This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Members of the National Guard wear multiple hats. They can be called up at a moment’s notice to support the full-time military overseas, to assist first responders during a natural disaster or other emergency at home, and most of them have civilian jobs as well. With those wide-ranging duties on their plates, National Guard members who work in cybersecurity must be prepared for any number of possible threats.
Following our recent overview of topics to watch in the National Defense Authorization Act (“NDAA”) for Fiscal Year (“FY”) 2024, available here , we continue our coverage with a “deep dive” into NDAA provisions related to cybersecurity and software security in each of the Senate and House bills. For the past three years, the NDAA has dedicated a separate Title to cyber and cybersecurity, reflecting the increased importance of these issues in Department of Defense (“DoD”) operations.
You are reading the September 2023 Update of the Bass, Berry & Sims Enforcement Roundup, where we bring notable enforcement actions, policy changes, interesting news articles, and a bit of our insight to your inbox. To stay up to date, subscribe to our GovCon & Trade blog. If you have questions about any actions addressed in the Roundup, please contact the international trade team.
Friday, October 13, 2023 | 2:00PM EDT | 1 Hour | 1 CPE In 2022, the Department of Defense created a cross-functional team to accelerate the adoption of 5G and future-generation wireless networking technologies, laying the foundation for new opportunities to implement innovative solutions to military needs. The potential is there for 5G (and beyond) to remake the integration and interoperability of the different DoD domains – air, land, sea, space, and cyber – as envisioned in DoD’s Joint All-Dom
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
After seeing the acceleration of generative artificial intelligence, agencies are increasingly interested in what AI pilots have to offer. Some, such as the Department of Homeland Security, want to automate data collection from PDFs, processing tens of thousands with generative AI to sort them into groups. The use case of interacting with information collected in this manner in a ChatGPT-esque interface is called enterprise chat data, and it’s making unstructured data accessible to nonexperts.
By Chuck Brooks, President of Brooks Consulting International With its broad national security role, the DOD has been a pioneer in the development of numerous innovative cybersecurity solutions.
On September 29, the Small Business Administration (SBA) reopened its Certify portal to new applicants seeking admittance into the SBA 8(a) program. This decision comes over a month after a ruling from the Eastern District of Tennessee prohibited the SBA from applying a presumption of social disadvantage to certain designated groups. In an August blog post , we wrote about the Ultima decision and its effects.
On September 29, the Small Business Administration (SBA) reopened its Certify portal to new applicants seeking admittance into the SBA 8(a) program. This decision comes over a month after a ruling from the Eastern District of Tennessee prohibited the SBA from applying a presumption of social disadvantage to certain designated groups. In an August blog post , we wrote about the Ultima decision and its effects.
Wednesday, October 18, 2023 | 2:00PM EDT | 1 Hour | Training Certificate Agencies today are faced with the challenge of modernizing legacy IT solutions to streamline workflows and increase the speed and quality of their services. But the push toward standardization must also take into account that people do their best work when they have the best tools.
The Defense Logistics Agency moves more than $48 billion in goods and services for the U.S. military every year. Managing that supply chain, as well as all of its contracts and paperwork, is a massive undertaking. DLA uses robotic process automation to handle repetitive tasks, saving employees tens of thousands of hours a year, says Frank Wood, the agency’s RPA program manager.
This is part of a series of WNN exclusives on whistleblower awards paid out by the U.S. Fish and Wildlife Service to wildlife whistleblowers. From late 2019 through 2022, the United States Fish and Wildlife Service (FWS) issued twenty-one whistleblower awards to individuals who provided high-quality information about wildlife crime. The existence of these awards has not been previously made public and details about them were made available to Whistleblower Network News in response to a Freedom o
Over the past decade, billions of federal dollars have been invested in reshaping how hospitals and clinics manage their health records. But in human services, post-acute and community-based services — the segments of care dedicated to mental health, substance use, home care, hospice and the environments people live in — change has been slower to come.
Friday, October 20, 2023 | 2:00PM EDT | 1 Hour | 1 CPE Communications security is one of the foremost priorities in any battlespace. This is one reason the Department of Defense is keen on building out 5G capabilities, because of its ability to create secure private networks anywhere it is deployed. But 5G’s capabilities extend beyond creating private networks on the fly.
In business, customer service and relationship management can mean the difference between bringing in new clients or losing revenue. But the federal government doesn’t have to worry about that, because citizens can’t go anywhere else for veterans’ benefits, Social Security payouts or passports. But federal agencies still want to keep citizens happy.
The Defense Information Systems Agency has added four companies to a multiple-award indefinite-delivery/indefinite-quantity contract to provide satellite-based services and capabilities to the U.S. Space Force.
After parts I , II and III we finally reach part IV on the purchase or leasing of vehicles (contract type - 5) For these, the Annex establishes four different award criteria and two contract performance clauses/technical specifications, with issues to be found on both, mostly due to the non-technology neutral approach to the drafting. Award criteria For award criteria the Annex states the following mandatory criteria: "ii) Fuel consumption: at least 5% of criterion iii) Running costs arising fro
Tuesday, October 17, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The federal government has a complex hiring process, governed by a host of regulations and policies. Difficulties in hiring young people and individuals with valuable skills such as cybersecurity, and the impact of the pandemic on all employers, has modernizing HR is at the forefront of many agency leaders’ minds.
Federal agencies have less than a year to shift from keeping paper documents to storing and managing all documents electronically. The National Archives and Records Administration’s deadline for the transition arrives next June 30. The task of digitizing the millions of documents the federal government is required by law to keep and maintain in long-term storage — and also make easily searchable — is nearly impossible without a large fleet of easy-to-use digital scanners.
