Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
How to Fix the Cyber Incident Reporting Mess--DHS Weighs In
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
Federal Investigations within the Department of Homeland Security
The State of Cyber: Breaking Down Recent Rules and Regulations
Immigration Insights Podcast: International Entrepreneur Parole Program & Biometrics Requirement
DHS and Cyber: What Should Companies Expect?
Take 5 Immigration Podcast Series: Episode 10
Nota Bene Episode 90: U.S. Q3 Check In: Stimulus, Relief, Election, and Direction with Elizabeth Frazee and Jonathan Meyer
Is it the End of the EB-5 World as We Know it? How to Prepare for Potential Changes
Benesch B-Cast 07: Immigration Deadlines and Demands Employers Need to Know
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
US Customs and Border Protection (CBP) has the authority to search electronic devices — including phones, laptops, tablets, and other electronic devices — of anyone entering the United States, including US citizens and...more
Facial recognition is a rapidly evolving area of technology with myriad potential commercial uses. Reflecting the rapid growth in this area, regulations related to facial recognition are changing across all levels of...more
1997’s “Gattaca” has something of a cult following. The story is set in a futuristic society in which genetics determines destiny. The protagonist, of course, overcomes all obstacles through sheer will power, and by...more