This past week, Northern Alabama received a stark local reminder of the cyber threat danger. As reported by Leada Gore of al.com, Nick Lough of WAFF television, and Bloomberg, Chinese hackers infiltrated the regional office of a major security contractor’s computer networks over a three-year period. In addition to stealing some significant trade secrets, the hackers may have also gained access to sensitive U.S. Government information.
The threat of cyber attacks and network shutdowns are neither limited to companies selling to the Government nor foreign governments intent on stealing defense designs and plans. Rather, these threats extend to major U.S. industries that touch almost every facet of American lives and livelihood.
The Federal Government has worked diligently over the last several years to respond to the cyber threat. President Obama recently issued an Executive Order and Presidential Policy Directive that attempt to assist in the uniform creation of a cybersecurity protective “framework” for “critical infrastructure” industries with the ultimate goal of having these industries share cyber information with the Federal Government and with each other. DHS, DOD, Commerce, and ODNI have been tasked with addressing various aspects of the puzzle.
The major thrust of the Executive Order is to create common standards among these 16 critical infrastructure industries to share information regarding cyber attacks with the Federal Government. Equally importantly, the Executive Order sets up a framework under which the companies within these industries can voluntarily create standards for information sharing within each industry.
While information sharing is an excellent goal, the Federal Government recognizes that separate privacy-related legislation will bar the robust sharing of information in most industries and that companies are unlikely to want to provide the details of their lucrative intellectual property and R&D either within industries or to the Federal Government without equally robust controls.
A delicate balance must be struck between protecting the nation and data privacy. Coinciding with the Fifth Annual Cyber Summit in Huntsville, Alabama on June 6, 2013, we will explore and assist readers in unraveling this ‘Meereenese knot’ over the next several weeks. In so doing, we will identify the current efforts and challenges the Federal Government and critical infrastructure industries face as they tackle these issues as well as new and impending compliance requirements set forth in acquisition regulations.
- 4 Takeaways: GAO Bid Protest Annual Report to Congress for FY 2023
- FCC Space Bureau launches its Transparency Initiative
- Joshua Duvall Quoted by Law360 on Federal Court Decision Impacting the SBA 8(a) Program
- ALERT: SBA to Require All Individually-Owned 8(a)s to Affirmatively Establish Social Disadvantage
- Maynard Nexsen Shareholder to present at 2023 National HUBZone Conference
- Court Enjoins Rebuttable Presumption in 8(a) Program: What's Next for Future, Current Participants?
- Hello Q4: SBA Clarifies 8(a) Sole Source Rules, Individual 8(a)s Have More Options for Larger Awards
- DoD Issues Proposed Rule to Address Domestic Preferences for Defense Contracts
- Biden-Harris Administration to Launch New Initiative to Increase Federal Contracting with Small Disadvantaged Businesses
- FAR Alternatives on the Rise with Increase in Space and Technology Needs
- November 2023
- October 2023
- August 2023
- July 2023
- June 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- July 2022
- June 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- September 2019
- August 2019
- July 2019
- July 2017
- May 2017
- March 2016
- January 2013