4 Key Takeaways | Solar Industry & Chinese Tariff Update
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Contratación para el Desarrollo de Infraestructura del Agua
El Plan Nacional de Desarrollo
Introducing TAG Infrastructure with Board Chair Sarah Ellis - TAG Infrastructure Talks Podcast
Introducing TAG Infrastructure Talks - TAG Infrastructure Talks Podcast
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
Protection of Critical Infrastructure via LIPA and ICTS
Energy + Cybersecurity: What's In the Pipeline? [More with McGlinchey Ep. 23]
On-Demand Webinar | Living on the Edge: Managing Sea Level Rise in California
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
DHS and Cyber: What Should Companies Expect?
#WorkforceWednesday: Guidance for Critical Infrastructure Workers; OSHA Reporting Guidance; EEOC Update - Employment Law This Week®
AF COVID-19 PODCAST: Can Construction Projects Move Forward?
Podcast: CFIUS Update: Key Takeaways from the FIRRMA Implementing Regulations
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
Jones Day Talks: Italy Embraces Foreign investment but Maintains Oversight
Jones Day Talks: Doing Deals Down Under: Australia's Foreign Direct Investment Regime
Jones Day Talks: Navigating Foreign Direct Investment in Germany
China’s new cybersecurity law
On Sunday evening, CBS's 60 Minutes aired a segment featuring “The Five Eyes” and the critical issue of state-sponsored intellectual property ("IP") and trade secret theft. While geopolitics and national security issues might...more
Spurred by both planetary and economic needs, the industry commonly referred to as “cleantech”—short for “clean technology”—has been on the rise. Current estimates predict clean energy technologies could dominate oil and gas...more
The Second Session of the Standing Committee of the 14th National People’s Congress voted and passed on April 26, 2023 the newly revised “Anti-Espionage Law of the People’s Republic of China” (the New Anti-Espionage Law). The...more
On May 13, 2020, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a joint Public Service Announcement (PSA) about a threat to...more
Welcome back to The Week in Weed, your Friday look at what’s happening in the world of legalized marijuana. It was a busy week for the states, as Virginia moved towards decriminalization. The state House and Senate passed...more
The FBI wants you, but it’s not why you think. Spencer Evans, the Section Chief in the Office of the Private Sector (OPS), explains that the OPS is here to help and wants you to get involved. He begins the podcast by...more
Last week, the United States Senate Judiciary Committee announced the creation of a new subcommittee on intellectual property....more
Criminal trade secret prosecutions are on the rise nationwide and in the Northern District of California, especially cases relating to alleged theft by Chinese nationals and entities. According to a 2017 report by the White...more
On November 1, 2018, then-Attorney General Jeff Sessions announced the U.S. Department of Justice’s (DOJ) “China Initiative” with the objective of countering perceived national security threats to the United States from...more
Declaring cybercrime a “national emergency,” President Obama today empowered Treasury to freeze assets that are the fruits of cybercrime, according to an Executive Order issued this afternoon. The agency can block money or...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance. Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more