Podcast - Staying Compliant When Sharing Employees or Services
Corruption, Crime & Compliance: Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Navigating Bid Protest Choices at GAO and COFC
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Podcast - Discussing a DOJ Lawsuit Under the Civil-Fraud Initiative
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
DE Talk | If It’s Not in Writing, It Never Happened: Applicant Tracking & Recordkeeping Strategies to Ensure OFCCP Compliance
Podcast - Cybersecurity Roundup: Analyzing New and Proposed Rules for Contractors
Understanding FOCI Mitigation
Work This Way: A Labor & Employment Law Podcast - Episode 28: Construction Compliance with Joan Moore and Mim Munzel of The Arbor Consulting Group
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
Build America Buy America What is it? How to qualify.
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
Work This Way: A Labor & Employment Law Podcast - Episode 26: Compensation Compliance with Joan Moore and Mim Munzel of The Arbor Consulting Group
DE Under 3: Court Held That Workday Was an “Agent” to Employers Licensing its AI Applicant Screening Tools
An In-Depth Overview of the DCSA
Sustainable Procurement: A Closer Look at the New Federal Acquisition Regulation (FAR)
DE Under 3: Retirement of “Chevron Doctrine” Exposed Vulnerability of OFCCP’s Overreaching Interpretations of Some of its Rules
Since 2016, the federal government has implemented numerous procurement regulations and associated contract clauses to address cybersecurity by requiring contractors to adopt various controls and standards to protect...more
Cybersecurity has been an important topic for many years now, yet the government has struggled with how to flow down cybersecurity obligations to its supply chain. The Department of Defense’s (DOD) Cybersecurity Maturity...more
America’s data is under attack. Solar Winds and other recent headline-grabbing stories have demonstrated that foreign adversaries are eager to hack into computer systems for a wide range of purposes. The US Department of...more