Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida

Similar documents
Safeguarding unclassified controlled technical information (UCTI)

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats

ROADMAP TO DFARS COMPLIANCE

DFARS Cyber Rule Considerations For Contractors In 2018

SEC Issues Updated Guidance on Cybersecurity Disclosure

Department of Defense Cybersecurity Requirements: What Businesses Need to Know?

Legal, Ethical, and Professional Issues in Information Security

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

The GDPR Are you ready?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley

SOC for cybersecurity

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016

Cyber Risks in the Boardroom Conference

PilieroMazza Webinar Preparing for NIST SP December 14, 2017

Preparing for NIST SP January 23, 2018 For the American Council of Engineering Companies

Last Updated: January 31, 2017

Cyber Security and Cyber Fraud

Cybersecurity and the Board of Directors

DFARS Defense Industrial Base Compliance Information

Retain, search, review and produce business mobile text messages

CHAPTER 13 ELECTRONIC COMMERCE

Industry Perspectives on Active and Expected Regulatory Actions

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA

Leading the Digital Transformation from the Centre of Government

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Cybersecurity in Acquisition

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

DFARS Safeguarding Covered Defense Information The Interim Rule: Cause for Confusion and Request for Questions

Inapplicability to Non-Federal Sales and Use

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Get Compliant with the New DFARS Cybersecurity Requirements

2018 SRAI Annual Meeting October Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA

National Policy and Guiding Principles

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Regulating Cyber: the UK s plans for the NIS Directive

-Eight types of cyber data, (Sec. 708(7))

Data Use and Reciprocal Support Agreement (DURSA) Overview

cybersecurity challenges for government contractors

Financial Regulations, Enforcement & Cybersecurity

EXECUTIVE SUMMARY JUNE 2016 Multifamily and Cybersecurity: The Threat Landscape and Best Practices

The NIS Directive and Cybersecurity in

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

HPH SCC CYBERSECURITY WORKING GROUP

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3

Akin Gump Client Update Alert

ISACA Cincinnati Chapter March Meeting

Kirk J. Nahra Wiley Rein LLP Washington, D.C. (October, 2013)

SAC PA Security Frameworks - FISMA and NIST

ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY

BHConsulting. Your trusted cybersecurity partner

Records Retention Policy

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA

History of NERC December 2012

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment

- Cyber threat information: information directly pertaining to,

New Jersey LFN Packet Check List

How the SBIR/STTR Programs Help Grow Your Businesses

gridconnext provides an unprecedented

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

History of NERC August 2013

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Turning Risk into Advantage

SURGICAL REVIEW CORPORATION Privacy Policy

Hacking and Cyber Espionage

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

An Energy Community for the Future Key Findings of the Report of the High Level Reflection Group. Barbora Jaksova, Energy Community Secretariat

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Another Cook in the Kitchen: The New FAR Rule on Cybersecurity

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

Consolidated Privacy Notice

Cyber Security Incident Report

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

CCISO Blueprint v1. EC-Council

Cybersecurity Risk Management

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015

Experience Security, Risk, and Governance

RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO

COOPERATIVE RESEARCH and DEVELOPMENT AGREEMENT (CRADA)

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Request for Information Strategies to Improve Maritime Supply Chain Security and Achieve 100% Overseas Scanning

The Evolving Threat to Corporate Cyber & Data Security

INTRODUCTION TO DFARS

Facing Up to the Challenges

Review of the Canadian Anti-Spam Legislation

In Accountable IoT We Trust

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

Throughout this Data Use Notice, we use plain English summaries which are intended to give you guidance about what each section is about.

BHConsulting. Your trusted cybersecurity partner

DOD s New Cyber Requirements: Impacts on DOD Contractors and Subcontractors

Data Breach Preparation and Response. April 21, 2017

About Office 365 [PLACEHOLDER]

Transcription:

Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida

2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental Miami Miami, Florida ANNUAL & QUARTERLY PROGRAM CHAIRS: Paul F. Khory, Wiley Rein LLP Annejanette H. Pickens, General Dynamics Advanced Information Systems FALL PROGRAM CHAIRS: Stan R. Soya, Baker Botts LLP Oliya S. Zamaray, Rogers Joseph O Donnell, PC PROGRAM OVERVIEW: Government procurement of commercial and non-commercial products and services is increasingly requiring more technical data rights, electronic reporting and retention of data, and controls on the supply chain. As acquisition moves online, off the grid, or into the cloud, what do you need to know to safeguard valuable intellectual property, as well as mission and business critical infrastructure, all while navigating the evolving regulatory compliance regime? Hear subject matter experts from Government and industry examine and explain how government contracting operates in an increasingly tech-savvy world. Understand the vehicles the Government uses to transfer technology, and associated challenges. Hear how the data rights disconnect between commercial practices and Government expectations affects software, hardware, and cloud computing procurements. Learn how acquisition methods are being used to achieve cybersecurity. Gain insight into the continuing evolution of supply chain management into a vital compliance function for government contractors that oversee suppliers and subcontractors on a global basis. Discover how patent disputes with the Government are resolved and litigated. And consider how this rapidly evolving regulatory regime affects contractors compliance and Government enforcement efforts. Join us for the Fall Program in Miami, and get ahead on the hottest issues in technology procurement!

