GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Risk Management / Regulatory content

Streamlining Compliance and Enhancing Security with RegScale’s Continuous Controls Monitoring Platform

Streamlining Compliance and Enhancing Security...

RegScale overcomes limitations in legacy GRC by bridging security, risk, and compliance through our Continuous Controls Monitoring platform. Our CCM pipelines of automation, dashboards, and AI tools deliver lower program…

Learn More
Understanding and Responding to Distributed Denial-Of-Service Attack

Understanding and Responding to Distributed...

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint distributed denial-of-service (DDoS) attack…

Learn More
H.R. 7521 Regulation of TikTok: Analysis of Selected Legal Issues

H.R. 7521 Regulation of TikTok: Analysis of...

On March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…

Learn More
Artificial Intelligence & Medical Products:  How CBER, CDER, CDRH, and OCP are Working Together

Artificial Intelligence & Medical Products: How...

The complex and dynamic processes involved in the development, deployment, use, and maintenance of AI technologies benefit from careful management throughout the medical product life cycle. Specifically, end-to-end management of…

Learn More
Wildfire Sensor Technology

Wildfire Sensor Technology

Wildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…

Learn More
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

PRC State-Sponsored Actors Compromise and Maintain...

As the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…

Learn More
Engaging with Artificial Intelligence (AI)

Engaging with Artificial Intelligence (AI)

The purpose of this publication is to provide organizations with guidance on how to use AI systems securely. The paper summarizes some important threats related to AI systems and prompts…

Learn More
Application of the Hybrid Satellite Network Cybersecurity Framework Profile

Application of the Hybrid Satellite Network...

The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The…

Learn More
World Economic Forum Risk Forecast 2024

World Economic Forum Risk Forecast 2024

Leaders from across the globe met in Davos, Switzerland in early January to discuss economic and risk issues facing the world in 2024. The top ten risks forecast by the…

Learn More
The Impact of Disasters on Agriculture and Food Security

The Impact of Disasters on Agriculture and Food...

Disasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…

Learn More
How to Defend Against Insider Threat

How to Defend Against Insider Threat

Insider threat and insider risk are critical issues for any company looking to do business with the federal government or stay in business and protect their bottom line. Insider risk…

Learn More
The Promise and Peril of the AI Revolution: Managing Risk

The Promise and Peril of the AI Revolution:...

It is the premise of so many science fiction movies: technology surpasses human intelligence, wreaks havoc and ultimately takes over humankind. While that movie has not yet happened in real…

Learn More
Suite of Tools for the Analysis of Risk (STAR)

Suite of Tools for the Analysis of Risk (STAR)

This fact sheet describes the Suite of Tools for the Analysis of Risk (STAR), an innovative engine for forward-looking, functional risk assessment of critical infrastructure (CI) at the national scale.…

Learn More
Risk Vectors Diversify!

Risk Vectors Diversify!

Diverse Risk Vectors easily complicate the management of global material risk and opportunities. This white paper untangles this complex and risky world. The art of Risk Governance that oversees planning,…

Learn More
Developing Supply Chain Risk Management (SCRM) Initiatives in the Federal Government

Developing Supply Chain Risk Management (SCRM)...

Supply Chain Risk Management (SCRM) plays a crucial role in safeguarding the integrity and security of supply chains within the Federal government. With increasing reliance on technology, there is a…

Learn More