New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause

The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Innovative, Sustainable, and Responsive: Food and Beverage Manufacturers Evolve for the New Economy

To satisfy customer requirements profitably, food and beverage (F&B) manufacturers must work at the pace of change, which has accelerated in regulations, consumer buying patterns, and the needs of retail, restaurant, and industrial foodservice customers. Know the three major challenges facing F&B manufacturers today and what they need to do to streamline their operations for greater efficiencies and waste reduction in order to survive.
  • Written By:
  • Published On:

6 Most Common ERP Implementation Mistakes: Ensuring the Success of Your Project

Implementing a new ERP system is one of the largest projects that most companies will undertake. Avoid these six mistakes, and your implementation project has a good chance of being successful.
  • Written By:
  • Published On:

Customer Analytics in the Age of Social Media

This TDWI Best Practices Report examines organizations’ current practices and future plans for customer analytics technology implementations, with a special focus on how organizations are adapting to the knowledge potential as well as challenges of social media networks. The report offers recommendations for achieving greater return on investment (ROI) from customer analytics processes.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Cybersecurity Review: Background, Threatscape, Best Practices, and Resources

Technological innovation has consistently leap-frogged security innovation primarily because security was not part of the initial design of the Internet. As Internet usage matures, the advances in cybersecurity continue to move forward. Read this white paper to learn about various types of threats and best practices for protecting your data.
  • Written By:
  • Published On:

The Watershed Moment in FISMA 2.0

The Federal Information Security Amendments Act of 2010 (FISMA 2.0) contains several major new provisions, the most significant of which may be a requirement that every agency’s security program include “continuous automated monitoring of information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency.” This paper examines the implications of this requirement and looks at a set of host-based services that can be used to monitor and manage mobile and remote endpoints.
  • Written By:
  • Published On:

Rapid Implementation: The New Age of ERP

For midsize firms seeking more value in a shorter period of time, a rapid enterprise resource planning (ERP) implementation may be the way to go. If you’re unsure this is the right choice, you need to consider some important factors. The best candidates tend to be ERP solution first-timers. Learn more about how to work closely with ERP partner vendors for a rapid—and successful—ERP implementation.
  • Written By:
  • Published On: