Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
The Biden Administration on Oct. 24, 2024, issued a memorandum, "Advancing the United States' Leadership in Artificial Intelligence; Harnessing Artificial Intelligence to Fulfill National Security Objectives; and Fostering...more
The AI executive order moves the U.S. closer to a broader unified approach on federal AI regulation, expanding on the AI Bill of Rights and NIST AI Risk Management Framework and focusing on the responsible development and...more
The Biden administration issued a widely anticipated executive order on artificial intelligence (“AI”) earlier this week. The Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence...more
In recent years, the Committee on Foreign Investment in the United States (CFIUS) has taken a much stronger interest in the national security ramifications of sensitive data falling into the hands of foreign adversaries,...more