Category Archives: Department of Defense

Subscribe to Department of Defense RSS Feed

Defense Contractors to Face New Cost Accounting Oversight with Creation of Defense Cost Accounting Standards Board

Section 820 of the National Defense Authorization Act for Fiscal Year 2017 (“NDAA”) establishes a new Defense Cost Accounting Standards Board (“D-CASB”) to oversee the application of the Cost Accounting Standards (“CAS”) to defense contracts. The amendments made by Section 820 shall take effect on October 1, 2018.… Continue Reading

Defense Contracting Innovation in State of Flux

Note:  This post was originally published in the April 2017 issue of the National Defense Industrial Association’s National Defense magazine. Over the last few years, both the Department of Defense and Congress have been pursuing innovation in defense-related technologies, processes or methods — including research and development — from a variety of sources and through … Continue Reading

Insider Threat Programs – A New Challenge for Cleared Contractors

On May 18, 2016, the Department of Defense issued Conforming Change 2 of the “National Industrial Security Operating Manual” (“NISPOM”).   NISPOM Change 2 requires all U.S. government contractors who require access to U.S. classified information to implement an Insider Threat Program (“ITP”) that will gather, integrate and report relevant information related to potential or actual … Continue Reading

Department of Defense Updates Its Instruction for Acquisitions of Software and Weapons Systems

On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.”  The new Instruction is designed to assist acquisition personnel in tailoring the acquisition process to the specific item or system being purchased and to further the Department’s … Continue Reading

The Cybersecurity Race: Executive Branch Takes The Lead While Congress Watches From The Bleachers

The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent high-profile data breaches, the litigation threats surrounding those breaches, the recent identification of the encryption-disabling, consumer data threatening “Heartbleed SSL” OpenSSL vulnerability, and recent reports that … Continue Reading
LexBlog