What do Amazon Web Services (AWS) public sector customers need to know about the State Risk and Authorization Management Program ( StateRAMP) and how can you use AWS to help meeting StateRAMP requirements? In this blog post, learn a quick recap on what StateRAMP is and how it differs from the similar Federal Risk and Authorization Management Program ( FedRAMP ).
Mongolia’s economy is dominated by large state-owned mining companies that control much of the country’s wealth. But what they do with that money remains hidden. A series of recent scandals shows just how little accountability there is. To tackle this problem, the country has proposed wide-ranging legislation , including an anti-corruption package with measures to standardize the operations of Mongolia’s state-owned enterprises (SOEs) and ensure they follow consistent rules throughout processes
While many organizations are hesitant to be first adopters during the current wave of artificial intelligence, for the CIA, it’s “imperative” that the agency takes swift action to begin working with the rapidly evolving technology or risk falling victim to those that do, according to the agency’s top cyber policy adviser. One thing that “is pretty clear is those entities that augment their activities with AI applications will likely disrupt those entities that do no
Josh Petty, general counsel for Booz Allen Hamilton, has been appointed chair of Executive Mosaic’s 4×24 General Counsel Group. The 4×24 leadership program offers its members, who represent impactful organizations within the government contracting industry, a space to come together with top federal officials to consider critical U.S. missions.
Federal contractors will need to closely monitor a government acquisition website for directives that ban products and services due to security concerns, similar to the Huawei ban, under a new rule published this month and set to go into effect in early December. The Defense Department, the General Services Administration and NASA published an interim rule last week laying out how contractors will need to comply with orders from the Federal Acquisition Security Council.
Wednesday, November 8, 2023 | 2:00PM EST | 1 Hour | Training Certificate Many government agencies wrestle with their legacy systems and outdated processes every day, especially when it comes to cybersecurity and data flow. Agencies usually have multiple servers, private or hybrid clouds, and thousands of end points, from desktop computers to smart phones, tablets to sensors, generating millions of bits of data.
The Department of Veterans Affairs’ four new artificial intelligence centers will place a premium on iteration in the AI testing process, National AI Institute Director Gil Alterovitz said Wednesday. The different locations of the new NAII centers will play a role in that iterative process, Alterovitz said during a webinar produced by Fed Gov Today.
The Raymond James Defense and Government Conference held at Nationals Park in Washington, D.C. on Thursday brought together some of the most influential executives, government officials and thought leaders in the government and government contracting industry.
Wildlife crime is on the rise. The UN reports that wildlife trafficking has increased in recent years and is valued at up to $23 billion. In addition to posing severe harm to biodiversity and the environment, wildlife crime is also “a growing threat to natural resources, peace, development and security,” according to the UN. Whistleblower awards remain a vastly underutilized tool in the United States’ efforts to crack down on wildlife trafficking and poaching.
Friday, October 27, 2023 | 2:00PM EDT | 1 Hour | 1 CPE Advances in telecommunications capabilities are a major driver in Department of Defense programs. From creating secure private networks that U.S. military forces and their partners can use in conflicts to integrating 5G capabilities to create “smart” warehouses to significant improvements in supply chain logistics, DoD has been committed to investing in rethinking the meaning and applications of communications.
The U.S. Census Bureau is perhaps best known for conducting the nation’s decennial census. Its primary mission, though, is to serve the American people by collecting and analyzing vital statistical data about the population and the economy to guide decision-makers and policymakers at all levels of government, including 90,000 state and local governments and virtually every industry.
The U.S. Army has released a sources sought notice for a design bid build construction project with a $250 million to $500 million estimated value and fiscal year 2025 anticipated schedule. According to the SAM.
CGI Federal has concluded a real-time pilot set in a planetary-scale Metaverse space with the U.S. Marine Corps. To conduct the pilot, CGI and partner organizations Microsoft and Battle Road Digital incorporated the Marine Corps Platform Integration Center logistics and asset management systems with digital twins, the company announced from Fairfax, Virginia on Friday.
This article helps define Organizational Change Management (OCM) and Organizational Intelligence (OI) and addresses their practical relevance to healthy business operations.
The Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies released guidance Tuesday on how to boost open source software safety, security and resilience among tech vendors and critical infrastructure facilities, as open source technology has seen increased use in the past few years. CISA’s Joint Cyber Defense Collaborative (JCDC) — including the Federal Bureau of Investigation (FBI), National Security Agency (NSA) and Treasury Department — released the guidance aimed
Diana Lovati, formerly chief information security officer at Ball’s (NYSE: BALL) aerospace business, has assumed the same role at True Anomaly, according to a LinkedIn post published Tuesday.
Greg Muhlner , vice president of public sector at Atom Computing and a member of Executive Mosaic's 4x24 Quantum Group, completed the Cuyamaca 100K Endurance Run in 15 hours on Saturday. The former Naval SEAL officer was among the 250 participants in the 100-kilometer ultramarathon race.
FAR 31.205-20 provides that interest is unallowable on Federal Government contracts, no matter how it is calculated or presented in your financial books and records. This means you cannot propose, bill, or claim your interest expense.
Founder & CEO of Select GCR, Jason Bortz featured on Spotlight Digital Network with Damon Roberts. Earning Government Contracts is something that most of us don’t know a great deal about. That’s why Founder and CEO of Select GCR , Jason Bortz has been busy lately doing interviews across the country with a variety of news programs like Fox Business Networks Worldwide with Kathy Ireland and more!
As Chief Information Officer and Director of the Technology and Innovation Office within the Bureau of Intelligence and Research, Jimmy Hall is tasked with leading a host of modernization and innovation efforts at the Department of State.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content