
Brian Finch
Articles
-
Aug 20, 2024 |
jdsupra.com | Meghan Doherty |Brian Finch |Aaron Ralph
The DoD takes yet another step towards full implementation of CMMC 2.0.Takeaways The proposed rule aims to implement many of the aspects of the Cybersecurity Maturity Model Certification program by amending the Department of Defense Federal Acquisition Regulation Supplement. Under the proposed rule, self-assessment or certification results will be required to be transmitted to the Supplier Performance Risk System at the time of award for the offeror to be eligible for award.
-
Apr 10, 2024 |
jdsupra.com | Brian Finch |Lee Petro |Elizabeth Zimmer
[co-authors: Austin Chegini and Samuel Reno]TAKEAWAYS Most businesses in the United States will have to file incident reports—including for ransomware payments—under the Proposed Rule. The Department of Homeland Security has the authority to issue subpoenas and even penalties for noncompliance with the rule. Comments are due by June 3, 2024.
-
Jan 19, 2024 |
jdsupra.com | Meghan Doherty |Brian Finch |Aaron Ralph
Contractors should take steps now to ensure that they will be able to meet the requirements of the Cybersecurity Maturity Model Certification Program. TAKEAWAYS The proposed rule requires contractors to make annual affirmations regarding their cybersecurity maturity, thus increasing their risk of False Claims Act Liability.
-
Nov 22, 2023 |
jdsupra.com | Brian Finch |Aimee Ghosh |Amaris Trozzo
In the United States, the CRI pledge would only limit payments by the federal government, not state and local governments nor private-sector entities. TAKEAWAYS The International Counter Ransomware Initiative (CRI) convened in Washington, DC, from October 30 – November 1 for its third annual meeting and reaffirmed the commitment to build collective resilience to ransomware attacks.
-
Jun 12, 2023 |
mondaq.com | Alicia McKnight |Brian Finch
Although that new smart refrigerator might seem like a fun gadget and great way to sync up grocery lists, smart appliances have the potential to become vectors in malicious power grid attacks. Or what about the increasingly popular addition of a solar plus storage solution or an EV charging station in individual homes? These home energy hubs, connected to the power grid and often linked with a host of devices via a mobile phone, pose another layer of risk that is only beginning to be explored.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →