Cybersecurity Legislation and Education

Author(s):

Pratik Kirve, ,

cybersecurity legislation

The increase of data breaches and cyber-attacks have pushed governments to take different measures to tighten the cybersecurity. There are numerous methods and techniques regarding hacking, and these practices are always evolving. Therefore, governments need to come up with various measures and innovative strategies to counter and eliminate attacks. However, they must implement concrete types … Read more

From the Fall 2014 Issue

Market Intelligence: The Key to Government Business Development

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

Increasingly, every day of every week, of every month, of every year, more business is being conducted online. Federal, state and local government prime contracting, subcontracting and teaming are no exception. In fact, most government contracting opportunities and research is now available online and easily accessible. The key is to know the proper techniques and … Read more

From the Fall 2014 Issue

5 Things to Do Today to Increase the Value of Your Government Contracting Business

Author(s):

Pat Lowry, MBA, ASA, CVA, , Patuxent Valuation Group LLC

Realtors are asked for their tips on selling homes, chefs are asked for their secret spices, and cops are asked how to get out of speeding tickets. Me? I’m constantly asked what’s most important to increasing the value of someone’s business. 10 years of experience consulting with and valuing government contracting businesses – some that … Read more

From the Fall 2014 Issue

Their Own Worst Enemies-DoD Responds to Insider Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

The Department of Defense (DoD) has as part of its mission to prevent and deter national security threats and attacks on the American people – but what if the DoD can’t prevent its own employees and service members from contributing to or causing security breaches? A recent survey1 conducted by SolarWinds and Market Connections found … Read more

From the Fall 2014 Issue

Chinese Hackers and Their New Target- Federal Employees

Author(s):

Ellen Cornelius, J.D., Senior Law & Policy Analyst, The Center for Health & Homeland Security

Currently, the U.S.  government monitors approximately 20 Chinese hacking groups; however, no system is flawless. Federal agencies reported that in fiscal year 2013, 9,883 malware attacks were launched.1 The number of intrusions was not released. In March 2014, Chinese hackers allegedly infiltrated the networks of the Office of Personnel Management (OPM), the Government Accountability Office … Read more

From the Summer 2014 Issue

Implementing Continuous Monitoring to Combat the Nation’s Cyber Threat

Author(s):

Matt Brown, Vice President, Homeland Security and Cyber Solutions Knowledge Consulting Group (KCG)

Cyber attacks on federal government systems are increasing in volume, vigor and complexity. In fiscal 2012 alone, there were 48,562 cybersecurity incidents at federal agencies reported to the U.S. Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC). That’s a 782 percent increase over … Read more

From the Spring 2014 Issue

Time to DOD Cybersecurity

Author(s):

Jeffrey R. Cook, CPA, CITP, CIPP, IT Audit and Advisory Services Lead, Government Contract Services Group, Aronson LLC

IMPLEMENTING AND PAYING FOR THE NEW DFARS UCTI SAFEGUARDING CONTRACT CLAUSE  Historically, information security on contracts with the Department of Defense was considered necessary for classified but not other types of information. That changed on November 18, 2013, when DoD issued a final rule in the Federal Register that Unclassified Controlled Technical Information (UCTI) is … Read more