{"id":1191,"date":"2025-07-02T10:50:11","date_gmt":"2025-07-02T14:50:11","guid":{"rendered":"https:\/\/blogs.duanemorris.com\/techlaw\/?p=1191"},"modified":"2025-07-16T09:42:55","modified_gmt":"2025-07-16T13:42:55","slug":"webinar-a-guide-on-cybersecurity-and-other-controlled-information-compliance-for-govt-contractors","status":"publish","type":"post","link":"https:\/\/blogs.duanemorris.com\/techlaw\/2025\/07\/02\/webinar-a-guide-on-cybersecurity-and-other-controlled-information-compliance-for-govt-contractors\/","title":{"rendered":"Webinar:  A Guide on  Cybersecurity and Other Controlled Information Compliance for Gov&#8217;t Contractors"},"content":{"rendered":"\n<p>Duane Morris will present a webinar,\u00a0<strong><a href=\"https:\/\/www.duanemorris.com\/events\/navigating_false_claims_act_govt_contractors_guide_compliance_cybersecurity_0725.html\" data-type=\"link\" data-id=\"https:\/\/www.duanemorris.com\/events\/navigating_false_claims_act_govt_contractors_guide_compliance_cybersecurity_0725.html\" target=\"_blank\" rel=\"noreferrer noopener\">Navigating the False Claims Act for Government Contractors:\u00a0A Guide on Compliance with Requirements Relating to Cybersecurity and Other Controlled Information<\/a><\/strong>, on Tuesday, July 15 at 12:00 p.m. Eastern.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/emarketing.duanemorris.com\/195\/4116\/landing-pages\/rsvp-website.asp?intIaContactId=ZRqG6hEKGGZuPHpcq2OppQ%3d%3d\" data-type=\"link\" data-id=\"https:\/\/emarketing.duanemorris.com\/195\/4116\/landing-pages\/rsvp-website.asp?intIaContactId=ZRqG6hEKGGZuPHpcq2OppQ%3d%3d\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>REGISTER<\/strong><\/a><\/p>\n\n\n\n<p>Our speakers will discuss:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Steps contractors need to take in order to get ahead of the wave of cybersecurity regulations coming later this year.<\/li>\n\n\n\n<li>The Cybersecurity Maturity Model Certification compliance framework being implemented by the DOD;<\/li>\n\n\n\n<li>The data security program that the DOJ has implemented this year and what entities need to know and do to comply with its requirements;<\/li>\n\n\n\n<li>An overview of key Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity compliance requirements that companies must follow in order to be awarded new DOD contracts;<\/li>\n\n\n\n<li>Existing cybersecurity and export control requirements rules that federal government contractors must abide by; and<\/li>\n\n\n\n<li>Steps contractors need to take in order to get ahead of the wave of cybersecurity regulations coming later this year.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Duane Morris will present a webinar,\u00a0Navigating the False Claims Act for Government Contractors:\u00a0A Guide on Compliance with Requirements Relating to Cybersecurity and Other Controlled Information, on Tuesday, July 15 at 12:00 p.m. Eastern.\u00a0 REGISTER Our speakers will discuss:<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1053],"tags":[197,1237,1160,1238,1239,759],"ppma_author":[878],"class_list":["post-1191","post","type-post","status-publish","format-standard","hentry","category-security","tag-cybersecurity","tag-dod","tag-doj","tag-false-claims-act","tag-government-contractor","tag-webinar"],"authors":[{"term_id":878,"user_id":6,"is_guest":0,"slug":"duanemorris3","display_name":"Duane Morris","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/843ff6e7a8fe5fc92109b47a45f34b6cf0ea499e6e788db23456c838b0ae6747?s=96&d=blank&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/1191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/comments?post=1191"}],"version-history":[{"count":0,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/1191\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/media?parent=1191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/categories?post=1191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/tags?post=1191"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/ppma_author?post=1191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}