Recently, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) published a significant interim final rule (IFR) that has created both challenges and exciting opportunities for these operators. This IFR...more
5/7/2025
/ Artificial Intelligence ,
Audits ,
Bureau of Industry and Security (BIS) ,
Compliance ,
Data Centers ,
Data Security ,
Documentation ,
End-Users ,
Export Administration Regulations (EAR) ,
Export Controls ,
Government Agencies ,
Information Technology ,
Interim Final Rules (IFR) ,
National Security ,
Regulatory Requirements ,
Reporting Requirements ,
Supply Chain
Every new presidential administration brings with it a degree of uncertainty regarding potential shifts in the Committee on Foreign Investment in the United States (CFIUS) process. This is especially true in our current...more
...As the world grapples with the rapid advancement of artificial intelligence (AI) technologies, concerns about the potential risks and unintended consequences have understandably taken center stage. While some advocate for...more
As artificial intelligence (AI) continues to advance rapidly, organizations of all types are seeking to deploy this powerful tool to increase the effectiveness and efficiency of their operations, improve service to their...more
6/13/2024
/ Artificial Intelligence ,
Compliance ,
Data Privacy ,
Data Protection ,
Documentation ,
Ethics ,
Financial Services Industry ,
Governance Standards ,
Healthcare ,
NIST ,
Policies and Procedures ,
Regulatory Agenda ,
Regulatory Requirements ,
Risk Management ,
Securities and Exchange Commission (SEC) ,
Technology Sector ,
Telecommunications
Ken Mendelson welcomes back Andy Cottrell, the founder and CEO of cybersecurity consulting firm Truvantis to talk more about cybersecurity frameworks. They discuss the difference between a cyber audit and cyber assessment and...more
Andy Cottrell, the founder and CEO of cybersecurity consulting firm Truvantis, joins Ken Mendelson to talk about cybersecurity frameworks – what are they, how can they improve a company’s cybersecurity posture, and how to...more