Sign Up For Our Weekly Emails
Get the latest updates on special offers, courses, events, webinars and books from Federal Publications Seminars.
Thank You
You'll soon be receiving updates about special offers, events, & more.
Get 10% Off Your Next Purchase
Sign Up For Our Emails
Thank You
You'll soon be receiving updates about special offers, events, & more.
Digital transformation has been constantly accelerating over the last 25 years.  Foundational cybersecurity laws such as the E-Government Act of 2002, which included the Federal Information Systems Management Act (FISMA) were written at the turn of the 21st Century. The first half of the 2010’s saw the rapid proliferation of cyber threats from criminals and nation states, both threatening the functioning of essential Government services and eroding U.S. technological advantages in military, space and national security technologies. These ubiquitous malicious cyber actors pose a clear and present danger to the safety, security and privacy that Americans expect their Government to provide.The rapidly evolving technological and threat environment poses a challenge to the Nation’s intentionally slow and deliberate legislative and regulatory processes.

Government contractors play a major role in developing and delivering products and services to the Government, but reliance on contractors introduces additional avenues of potential cyber threats.  Since 2015, the Departments of Defense (DoD) and Homeland Security (DHS), the General Services Administration (GSA), the National Archives and Records Administration (NARA) and the National Institute of Standards & Technologies (NIST), have played key roles in developing and implementing policies and technologies to enhance the Nation’s cybersecurity.  These include DoD’s Safeguarding Covered Defense Information and Cyber Incident Reporting Rule (“DFARS -7012”), NIST’s Special Publication 800-171 (“SP 800-171”), GSA’s FedRAMP Program, and the new Cybersecurity Maturity Model Certification (CMMC) initiative.
These regulations, though confusing and cumbersome, are the first defense to keeping data and information secure as well as protecting the intellectual property of organizations. 

In this day-long program which kicks off a full week of lectures and hands-on interactive exercises, you will learn about:

Cyber Threats and Legal/Regulatory Responses
OPM Breach; NotPetya; Solarwinds; Hafnium; Navy SeaDragon; Insider Threats

The Framework of Cybersecurity Law 
FISMA (2002); Cybersecurity Information Sharing Act (2015); Cybersecurity and Infrastructure Security Agency Act (2018); Executive Orders concerning Cybersecurity (2021), Controlled Unclassified Information (2010) ,and Critical Infrastructure Security (2013); OMB Guidance; NARA’s CUI Rule; NIST SP’s 800-171, 800-53 and others; DoD and other Agency Rules; and the CMMC Initiative

Privacy Laws and Cybersecurity
The Privacy Act; The FAR Regulations; Fair Information Practices; HIPAA (Health Insurance Portability and Accountability Act); State Security Breach Laws; Data Breach Litigation; General Data Protection Regime (GDPR)

Cloud Computing, Security and Acquisitions
Defining the Cloud; Cloud Basics; Securing the Cloud; The FedRAMP Program; Cloud Acquisition; Cyber Risks

Upon completion, you will:
  • Identify the regulatory framework guiding cyber policy
  • Identify and determine the laws governing cyber related issues
  • Determine which regulations your organization may need to comply when doing business with the government
  • Understand the framework and organizations driving the cyber laws.
No upcoming dates/locations at this time
8:00 AM - 3:00 PM
La Jolla, CA and Hilton Head, SC
9:00 AM - 4:00 PM

Federal Information Security Laws and Standards

1.     Data Breaches/Consequences

2.     Critical Infrastructure Threats

3.     Scope of Digital Threats

4.     Personal Data and ID Threats

5.     Economic Espionage and Trade Secrets

6.     Intellectual Property

7.     Targeting U.S. Technologies

8.     Impact on Business and Industry

Cyber in the Public Sector

1.     Federal Data Treasure Trove

2.     Hackers and Their Targets

3.     Interdependence of Public and Private Sectors

4.     Federal IT Spending

5.     Federal Security Spending

6.     Global Cyber Markets

7.     Information Sharing

8.     Privacy and Cybersecurity

9.     Information Security Laws and Guidance

a.     Federal Information Security Management Act (FISMA)

