For years, cybersecurity in federal contracting was treated primarily as a compliance exercise. Requirements existed, audits occurred and gaps were remediated over time. The consequences of falling short were typically operational, not existential. That dynamic is now changing with the use of one of the federal government’s most powerful legal tools: the False Claims Act.
This is not a new law, but its application to cybersecurity is reshaping how risk should be understood at the executive level. The implications extend well beyond the defense sector and are increasingly relevant to any company participating in federal procurement more broadly.
How The FCA Applies To Cybersecurity
The FCA was designed to address fraud against the federal government. It imposes liability on organizations that knowingly submit false claims for payment or make false statements that are material to those claims. The financial exposure is significant, including treble damages and statutory penalties that can scale quickly depending on the number of claims involved. What has evolved is the definition of what constitutes a “false statement.”
Historically, enforcement focused on financial misrepresentation. Today, the Department of Justice is applying the same framework to cybersecurity. When a company represents that it has implemented required controls, meets specific standards or maintains a defined security posture as part of a federal contract, those representations carry legal weight.
If they are materially inaccurate, the issue is no longer a compliance gap. It becomes a potential FCA matter.
This approach was formalized through the DOJ’s Civil Cyber-Fraud Initiative, which made explicit that cybersecurity misrepresentations tied to government contracts would be pursued using this statute.
What Recent Enforcement Activity Shows
Recent settlements illustrate how this is being applied in practice:
- Morsecorp agreed to pay $4.6 million to resolve allegations that it overstated its implementation of required cybersecurity controls. The core issue was not simply that controls were incomplete, but that the company’s reported posture differed materially from what a third-party assessment later identified.
- Penn State agreed to pay $1.25 million in a separate matter involving allegations that it failed to implement required controls and misrepresented its timelines for doing so across multiple federal contracts.
Additional cases involving large contractors and research institutions follow a consistent pattern. The government is focusing on the gap between representation and reality rather than the mere existence of deficiencies.
It is also important to understand the nature of these outcomes. Most of these matters are resolved through civil settlements without admissions of liability. That does not diminish their impact. The financial penalties, investigative burden and reputational considerations are substantial.
Why Enforcement Is Accelerating Now
There are several structural factors driving this trend. Cybersecurity requirements such as the Cybersecurity Maturity Model Certification have become more explicit and more deeply embedded in federal contracts. What was once guidance has increasingly become a condition of award and payment, particularly as requirements tied to NIST Special Publication 800-171 and related controls are enforced through contractual clauses. With the Department of Defense moving into phased implementation, including key milestones in November 2025 and November 2026 tied to contract eligibility and certification requirements, these obligations are no longer theoretical. They are being operationalized across active procurement.
At the same time, contractors are generating more formalized and traceable records of their cybersecurity posture to comply with the CMMC requirements. Self-assessments are no longer informal exercises. Organizations are required to submit scores into the Supplier Performance Risk System, maintain system security plans, track plans of action and milestones and, in many cases, provide periodic affirmations of compliance by senior leadership. These elements create a documented and time-stamped record of what the organization has represented to the government.
The FCA operates most effectively in environments where documentation exists and where discrepancies between representation and reality can be demonstrated. Cybersecurity, and CMMC specifically, now fits that model with increasing precision. The combination of SPRS scores, written affirmations and supporting documentation creates a clear evidentiary trail.
In parallel, the statute’s qui tam provisions continue to incentivize whistleblowers. In an environment where internal teams, consultants or former employees often have direct visibility into gaps between stated and actual security posture, this creates a steady and scalable pipeline of potential cases.
Taken together, these dynamics are not introducing a new enforcement mechanism. They are enabling an existing one to operate with far greater consistency and reach across the federal contracting ecosystem.
The Expanding Role Of GSA In Cybersecurity Enforcement
Much of the early focus on cybersecurity compliance has been centered on the defense industrial base. That focus is now broadening, and the General Services Administration is playing a key role in that shift. GSA functions as the procurement backbone for civilian federal agencies. Through its Multiple Award Schedule program and other government-wide acquisition vehicles, it establishes baseline requirements that extend across a wide range of contractors.
What is emerging within GSA contracting is a more structured approach to cybersecurity that increasingly mirrors the rigor seen in defense environments. Requirements aligned with NIST Special Publication 800-171, secure software development practices and broader cyber supply chain risk management standards are being incorporated into contracting frameworks.
While these efforts are not branded in the same way as DOD programs, they are moving in a similar direction. The emphasis is on creating standardized expectations, requiring contractors to affirm their cybersecurity posture and establishing a basis for verification. In practical terms, this creates a CMMC-like dynamic across civilian procurement.
The significance of this development is twofold:
- It expands the population of companies exposed to this level of scrutiny. Organizations that do not consider themselves part of the defense ecosystem may still operate extensively through GSA vehicles.
- it increases the scale of potential exposure. Representations made in the context of GSA contracts often apply across multiple agencies. If those representations are later challenged, the scope of liability can extend well beyond a single contract.
A Shift From Compliance To Representation
The most important change is not the introduction of new requirements, but the shift in how existing requirements are evaluated.
Cybersecurity is increasingly being assessed not only on what is implemented, but on what has been represented to the government.
This introduces a different kind of risk. Cybersecurity programs are inherently dynamic. Controls are implemented over time, remediation efforts are ongoing and environments evolve. Ensuring that external representations remain aligned with internal reality requires coordination across technical teams, compliance functions, legal counsel and executive leadership. Misalignment across those groups is where exposure tends to emerge.
What This Means For Executive Leadership
For CEOs, boards and executive teams, the implications are straightforward but significant.
Cybersecurity can no longer be viewed solely as a technical or operational domain. It is now directly connected to legal and financial risk through the representations the organization makes in the course of doing business with the government. This does not require perfection in execution but it does require discipline in representation.
Organizations should ensure that statements made in proposals, certifications and ongoing contract performance are grounded in verifiable evidence. Documentation should reflect actual operating conditions rather than aspirational targets. Internal assessments should be treated as tools for decision-making, not simply as compliance artifacts.
Equally important, leadership should have visibility into where gaps exist and how those gaps relate to external representations.
From Compliance Exercise To Enforceable Standard
The FCA is not a new development, but its application to cybersecurity is creating a fundamentally different enforcement model.
As cybersecurity requirements become more standardized and more widely applied across federal procurement, the alignment between what organizations say and what they actually do is becoming a central point of scrutiny. The issue is no longer whether controls exist in isolation, but whether the organization can consistently demonstrate that its stated posture is accurate, defensible and supported by evidence over time.
This shift does not introduce new obligations as much as it changes the consequences of existing ones. What was once managed as a compliance exercise now carries direct legal and financial implications if misrepresented.
For companies operating in the federal ecosystem, this is not a theoretical risk. It is an evolving enforcement reality that requires a more disciplined and integrated approach to cybersecurity, compliance and executive oversight. In many cases, that also means reassessing whether internal teams alone can sustain the level of rigor, documentation and continuous alignment now expected, or whether a more structured operating model is needed to ensure consistency at scale.
This article was originally published on Forbes by Emil Sayegh on April 1, 2026: The False Claims Act is Quietly Becoming a Cybersecurity Enforcement Engine.
