Compliance, Data Loss Prevention

Cyber Incident Reporting Compliance for Federal Contractors

By Veriato Team

We recently discussed data security requirements for federal contractors and now we are doing a deeper dive into one of the trickier compliance factors: reporting cyber incidents.

What is a cyber incident?

Federal contractors use and have access to sensitive government data, and as such it is their duty to manage that information responsibly. Data security protocol has changed in the last year to more tightly protect those materials. Federal contractors are now required to rapidly report cyber incidents to the Department of Defense.

The DoD defines a cyber incident as “actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.” Even if the actual government data wasn’t attacked, any breach to a covered contractor information system must be reported so the DoD can assess risk to the information.

Reporting requirements

If you experience a cyber incident as defined above, federal regulation mandates you to report it “rapidly” – defined as within 72 hours of discovery of the breach. Additionally, you need to “conduct a review for evidence of covered defense information,” such as identifying compromised computers, servers, and accounts, as well as identifying exactly which data was breached.

For federal contractors, a network compromise is defined as “disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred.” You are required to file a report even if there is only evidence to suggest an attack might have happened. Those attacks can come through an insider to your organization or an outside hacker, whether with malicious intent or through error.

Cyber Incident Prevention + Response

With the complexity of this industry, it is almost inevitable that contractors will experience a cyber incident at some point. Investing in data security tools and creating a response plan are vital elements to any contractor’s business plan. With sensitive data, it is your responsibility to monitor that information for evidence of network attack.

Monitoring software, such as technology created by Veriato, tracks user activity to make sure your data isn’t being accessed by someone who shouldn’t have it, or in a suspicious way. If any behavior is flagged, you can access a factual, comprehensive look at the incident to understand what happened, and prevent future breaches. Additionally, you’ll have a robust report for the DoD, which will build your reputation and prevent negative effects.

Investing in monitoring software as part of your security plan will improve your data protection and help with cyber incident reporting compliance, because you’ll have a better situation assessment within the 72-hour time period

2023 Preparedness Checklist: Ensure Your Workforce Is Productive and Secure

This guide will help you understand where there are opportunities and risks in your workforce, and what you can do to make sure 2023 is as secure and productive as possible with workforce behavior analytics.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Productivity & Insider Risk Resources

Elizabeth Harz RSAC 2023 Interview

Elizabeth Harz RSAC 2023 Interview

Elizabeth Harz, CEO of Veriato, gave an interview to ISMG at this year's RSA Conference in San Francisco. In it, Elizabeth covers the challenges of maintaining data security in the remote or hybrid workforce environment and the rising cost of data breaches. She also...

A More Insightful, Proactive Approach to Employee Monitoring

A More Insightful, Proactive Approach to Employee Monitoring

Also known as “bossware” and even “employee surveillance”, employee monitoring has been placed in the bucket of technologies that companies force on their employees. Whatever you call it, its use is on the rise and it looks like it’s here to stay. As of 2022, 60% of...

Bossware and the Future of Work

Bossware and the Future of Work

Recently, there has been considerable coverage of “bossware” and a focus on draconian types of “surveillance” some companies are using to stay on top of remote and flexible workforces. Articles claim companies are accessing the camera on laptops and tracking every...