The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
A Third Party's Perspective on Third Party Risk
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Episode 328 -- Sanctions Enforcement Risks and Redlines
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Hidden Traffic Podcast: Trade Law and Human Rights with Dean Pinkert
Compliance into the Weeds: Sustainability and Managing 3rd Party Risk
Hot Topics in International Trade. BLG VP Marketing Bob Brewer sits down with Robert Stein, VP Braumiller Consulting Group and discusses the recent bridge collapse via the Dali at the Francis Scott Key
The ESG Report: EV Battery Regulation and Compliance in The US & EU-Part 1, Foreign Entities of Concern
Perfecting High-Performance Battery Chemistry With John Kem, American Battery Factory — Battery + Storage Podcast
Hot Topics in International Trade-The Mod Act
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Hot Topics in International Trade
Video: Making Trade Inclusive for All Americans: A Conversation with AAEI's Eugene Laney Jr., Ph.D.
Hot Topics in International Trade- A Year in Review (Quickly) with Braumiller Law Group Attorney Brandon French
Hot Topics in International Trade A Year in Review (Quickly)
Domesticating the Battery Supply Chain With ENTEK and KORE Power — Battery + Storage Podcast
What to Do if Your Suppliers Are in Distress - Is It Time to Find a New Supplier?
When hackers gain access to a subcontractor’s information systems and divert the prime contractor’s payment to themselves instead of to the subcontractor, does the prime contractor still have to pay the subcontractor?...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more
The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more
Radio Frequency Identification (“RFID”) technology uses electromagnetic fields to transfer data. RFID systems typically operate by attaching tags to objects, devices, or cards....more