Home
 > Research and Reports > White Papers > New DoD Regulations for the Cybersecurity Age: Implem...

New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause

Source: Aronson LLC
The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.


Featured publications:

Innovative, Sustainable, and Responsive: Food and Beverage Manufacturers Evolve for the New Economy
Source: Cambashi To satisfy customer requirements profitably, food and beverage (F&B) manufacturers must work at the pace of change, which has accelerated in regulations, consumer buying patterns, and the needs of retail, restaurant, and industrial foodservice customers. Know the three major challenges facing F&B manufacturers today and what they need to do to streamline their operations for greater efficiencies and waste reduction in order to survive. Read More...
6 Most Common ERP Implementation Mistakes: Ensuring the Success of Your Project
Source: Decision Resources, Inc. Implementing a new ERP system is one of the largest projects that most companies will undertake. Avoid these six mistakes, and your implementation project has a good chance of being successful. Read More...
Customer Analytics in the Age of Social Media
Source: TDWI Read this Best Practices Report from The Data Warehousing Institute (TDWI) on capturing and analyzing social media networking activity - the new frontier for customer intelligence. Read More...


You may also be interested in these related documents:

Cybersecurity Review: Background, Threatscape, Best Practices, and Resources
Source: Eset Technological innovation has consistently leap-frogged security innovation primarily because security was not part of the initial design of the Internet. As Internet usage matures, the advances in cybersecurity continue to move forward. Read this white paper to learn about various types of threats and best practices for protecting your data. Read More...
The Watershed Moment in FISMA 2.0
Source: Fiberlink The Federal Information Security Amendments Act of 2010 (FISMA 2.0) contains several major new provisions, the most significant of which may be a requirement that every agency’s security program include “continuous automated monitoring of information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency.” This paper examines the implications of this requirement and looks at a set of host-based services that can be used to monitor and manage mobile and remote endpoints. Read More...
Rapid Implementation: The New Age of ERP
Source: InfoWorld For midsize firms seeking more value in a shorter period of time, a rapid enterprise resource planning (ERP) implementation may be the way to go. If you’re unsure this is the right choice, you need to consider some important factors. The best candidates tend to be ERP solution first-timers. Learn more about how to work closely with ERP partner vendors for a rapid—and successful—ERP implementation. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.