Photo of Evan D. Wolff

In this episode, hosts Evan Wolff and Kate Growley talk about what government contractors need to know about NIST SP 800-53. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud | Apple Podcasts 

In this episode, hosts Evan Wolff and Kate Growley talk with Michael Gruden about what government contractors need to know about covered defense information or CDI. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud |

In this episode, hosts Evan Wolff and Kate Growley talk with Michael Gruden about what government contractors need to know about controlled unclassified information or CUI. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud |

In this episode, hosts Evan Wolff and Kate Growley talk with Michael Gruden about what government contractors need to know about Federal Contract Information or FCI. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud |

The National Institute of Standards and Technology (NIST) recently released the final version of NIST Special Publication (SP) 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information. Designed to supplement the requirements in NIST SP 800-171—the applicable standard under DFARS 252.204-7012—800-172 provides 35 enhanced security requirements to protect controlled unclassified information (CUI) associated with

In this episode, hosts Evan Wolff and Kate Growley talk about what government contractors need to know about advanced persistent threats – or APTs. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud | Apple Podcasts 

In this episode, hosts Kate Growley and Evan Wolff talk about the concepts of confidentiality, integrity, and availability in the cybersecurity context. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com | PodBean | SoundCloud | Apple Podcasts 

The Department of Defense (DoD) recently implemented additional procedures for the mitigation of cybersecurity risks in its supply chain. Designed to identify and mitigate cybersecurity and related supply chain risks throughout a program’s lifecycle, DoD Instruction 5000.90, Cybersecurity Acquisition Decision Authorities and Program Managers, requires program managers to:

  • Assess contractors’ cybersecurity posture, including, where

In this episode, hosts Evan Wolff and Kate Growley talk about what government contractors need to know about the Internet of Things and the recently passed IoT Cybersecurity Improvement Act. Crowell & Moring’s “Byte-Sized Q&A” podcast takes the complex world of government contracts cybersecurity and breaks it down into byte-sized pieces.

ListenCrowell.com |

This week, the DoD announced the first group of pilot programs under the Cybersecurity Maturity Model Certification. Although still under review, these programs will likely be among a small group to issue solicitations in FY2021 that will require a CMMC certificate to be eligible for award. The DoD expects to identify eight other programs