazza Webinar Preparing for NIST SP December 14, 2017

PilieroMazza Webinar Preparing for NIST SP December 14, 2017 PilieroMazza Webinar Preparing for NIST SP 800-171 December 14, 2017 Presented by Jon Williams, Partner jwilliams@pilieromazza.com (202) 857-1000 Kimi Murakami, Counsel kmurakami@pilieromazza.com (202)

More information

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph

More information

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information. DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Security Safeguarding Covered Defense Information 30-31 August 2016 WARFIGHTER FIRST PEOPLE & CULTURE STRATEGIC ENGAGEMENT FINANCIAL

More information

SAC PA Security Frameworks - FISMA and NIST

SAC PA Security Frameworks - FISMA and NIST SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance

More information

Preparing for NIST SP January 23, 2018 For the American Council of Engineering Companies

Preparing for NIST SP January 23, 2018 For the American Council of Engineering Companies Preparing for NIST SP 800-171 January 23, 2018 For the American Council of Engineering Companies Presented by Jon Williams, Partner jwilliams@pilieromazza.com (202) 857-1000 Kimi Murakami, Counsel kmurakami@pilieromazza.com

More information

American Association for Laboratory Accreditation

American Association for Laboratory Accreditation R311 - Specific Requirements: Federal Risk and Authorization Management Program Page 1 of 10 R311 - Specific Requirements: Federal Risk and Authorization Management Program 2017 by A2LA. All rights reserved.

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

2017 SAME Small Business Conference

2017 SAME Small Business Conference 2017 SAME Small Business Conference Welcome to Cybersecurity Initiatives and Speakers: Requirements: Protecting DOD s Unclassified Information Vicki Michetti, Director, Defense Industrial Base Cybersecurity

More information

Cyber Security Challenges

Cyber Security Challenges Cyber Security Challenges Protecting DoD s Information Melinda Reed, OUSD(AT&L), Systems Engineering Mary Thomas, OUSD(AT&L), Defense Procurement and Acquisition Policy 1 Outline Cybersecurity Landscape

More information

DFARS , NIST , CDI

DFARS , NIST , CDI DFARS 252.204-7012, NIST 800-171, CDI and You Overview Impacts Getting started Overview Impacts Getting started Overview & Evolving Requirements DFARS 252.204-7012 - Safeguarding Covered Defense Information

More information

Industry Perspectives on Active and Expected Regulatory Actions

Industry Perspectives on Active and Expected Regulatory Actions July 15, 2016 Industry Perspectives on Active and Expected Regulatory Actions Alan Chvotkin Executive Vice President and Counsel, Professional Services Council chvotkin@pscouncil.org Trey Hodgkins Senior

More information

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT September 13, 2004 Via Electronic Mail Federal Trade Commission Office of the Secretary Room H-159 600 Pennsylvania Avenue, NW Washington, D.C. 20580 Re: CAN-SPAM Act Rulemaking, Project No. R411008 Ladies

More information

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,

More information

The FAR Basic Safeguarding Rule

The FAR Basic Safeguarding Rule The FAR Basic Safeguarding Rule Erin B. Sheppard, Partner Michael J. McGuinn, Counsel December 8, 2016 Agenda Regulatory landscape FAR Rule History Requirements Harmonization Subcontract issues What s

More information

DFARS Defense Industrial Base Compliance Information

DFARS Defense Industrial Base Compliance Information DFARS 252.204-7012 Defense Industrial Base Compliance Information Protecting Controlled Unclassified Information (CUI) Executive Order 13556 "Controlled Unclassified Information, November 2010 Established

More information

IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION

IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION Briefing for OFPP Working Group 19 Feb 2015 Emile Monette GSA Office of Governmentwide Policy emile.monette@gsa.gov Cybersecurity Threats are

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

Inapplicability to Non-Federal Sales and Use

Inapplicability to Non-Federal Sales and Use Security Industry Association 8405 Colesville Road, Suite 500 Silver Spring, MD, 20190 301-804-4705 www.securityindustry.org Submitted by email: osd.dfars@mail.mil October 19, 2018 Re: Section 889 of the

More information

Another Cook in the Kitchen: The New FAR Rule on Cybersecurity

Another Cook in the Kitchen: The New FAR Rule on Cybersecurity Another Cook in the Kitchen: The New FAR Rule on Cybersecurity Breakout Session #: F13 Erin B. Sheppard, Partner, Dentons US LLP Michael J. McGuinn, Counsel, Dentons US LLP Date: Tuesday, July 26 Time:

More information

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036 US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style Fourth level Click The to DFARS edit Master UCTI title Clause style How It Impacts the Subcontract Relationship Breakout Third Session level #F11 Fourth level Phillip R.

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Handbook Webinar

Handbook Webinar 800-171 Handbook Webinar Pat Toth Cybersecurity Program Manager National Institute of Standards and Technology (NIST) Manufacturing Extension Partnership (MEP) NIST MEP 800-171 Assessment Handbook Step-by-step

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

Outline. Why protect CUI? Current Practices. Information Security Reform. Implementation. Understanding the CUI Program. Impacts to National Security

Outline. Why protect CUI? Current Practices. Information Security Reform. Implementation. Understanding the CUI Program. Impacts to National Security Outline Why protect CUI? Impacts to National Security Current Practices CUI Program & Existing Agency Practices Information Security Reform CUI Registry 32CFR2002 NIST SP 800-171 (Rev 1) Federal Acquisition

More information

DATA PROCESSING AGREEMENT

DATA PROCESSING AGREEMENT DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Views on the Framework for Improving Critical Infrastructure Cybersecurity

Views on the Framework for Improving Critical Infrastructure Cybersecurity This document is scheduled to be published in the Federal Register on 12/11/2015 and available online at http://federalregister.gov/a/2015-31217, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Next Generation 911; Text-to-911; Next Generation 911 Applications. SUMMARY: In this document, the Federal Communications Commission (Commission)

Next Generation 911; Text-to-911; Next Generation 911 Applications. SUMMARY: In this document, the Federal Communications Commission (Commission) This document is scheduled to be published in the Federal Register on 10/29/2013 and available online at http://federalregister.gov/a/2013-25274, and on FDsys.gov 6712-01 FEDERAL COMMUNICATIONS COMMISSION

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...

