Riskology by Infortal: Episode 34 – The Hezbollah Pager Attack & Supply Chain Compliance
Why Privacy is Your Secret Weapon Against Third-Party Risk
Leaders in Law: The State of International Trade with Neena Shenai
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
A Third Party's Perspective on Third Party Risk
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Episode 328 -- Sanctions Enforcement Risks and Redlines
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Hidden Traffic Podcast: Trade Law and Human Rights with Dean Pinkert
Compliance into the Weeds: Sustainability and Managing 3rd Party Risk
Hot Topics in International Trade. BLG VP Marketing Bob Brewer sits down with Robert Stein, VP Braumiller Consulting Group and discusses the recent bridge collapse via the Dali at the Francis Scott Key
The ESG Report: EV Battery Regulation and Compliance in The US & EU-Part 1, Foreign Entities of Concern
Perfecting High-Performance Battery Chemistry With John Kem, American Battery Factory — Battery + Storage Podcast
Hot Topics in International Trade-The Mod Act
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Hot Topics in International Trade
Video: Making Trade Inclusive for All Americans: A Conversation with AAEI's Eugene Laney Jr., Ph.D.
Hot Topics in International Trade- A Year in Review (Quickly) with Braumiller Law Group Attorney Brandon French
Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more
In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more
On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more
Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more
The importance of building technology-driven manufacturing businesses with an ecosystem focus—i.e., a comprehensive view of the complex network of suppliers, partners, and customers in a market—emerged as a critical theme for...more
In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more
In the contemporary landscape of manufacturing, a silent revolution is taking place, driven by the integration of artificial intelligence (AI) into various processes. As factories become smarter and more interconnected, AI is...more
The only thing truly certain about the proposed U.S. outbound investment regulatory regime is that a lot of uncertainty remains. But industry responses garnered during the comment period may, at least partly, foretell the...more
Implications for CFIUS Reporting and Review - The Executive Branch, through the National Science and Technology Council and the National Security Council, committed in 2020 to identify that are potentially significant to...more
In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more
On December 14, 2023, Congress passed an $874.2-billion defense authorization bill, sending it to the White House for President Biden’s signature. This alert provides a summary of key provisions of the National Defense...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
For better or worse, generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making...more
The FCC recently announced the formation of a “Privacy and Data Protection Task Force” to be headed up by the Enforcement Bureau. The task force has a mandate to “coordinate across the agency” on rulemaking, enforcement, and...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
The US government continues to refine its influential cybersecurity guidance, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), with a substantial update to the CSF expected later this...more
While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more
Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more
SEC Requests Comment on Incident Reporting NPRM for Certain Filings Affected by Technical Glitch: On October 18, the Securities and Exchange Commission (SEC) published a Notice announcing it has re-opened for 14 days the...more
President Biden issued Executive Order (EO) 14083 on September 15, 2022, establishing five factors for reviews by the Committee on Foreign Investment in the U.S. (CFIUS), and areas of heightened scrutiny for transactions...more
On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly presents...more
Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more
Introduction - Enterprises are increasingly reliant on complex and interconnected ecosystems of technology solutions. Companies are reducing their dependence on the legacy monolithic highly customized solutions, instead...more
With the COVID-19 pandemic, many industries experienced a major shift in how the personnel of key suppliers worked, with “nonessential” personnel in large part working remotely. When this shift to remote work first happened...more
Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more