GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Risk Management / Regulatory content

Cybersecurity: Network Monitoring Program Needs Further Guidance and Actions

Cybersecurity: Network Monitoring Program Needs...

Federal agencies are making strides in reducing cybersecurity risks thanks to the Continuous Diagnostics and Mitigation (CDM) program, but significant gaps remain. While CDM has improved agencies’ ability to respond…

Learn More
Anticipating AI’s Impact on the Cyber Offense-Defense Balance

Anticipating AI’s Impact on the Cyber...

As artificial intelligence becomes more embedded in cybersecurity, its influence on the offense-defense balance is growing—but in unpredictable ways. AI could strengthen defenders by automating patching, hardening networks, and identifying…

Learn More
Caregiving: HHS Should Clarify When Youth May Qualify for Support Services

Caregiving: HHS Should Clarify When Youth May...

The GAO reviewed how the Department of Veterans Affairs manages its healthcare providers’ professional credentials and found notable weaknesses. Thousands of providers had expired or potentially invalid licenses, which could…

Learn More
Securing AI: Addressing the OWASP Top 10 for Large Language Model Applications

Securing AI: Addressing the OWASP Top 10 for Large...

As artificial intelligence systems become more embedded in critical infrastructure and decision-making, securing them is no longer optional. This report breaks down the top 10 security vulnerabilities facing large language…

Learn More
Ceres 10-Point Plan for the Insurance Industry

Ceres 10-Point Plan for the Insurance Industry

The Ceres 10-point plan provides a comprehensive roadmap for insurers, regulators, local governments, community groups, and investors to collaborate on ensuring the industry’s resilience. By taking bold action, embracing innovation,…

Learn More
Navigating Climate Risks: Progress and Challenges in U.S. Insurance Sector Disclosures

Navigating Climate Risks: Progress and Challenges...

This report is the second annual analysis Ceres has conducted of major U.S. insurers’ climate risk strategies by examining the disclosures companies are making under the National Association of Insurance…

Learn More
Driving Efficient Acquisition of Artificial Intelligence in Government

Driving Efficient Acquisition of Artificial...

As federal agencies ramp up AI adoption, this OMB memorandum outlines how to responsibly and efficiently acquire AI systems while safeguarding privacy, civil liberties, and public trust. It emphasizes minimizing…

Learn More
Accelerating Federal Use of AI through Innovation, Governance, and Public Trust

Accelerating Federal Use of AI through Innovation,...

The Office of Management and Budget issued new guidance to accelerate federal agency adoption of AI while maintaining public trust and responsible governance. Agencies are directed to reduce bureaucratic barriers,…

Learn More
Timing of Judicial Review of Agency Action: Limiting Review After a Period of Time

Timing of Judicial Review of Agency Action:...

This report examines the legal complexities surrounding when and how judicial review of federal agency actions can be time-barred. It explores general and special statutory limitations, such as the six-year…

Learn More
Dams Sector Waterside Barriers Guide

Dams Sector Waterside Barriers Guide

The Dams Sector Waterside Barriers Guide, published by CISA, provides dam owners and operators with guidance on using waterside barriers to protect critical infrastructure from water-based threats such as swimmers,…

Learn More
Dams Sector: Personnel Screening Guide for Owners and Operators

Dams Sector: Personnel Screening Guide for Owners...

The Dams Sector Personnel Screening Guide by CISA provides owners and operators of dams, levees, and related infrastructure with strategies to mitigate insider threats through effective pre-employment screening. It outlines…

Learn More
Continuous Authorization to Operate (cATO) Implementation Playbook

Continuous Authorization to Operate (cATO)...

In today’s rapidly evolving cyber environment, obtaining an initial Authorization to Operate (ATO) under the Risk Management Framework (RMF) can take anywhere from 6 to 36 months. Given the complexity…

Learn More
Incident Response Recommendations and Considerations for Cybersecurity Risk Management

Incident Response Recommendations and...

The April 2025 revision of NIST SP 800-61 provides updated guidance for integrating incident response into broader cybersecurity risk management efforts, aligned with the NIST Cybersecurity Framework (CSF) 2.0. It…

Learn More
Government AI Hire, Use, Buy (HUB) Roundtable Series

Government AI Hire, Use, Buy (HUB) Roundtable...

Roundtable 3: Government as a Buyer of AI As AI technologies advance, federal agencies face mounting challenges in responsibly procuring and managing AI tools. Roundtable participants emphasized the need for…

Learn More
Fast Flux: A National Security Threat

Fast Flux: A National Security Threat

Fast flux is a DNS-based evasion technique that allows malicious actors to hide their infrastructure and maintain resilient command-and-control operations. This tactic rapidly changes IP addresses linked to malicious domains,…

Learn More