The Section gratefully acknowledges the very generous support from the following sponsors of this year s Fall Program: GOLD SILVER 2

PROGRAM DRAFT: THURSDAY, OCTOBER 30, 2014 4:30 p.m. to 6:30 p.m. Practicum-- Vehicles for Working With the Government to Transfer Technology Paul J.Ehlenbach, Panel Moderator, Lawrence Livermore National Laboratory What are the available vehicles for transferring technology from FFRDCs (Federally Financed Research and Development Centers)? Practical issues that arise under Cooperative Research and Development Agreements (CRADAs). How to utilize the DOE s Agreement for Commercializing Technology (ACT) Program to broaden technology transfer opportunities. 6:30 p.m. to 8:00 p.m. Reception hosted by PwC FRIDAY, OCTOBER 31, 2014 8:30 a.m. to 10:00 a.m. Commercial Items & Rights in Technical Data and Computer Software Nicole J. Owren-Wiest, Moderator, Wiley Rein LLP Disconnects between commercial practices and Government expectations. Government rejection of standard terms and conditions in commercial computer software licenses and EULAs as inconsistent with federal procurement law or the Government s needs; commonly rejected / offensive provisions. Incentivizing commercial entity investment and participation in the DoD marketplace. Working with a more aggressive government customer and the impact on the commercial supply chain. Industry practices for implementing an open systems approach to product development and DoD initiatives and experiences for implementing an open systems approach on weapon acquisition programs. Technical data and software rights challenges from a small business perspective. Source selection criteria impacts. The current data rights regime in a cloud-computing environment. 3

10:15 a.m. to 11:45 a.m. Supply Chain Security Michael W. Mutek, Moderator Details: Tainted Parts where cyber and supply chain security converge Understanding supply chain attack vectors New FAR reporting obligation and DFARS (new 818 regulations) Sec. 806 DFARS to protect supply chain against supplier risk GSA/DoD Supply Chain Assurance Measures Software assurance Use of Acquisition Methods to Achieve Cyber and Supply Chain Security Review of present DoD, GSA, and other agency requirements Qualification of Trusted Suppliers and demonstration of System sufficiency Issues of oversight and administration Discuss Section 806 exclusionary authority (i.e., DoD can exclude a company from competition and can waive the requirement to inform that company). Authority has now been extended to intelligence community and DOE high-risk programs. Security of Cloud Computing Senate Armed Services Committee reached out to large contractors with data breaches to determine how those contractors responded; address what they did to correct the issues. Discuss GSA requirement of compliance with FedRamp Program as of June 1 in all solicitations for cloud computing capability. 12:00 noon to 1:30 p.m. Luncheon Program Keynote Speaker: TBD 1:45 p.m. to 3:15 p.m. Patent Disputes / Litigation David Schlitz, Panel Moderator, Baker Botts LLP There has been a tremendous increase in private patent infringement cases (from 4,000 annually to 8,500), but no corresponding increase in cases against the Government under 28 U.S.C. 1498. Why? Review the basics of patent infringement cases against the Government. Explore the rationale for bringing a 1498 case against the Government, the rationale for not doing so and alternatives to litigation. 4

Discuss and analyze recent decisions that impact 1498 litigation: Intervention by third parties; U.S. Court of Federal Claims ability to exercise subject matter jurisdiction over thirdparty defendants under Rule 14; and Government contractor immunity for patent infringement suits under 1498. 3:30 p.m. to 5:00 p.m. Fraud Brian D. Miller, Moderator, Navigant Consulting Recent cases involving tech issues and sales of counterfeit electronic parts. Will the Government bring more cases like the Honeywell FCA case? Collecting, analyzing, transferring, and storing e-data and the use of technological equipment and software. Big Data issues (i.e., responding to e-discovery or uploading to online data room, dealing with big data in the course of investigations and other issues). 5:00 p.m. to 7:00 p.m. Section Reception 7:15 p.m. to 9:00 p.m. No Host Dinners at Restaurants Near Hotel 5