This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
military forces and their partners can use in conflicts to integrating 5G capabilities to create “smart” warehouses to significant improvements in supplychainlogistics, DoD has been committed to investing in rethinking the meaning and applications of communications. From creating secure private networks that U.S.
‘Ask the PMO Tables:’ One-on-One Sessions with Government Officials As part of our efforts to facilitate engagement between government and industry, we are excited to announce that the popular “Ask the PMO” Tables will return for both days of the Fall Training Conference! James Peake , M.D., James Peake , M.D.,
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
But it also has value far away from the battlespace, such as 5G efficiencies in supplychain and warehouse logistics and support for open standards while maintaining secure networks. and its allies and partners. Department of Labor (DOL) and the U.S. Department of Health and Human Services (HHS).
Outside of defense, 5G can enhance supplychain and warehouse logistics, support open standards and strengthen communications while maintaining secure networks.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; SupplyChain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update. James Peake , M.D.,
‘Ask the PMO Tables:’ One-on-One Sessions with Government Officials As part of our efforts to facilitate engagement between government and industry, we are excited to announce that the popular “Ask the PMO” Tables will return for both days of the Fall Training Conference! James Peake , M.D., James Peake , M.D.,
‘Ask the PMO Tables:’ One-on-One Sessions with Government Officials As part of our efforts to facilitate engagement between government and industry, we are excited to announce that the popular “Ask the PMO” Tables will return for both days of the Fall Training Conference! James Peake , M.D., James Peake , M.D.,
GSA Requesting Feedback on Draft SupplyChain Risk Management Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supplychain risk management (C-SCRM).
And now, in federal governmentcontracting news, check out some interesting articles about how the federal government is approaching the use of AI and protecting critical supplychains. 1 first appeared on SmallGovCon - GovernmentContracts Law Blog.
The Software Acquisition Guide for Government Enterprise Consumers was created by the Information and Communications Technology SupplyChain Risk Management Task Force, a group co-led by CISA and industry representatives.
The amendment includes the following eight updates to the solicitations: The provision at FAR 52.204-29, Federal Acquisition SupplyChain Security Act Orders—Representation and Disclosures, is being incorporated into the solicitation. The guidance also instructs VA staff to limit the sharing and saving of data on VA systems.
The RFI included 13 questions on infrastructure/supplychain resilience, workforce, innovation, acquisition, policy, and regulatory environment. The plan must also look to transition the DoD supplychain to domestically sourced or Trade Agreements Act (TAA) compliant ingredients.
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
The FASC Improvement Act would grant the FASC the ability to directly issue binding removal and exclusion orders to “protect the Federal supplychain from technology companies and products owned or controlled by a foreign adversary.” The VA OSDBU has also been invited to participate with a tabletop.
Crowell & Moring’s GovernmentContracts Group discusses the most consequential changes for government contractors here. Section 825 contains two prohibitions designed to curb the use of the LOGINK logistics software used in the People’s Republic of China. Section 833 amends 10 U.S.C.
The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber SupplyChain Risk Management (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. James Peake , M.D.,
Jay Blindauer A contractor takes on a Governmentcontract to make money, and inflation is getting in the way. With inflation eroding value for this long, a Government contractor may need to obtain contract relief. Below, I discuss in detail possible ways to do that. .” Thus, under astronomical inflation (e.g.,
Indeed, these provisions may be far more disruptive than requirements imposed by prior year NDAA China provisions that contractors have navigated by reassessing supplychains and increasing due diligence. relationship with Taiwan. LOGILINK and U.S. House Section 866, Senate Sections 1371-73). seaports that accept federal grants.
The objective of the interim rule is to “…address risks in supplychains by reducing or removing threats and vulnerabilities that may lead to data and intellectual property theft, damage to critical infrastructure, harm to Federal information systems, and otherwise degrade our national security.”
percent of all contracting dollars and was a $7.5 Seeking Member Feedback on GSA C-SCRM Questionnaire GSA’s Federal Acquisition Service is developing a voluntary Cyber SupplyChain Risk Management (C-SCRM) Assurance Questionnaire for information and communications technology vendors. billion, which accounted for 11.4
Rather than a one-size-fits-all approach, the government is prioritizing strategies tailored to specific risks faced by different regions. This change means an increased need for expertise in: Emergency Response and Planning : Training programs, disaster recovery services, and logistics management for state and local governments.
In this capacity Kimberly served as the Chair for the Agency’s Procurement Equity Workgroup, the Agency’s Senior Accountable Official for SupplyChain Risk Management, and the Senior Accountable Official for EPA’s Made-in-America implementation. Department of Labor (DOL) and the U.S. Department of Health and Human Services (HHS).
Domestic Content: The act enhances domestic content requirements for major weapons systems and expands some domestic sourcing requirements under Title III of the Defense Production Act to allow Australian and United Kingdom businesses to count as domestic sources.
In parallel, the Pentagon’s release of key Cybersecurity Maturity Model Certification (CMMC) contracting rules aims to fortify the defense supplychain against cyber threats. A bipartisan Senate bill seeks to mandate cybersecurity vulnerability disclosures by contractors, enhancing national security. Have a great weekend!
13] Fourth , “the PPI includes government purchases, while the CPI does not[.]” [14] Because of the differences, for Governmentcontracts cost and pricing analysis, PPI tends to provide better benchmarks for non-commercial supply or construction contracts. 86] Hence, supplychain realignment is well underway. .”
Legal Corner: Navigating the COTS Exception in GovernmentContracts Data Security Requirements: A Closer Look at the FAR and DFARS The Legal Corner provides the procurement community with an opportunity to share insights and comments on relevant legal issues of the day. Have questions? Contact maspmo@gsa.gov.
The full agenda explores the theme of “What is Fair and Reasonable,” with acquisition leadership from multiple agencies, including the VA, Defense Health Agency (DHA), and Defense Logistics Agency (DLA). Be sure to click the link below to join our event list and stay updated. You won’t want to miss these insightful sessions!
We would like to extend our gratitude to all of our speakers from government and industry for sharing their insights and perspectives with our members and attendees. DLA Publishes Five Year Strategic Plan The Defense Logistics Agency (DLA) released its Strategic Plan for 2025-2030 , “DLA Transforms: A Call to Action.”
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content