Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more
Two months ago, the White House released its National Cybersecurity Strategy. Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors. For example, the...more
The Cybersecurity and Infrastructure Security Agency (CISA) issued a sweeping binding directive to federal agencies to patch hundreds of cybersecurity vulnerabilities that are considered major risks for cyber actors to cause...more
Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more
Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more
In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more
On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more
On May 12, 2021, the Biden administration released a far-reaching executive order intended to improve the U.S. government’s cybersecurity posture, both internally and in any private information technology (IT) systems that...more
Megan Brown sits down with one of Wiley’s newest attorneys, Sam Kaplan, former Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy at the U.S. Department of Homeland Security (DHS), to discuss the...more
Our blogs and alerts have reported on the increasing legislative and regulatory requirements to promote the security of the U.S. supply chain, including its cybersecurity....more
In response to the killing of Major General Qassim Suleimani, the government of Iran and its supreme leader, Ayatollah Ali Khamenei, have declared the country’s intention to strike back at the United States. According to...more
U.S. government officials and cybersecurity experts are warning businesses to prepare for a surge in cyberattacks from Iran. On Thursday of last week, U.S. Cyber Command carried out online attacks against Iranian missile...more
Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more