More information

Cybersecurity in Acquisition

Cybersecurity in Acquisition Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) Federal Cybersecurity Summit September 15, 2016 Sep 15, 2016 Page-1 Acquisition program activities must

More information

Why is the CUI Program necessary?

Why is the CUI Program necessary? Why is the CUI Program necessary? Executive departments and agencies apply their own ad-hoc policies and markings to unclassified information that requires safeguarding or dissemination controls, resulting

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY

More information

New Cyber Rules. Are You Ready? Bob Metzger, RJO Dave Drabkin, DHG Tom Tollerton, DHG. Issues in Focus Webinar Series. government contracting

New Cyber Rules. Are You Ready? Bob Metzger, RJO Dave Drabkin, DHG Tom Tollerton, DHG. Issues in Focus Webinar Series. government contracting New Cyber Rules Are You Ready? Bob Metzger, RJO Dave Drabkin, DHG Tom Tollerton, DHG Issues in Focus Webinar Series 1 Speaker Information Robert S. Metzger Rogers Joseph O Donnell PC (202)777.8951 Rmetzger@rjo.com

More information

Protecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizations

Protecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizations Protecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizations January 9 th, 2018 SPEAKER Chris Seiders, CISSP Security Analyst Computing Services and Systems Development

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

Data to Decisions Terminate, Tolerate, Transfer, or Treat

Data to Decisions Terminate, Tolerate, Transfer, or Treat I N S T I T U T E F O R D E F E N S E A N A L Y S E S Data to Decisions Terminate, Tolerate, Transfer, or Treat Laura A. Odell 25 July 2016 Approved for public release; distribution is unlimited. IDA Non-Standard

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release. Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP Revision 1)

Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP Revision 1) https://www.csiac.org/ Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP800-171 Revision 1) Today s Presenter: Wade Kastorff SRC, Commercial Cyber Security

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

Tinker & The Primes 2017 Innovating Together

Tinker & The Primes 2017 Innovating Together Tinker & The Primes 2017 Innovating Together Protecting Controlled Unclassified Information Systems and Organizations Larry Findeiss Bid Assistance Coordinator Oklahoma s Procurement Technical Assistance

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

Summary of FERC Order No. 791

Summary of FERC Order No. 791 Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure

More information

162 FERC 61,044 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ]

162 FERC 61,044 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ] 162 FERC 61,044 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM17-13-000] Supply Chain Risk Management Reliability Standards (January 18, 2018) AGENCY: Federal

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private

More information

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS This form is completed by the Task Monitors and forwarded to DISA/DITCO-Scott with a complete ENCORE II Requirements Package. (electronic signatures

More information

Accessibility Procurement Pilot: Call for Proposals (CFP)

Accessibility Procurement Pilot: Call for Proposals (CFP) Accessibility Procurement Pilot: Call for Proposals (CFP) Date: January 23, 2018 CFP No.: 24062-180181/B Amendment No.: 003 GETS reference number: PW-17-00809528 Closing date: January 31, 2018, 2 pm (EST)

More information

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules David Bodenheimer Evan Wolff Kate Growley Regulating Information The Internet of Things: Peering into the Future Cybersecurity

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

A Checklist for Cybersecurity and Data Privacy Diligence in TMT Transactions

A Checklist for Cybersecurity and Data Privacy Diligence in TMT Transactions May 2018 TMT INSIGHTS From the Debevoise Technology, Media & Telecommunications Practice A Checklist for Cybersecurity and Data Privacy Diligence in TMT Transactions Companies in the technology, media

More information

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.! enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards November 2016 COMMENTARY Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards The Board of Governors of the Federal Reserve System ( Federal Reserve Board ), the Federal Deposit Insurance

More information

December 21, 1998 BY ELECTRONIC MAIL AND HAND DELIVERY

December 21, 1998 BY ELECTRONIC MAIL AND HAND DELIVERY Alden Adkins Sr. V. P. and General Counsel BY ELECTRONIC MAIL AND HAND DELIVERY Katherine A. England Assistant Director Division of Market Regulation Securities and Exchange Commission 450 Fifth Street,

More information

MARPA DOCUMENT MARPA Revision 1.1

MARPA DOCUMENT MARPA Revision 1.1 MARPA 1100 - Page 1 MARPA DOCUMENT MARPA 1100 Revision 1.1 STREAMLINE PROGRAM FOR PMA APPLICATIONS OF NON-SAFETY-SIGNIFICANT ARTICLES SUBMITTED BY EXPERIENCED APPLICANTS WITH A QUALIFYING PERFORMANCE RECORD

More information

Comments on the Draft Policy Statement PS-ANE published online for public comment at

Comments on the Draft Policy Statement PS-ANE published online for public comment at Certification Project Notification (CPN) Submittal for Parts Manufacturer Approvals (PMAs) of Propeller Parts with a Failure Mode that could Result in the Total Loss of Thrust Comments on the Draft Policy

More information

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design The Internet Society on behalf of The IETF Administrative Oversight Committee Request for Proposal RFC Editor RFC Format CSS Design Date of Issuance: July 22, 2016 Proposal Submission Deadline: September

More information

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

FedRAMP: Understanding Agency and Cloud Provider Responsibilities May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration

More information