GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Risk Management / Regulatory content

Drug Enforcement Administration: National Drug Threat Assessment 2024

Drug Enforcement Administration: National Drug...

The 2024 National Drug Threat Assessment (NDTA) highlights the dangerous shift from plant-based drugs to synthetic drugs. This annual assessment provides law enforcement agencies, policy makers, and prevention and treatment…

Learn More
Improving OSHA Incident Tracking with Jira Service Management

Improving OSHA Incident Tracking with Jira Service...

Managing government Property, Plant, and Equipment systems is a time-consuming task. It usually means dealing with multiple spreadsheets, disparate data, and piles of paperwork. The challenge grows with the strict…

Learn More
#StopRansomware: Phobos Ransomware

#StopRansomware: Phobos Ransomware

Phobos is structured as a ransomware-as-a-service model. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S.…

Learn More
#StopRansomware: Black Basta

#StopRansomware: Black Basta

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services , and Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity…

Learn More
Post-Quantum Cryptography for the Public Sector

Post-Quantum Cryptography for the Public Sector

Quantum computing will disrupt major industries sooner than you think. Organizations across the globe are currently stepping up their investment in this technology to remain competitive and to ensure their…

Learn More
Assessing Methods to Integrate the Physical Risks and Transition Risks and Opportunities of Climate Change

Assessing Methods to Integrate the Physical Risks...

The Federal Government has broad exposure to the physical risks of climate change and the transition risks associated with the global shift away from carbon-intensive energy sources. At the same…

Learn More
Putting Teeth into AI Risk Management: Lessons from Cybersecurity Procurement Rules and Practices

Putting Teeth into AI Risk Management: Lessons...

President Biden’s October 2023 executive order prioritizes the governance of artificial intelligence in the federal government, prompting the urgent creation of AI risk management standards and procurement guidelines. Soon after…

Learn More
Streamlining Compliance and Enhancing Security with RegScale’s Continuous Controls Monitoring Platform

Streamlining Compliance and Enhancing Security...

RegScale overcomes limitations in legacy GRC by bridging security, risk, and compliance through their Continuous Controls Monitoring platform. Their CCM pipelines of automation, dashboards, and AI tools deliver lower program…

Learn More
Understanding and Responding to Distributed Denial-Of-Service Attack

Understanding and Responding to Distributed...

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint distributed denial-of-service (DDoS) attack…

Learn More
H.R. 7521 Regulation of TikTok: Analysis of Selected Legal Issues

H.R. 7521 Regulation of TikTok: Analysis of...

On March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…

Learn More
Artificial Intelligence & Medical Products:  How CBER, CDER, CDRH, and OCP Are Working Together

Artificial Intelligence & Medical Products: How...

The complex and dynamic processes involved in the development, deployment, use, and maintenance of AI technologies benefit from careful management throughout the medical product life cycle. Specifically, end-to-end management of…

Learn More
Wildfire Sensor Technology

Wildfire Sensor Technology

Wildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…

Learn More
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

PRC State-Sponsored Actors Compromise and Maintain...

As the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…

Learn More
Engaging with Artificial Intelligence (AI)

Engaging with Artificial Intelligence (AI)

The purpose of this publication is to provide organizations with guidance on how to use AI systems securely. The paper summarizes some important threats related to AI systems and prompts…

Learn More
Application of the Hybrid Satellite Network Cybersecurity Framework Profile

Application of the Hybrid Satellite Network...

The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The…

Learn More