Riskology by Infortal: Episode 34 – The Hezbollah Pager Attack & Supply Chain Compliance
Why Privacy is Your Secret Weapon Against Third-Party Risk
Leaders in Law: The State of International Trade with Neena Shenai
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
A Third Party's Perspective on Third Party Risk
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Episode 328 -- Sanctions Enforcement Risks and Redlines
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Hidden Traffic Podcast: Trade Law and Human Rights with Dean Pinkert
Compliance into the Weeds: Sustainability and Managing 3rd Party Risk
Hot Topics in International Trade. BLG VP Marketing Bob Brewer sits down with Robert Stein, VP Braumiller Consulting Group and discusses the recent bridge collapse via the Dali at the Francis Scott Key
The ESG Report: EV Battery Regulation and Compliance in The US & EU-Part 1, Foreign Entities of Concern
Perfecting High-Performance Battery Chemistry With John Kem, American Battery Factory — Battery + Storage Podcast
Hot Topics in International Trade-The Mod Act
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Hot Topics in International Trade
Video: Making Trade Inclusive for All Americans: A Conversation with AAEI's Eugene Laney Jr., Ph.D.
Hot Topics in International Trade- A Year in Review (Quickly) with Braumiller Law Group Attorney Brandon French
Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
On August 15, 2024, the Department of Defense (DOD) announced the much-anticipated Proposed Rule that would amend the Defense Federal Acquisition Regulation Supplement (DFARS) to include Cybersecurity Maturity Model...more
Data breach class actions are again on the rise, with a recent report by Lex Machina confirming what many cybersecurity practitioners have seen first-hand over the last two years. The findings also reaffirm longstanding best...more
The agreed text of the AI Act was published on July 12, 2024, essentially starting the clock on the legal deadlines contained in it. Its obligations will apply in tiered phases, with the first key obligations being enforced...more
When I think of a portal my mind goes immediately to science fiction gateways in time. The literary skills of H.G. Wells in the classic Time Machine, or some of the works of Michael Crichton. Traversing the fantastical realms...more
The Cybersecurity and Infrastructure Security Agency (CISA) has released a revised draft of its Secure Software Development Attestation Common Form ("Form"). The Form, once finalized, will obligate vendors providing software...more
In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more
As Artificial Intelligence (AI) grows in popularity, discussion of its potential uses and risks is everywhere. The Department of Defense (DoD) is no exception and has been considering how AI development can be helpful or...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
At its open monthly meeting on March 16, 2023, the Federal Energy Regulatory Commission (FERC) approved a new cybersecurity standard proposed by the North American Electric Reliability Corporation (NERC) to address the supply...more
Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more
This article is the third and final installment in a series of articles about how lawyers can better serve their clients by involving themselves in cybersecurity planning at an early stage. Just like Return of the Jedi was...more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
Between export bans and the numerous entities and individuals now restricted from transacting in the global economy, organizations worldwide must evaluate the legal, reputational, and cybersecurity impacts on their supply...more
This is Part I of a two-part series outlining key considerations from White & Case's Public Company Advisory Group for US public companies during the 2022 annual reporting and proxy season. Part I of this memo describes...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
Find out why the recent Colonial Pipeline cyberattack reinforces the need for modeling and creating a digital twin of a supply chain, which can go a long way in planning for uncertainty....more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
The cyber insurance market size is currently valued in the billions, and this does not include insurance policies that do not explicitly mention cyber incidents but may nevertheless cover them. With this in mind,...more
The fallout from the SolarWinds hacking incident linked to Russian threat actors has not only wreaked havoc on governmental agencies and private companies whose data are at risk following the incident, but this week, Bitsight...more
Although different in some important respects and rapidly evolving, the global pandemic shares many of the characteristics of other broadscale crisis situations that prior boards of directors have confronted and managed...more
Partner Harriet Territt discusses the issues clients face in implementing blockchain technology, including legal, regulatory, and data privacy considerations across the globe. She also addresses the risk of unintended...more
• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more
The election of President Trump contained some positive signs for Private Equity (PE) fund managers. These included potential lower corporate taxes, a ten-percent tax holiday for funds parked overseas, large infrastructure...more