b.     NIST Standards

c.     OMB Guidance

d.     FAR/DFARS

10.   DoD Cyber Rules/GSA Regulations and Policy

Lunch Break

Federal Privacy Laws and Cybersecurity

1.     Federal, State, and International Privacy Laws

2.     Financial Institutions; Health Care Industry; Education; Telecommunications

3.     The Privacy Act/The FAR Regulations

4.     Privacy Breaches

5.     Fair Information Practices

6.     HIPAA (Health Insurance Portability & Accountability Act)

7.     State Security Breach Laws

8.     State Security Enforcement

9.     Data Breach Litigation

10.   Commercial Litigation

Cloud Computing, Security and Acquisitions

1.     Defining the Cloud

2.     NIST and GAO Definitions

3.     Securing the Cloud

4.     Key Security Issues

5.     The FedRAMP Program

6.     Cloud Acquisition

7.     Cyber Risks

a.     False Claims Act Actions

b.     Suspensions

c.     Protests

d.     Shareholders

e.     Investigations

8.     Cyber Executive Orders

9.     International Law

10.   Summary and Resources

  • Jeffery M. Chiow
    Shareholder, RJO
    Mr. Chiow is co-chair of the firm’s Government Contracts Practice Group. He represents clients in litigation and government investigations that usually have some nexus to a government contract. He also provides counsel on business and compliance issues, delivering creative and pragmatic soluti...
See Individual Courses For Available Credits
Certificates of Completion are provided to all seminar participants who attend Federal Publications Seminars courses following the event, upon request.
CPE: Continuing Professional Education
Field of Study: Specialized Knowledge
Delivery Method: Group-Live Classroom
Federal Publications Seminars is affiliated with West Professional Development and is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:
For more information regarding administrative policies such as refunds, cancellations and complaints, please contact Federal Publications Seminars at 888.494.3696.
CPE Hours
This program is eligible for: 6.0 (CPE) hours of credit
Program Level: na
Program Prerequisite: na
Advance Preparation: na
Method: na
CLP: Continuous Learning Points
Approved for CLP by Defense Acquisition University
Defense Acquisition Workforce members must acquire 80 Continuous Learning Points (CLP) every two years from the date of entry into the acquisition workforce for as long as the member remains in an acquisition position per DoD Instruction 5000.66. We will provide you with documentation of points awarded for completing the event.
CLP Hours
This program is eligible for: 6.0 (CLP) hours of credit
CLE: Continuing Legal Education
States have widely varying regulations regarding MCLE credit. LegalEdcenter is an approved provider in AL, AK, AR, CA, GA, IL, ME, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, PA, RI, SC, TN, TX, UT, VA, VI, VT, WA, WI, and WV. Credit may be applied for in other jurisdictions on request and in accordance with state MCLE rules.
Please note that because some states are changing their policy on CLE reporting, you will need to fill out the request for credit from Federal Publications Seminars within 10 business days, or we may not be able to issue credits for the program.
CLE Hours
This program is eligible for: 5.5 (60 minutes), (50 minutes)
No travel information is available at this time
Bring Federal Publications Seminars to your location! If you would like to offer this course in-house, please contact us.
Schedule Training
Fill out this form and someone from FPS will contact you shortly. You can fill out as much or as little information as you would like. Prefer to talk to us? Call 888.865.9082.
Thank You
You will be contacted shortly.
  • 100
    Basic or fundamental subject matter is covered. Courses are geared to general knowledge or can be taken as a refresher.
  • 200
    Specific topics or issues within a topic area are covered. Students should be familiar with terms of art and general concepts concerning the course topic.
  • 300
    Workshops and class discussions cover specific subject matter in-depth, and participation is strongly encouraged. Attendees should have at least 2-3 years' experience in the area of study.
  • 400
    Courses build upon students' knowledge and experience, and cover complex issues within the subject matter. Should have 4-5 years' mastery of subject for in-depth analysis.
  • 500
    Masters-level programs designed for professionals with 5+ years' experience. Courses cover in-depth and technical analysis on specific subjects and updates on current issues.