-
Cybersecurity is central to national security
Advanced analytics transform vast unstructured collections of data into valuable natural resources and tools for projection of global power. With Big Data's emergence as the currency of global relations, cybersecurity—offensive and defensive—is essential to national security. -
Corporate transactions involving defense and intelligence Big Data require specialized experience
Companies handling national security–related Big Data are subject to unique contract requirements, regulatory burdens and risk exposures that must be addressed in pre-transaction diligence review and in merger, asset purchase and stock purchase agreements. -
Contractors support and conduct government data collection, processing and analytics
Government agencies with Big Data requirements rely on a network of private-sector contractors and subcontractors to provide the sensors and devices that gather data; the facilities, equipment and software to store and process that data into usable information; and the people, algorithms and analytical tools to produce intelligence that supports national security decisions. -
National security and intelligence information is pervasively regulated
Big Data in this sector involves sensitive information protected by a regulatory infrastructure that includes privacy laws, restrictions on sharing information among government agencies, industrial security safeguards for classified information, accreditation regimes for information systems and cloud services that handle government data, and restrictions on exports of controlled technical information.
Experience
-
Regularly advise information technology suppliers and service providers on defense and intelligence agency contract competitions, including evaluation of agency requirements, proposal preparation and bid protests.
-
Advise defense and intelligence agency contractors and subcontractors on patent, software and technical rights in devices and software products used to collect, manage and analyze government data.
-
Counsel cloud services companies on the Federal Risk Authorization Management Program cloud service accreditation program, data location constraints, secure transmission requirements and continuous monitoring programs.
-
Advise leading cloud service vendors on Federal Acquisition Regulation and Defense Federal Acquisition Regulation Supplement cybersecurity standards, cyber incident reporting requirements and “insider threat” program requirements.
-
Advise information technology and analytics contractors on nontraditional contracting instruments available through the Defense Department's Defense Innovation Unit Experimental technology acceleration office; cooperative research and development agreements with federal laboratories; “other transaction” agreements with the Defense Advanced Research Projects Agency, Intelligence Advanced Research Projects Activity, the Homeland Security Advanced Research Projects Agency and the Advanced Research Projects Agency-Energy; and In-Q-Tel technology investment agreements.