Print PDF

Overview

Cybersecurity and data protection have never been more important for government contractors and their vendors. Sheppard Mullin’s Governmental Cybersecurity and Data Protection Team understands the government’s approach to cybersecurity, in its own systems and those of its contractors.  

Our team combines experts in cybersecurity, data protection, data privacy, and government contracts law to provide unparalleled advice to companies that sell products and services to the government (whether directly or indirectly), as they face rapidly-changing cybersecurity standards and requirements from a variety of government agencies. With deep relationships to government officials, we are called on by some of the largest and most prominent government contractors to guide them through the maze of laws, standards, and agency regulations regarding cybersecurity and cloud computing and assist them with government-specific aspects of incident response.

We understand that cybersecurity for government contractors is about protecting sensitive information – whether it’s classified data, Covered Defense Information (CDI), or controlled unclassified information (CUI) – as well as securing the supply chain, and preparing for and executing comprehensive and effective incident response. Our team closely monitors updates and provides counseling, practical guidance, and training to clients in a number of areas including:

  • Federal regulation compliance and best practices (to include FAR 52.204-21, DFARS 252.204-7012, and other agency-specific regulations)
  • The Department of Defense (DOD) Cybersecurity Maturity Model Certification (CMMC) Program
  • Executive Order No. 14028, Improving the Nation’s Cybersecurity
  • NIST publications, including NIST SP 800-171 and NIST SP 800-53
  • Controlled Unclassified Information (CUI) and Covered Defense Information (CDI)
  • Cloud computing, FedRAMP, and the DoD Cloud Authorization Process (SRG)
  • Software supply chain and secure software development issues (including attestation and artifact requirements, e.g., SBOMs)
  • Cybersecurity Supply Chain Risk Management (C-SCRM)
  • Voluntary and mandatory information sharing with federal agencies (e.g., the FBI, DoD, and DHS/CISA)
  • Contract flow-down requirements to subcontractors and vendors
  • Incident response
  • DOJ’s Civil Cyber Fraud Initiative and regulatory enforcement
  • DoD’s Joint Certification Program
  • Security clearances and the National Industrial Security Program Operating Manual (NISPOM)
  • Policies, plans, and procedures to include Data Retention, Data Classification, Incident Response, Information Security, System Security Plans, and Plans of Action and Milestones (POA&Ms)

Recognitions

Insights

Events

Events

Related Industries

Jump to Page

By scrolling this page, clicking a link or continuing to browse our website, you consent to our use of cookies as described in our Cookie and Advertising Policy. If you do not wish to accept cookies from our website, or would like to stop cookies being stored on your device in the future, you can find out more and adjust your preferences here.