News & Analysis as of

Compliance Cybersecurity

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations. ... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -
American Conference Institute (ACI)

[Event] 8th National Forum on FOCI - September 29th - 30th, Washington, DC

Section 847 is widely regarded as a seismic shift that will result in a jump from 2,000 to 41,000 cases being processed annually! In anticipation of this, DCSA has been scaling up their resources and personnel. ACI’s 8th...more

Clark Hill PLC

Key lessons on the False Claims Act for government contractors after Raytheon’s $8.4 million settlement

Clark Hill PLC on

Government contractors should be on high alert following the recent announcement that Raytheon Company, its parent RTX Corporation, and Nightwing Group, LLC, have agreed to pay $8.4 million to resolve allegations of violating...more

J.S. Held

Navigating Cloud Forensics in Complex Investigations

J.S. Held on

Introduction: Understanding Cloud Data in the Modern Digital Landscape - In today’s hyper-connected digital world, we interact with vast amounts of data, much of which isn’t stored locally on our devices but instead...more

DLA Piper

GPAI Code of Practice – Final Version Published by European Commission

DLA Piper on

The European Commission has published the final version of a general-purpose AI (“GPAI”) Code of Practice. We took a deeper look into it and prepared a short summary to help you understand what the GPAI Code of Practice is,...more

Sheppard Mullin Richter & Hampton LLP

DOJ’s 90-Day Data Security Compliance Grace Period is Over: Are You Compliant?

The U.S. Department of Justice (“DOJ”) Data Security Program (“DSP”) 90-day enforcement grace period ended as of July 8, 2025. While the program became effective April 8, 2025, DOJ implemented a 90-day enforcement grace...more

A&O Shearman

EU RTS on subcontracting ICT services supporting critical or important functions under DORA published in OJ

A&O Shearman on

Commission Delegated Regulation (EU) 2025/532 has been published in the Official Journal of the European Union. The Delegated Regulation supplements the Digital Operational Resilience Act (DORA) with regard to regulatory...more

Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

Baker Botts L.L.P.

EU Releases General-Purpose AI Code of Practice

Baker Botts L.L.P. on

On July 10, 2025, the EU published its Code of Practice for General-Purpose AI Models, a comprehensive, though not exhaustive, framework designed to guide Artificial Intelligence ("AI") providers in complying with the...more

Skadden, Arps, Slate, Meagher & Flom LLP

The EU’s New Cybersecurity Law for the Space Sector

On 25 June 2025, the European Commission announced its proposal for a “Space Act” that would introduce a new regulatory framework for EU space activities. The proposed framework includes cyber-resilience obligations for EU...more

Morrison & Foerster LLP

NIS 2: Strengthening Europe’s Cyber Defenses

European cybersecurity risk management and reporting obligations have received a substantial facelift. The Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the EU (“NIS 2”) became effective...more

Herbert Smith Freehills Kramer

US Corporate Governance — 2025 Midyear Review

The Financial Crimes Enforcement Network (FinCEN) issued an interim final rule in March 2025 that removes requirements for US companies to report beneficial ownership information under the Corporate Transparency Act (CTA)....more

Thomas Fox - Compliance Evangelist

#Risk New York Speaker Series – Exploring Future Regulatory Trends and Compliance Strategies with Rory McGrath

Join Tom Fox and hundreds of other GRC professionals in the city that never sleeps, New York City, on July 9 & 10 for one of the top conferences around, #Risk New York. The current US landscape, shaped by evolving policies,...more

Davis Wright Tremaine LLP

FERC Moves To Bolster Cybersecurity

On June 26, FERC approved a new reliability standard (CIP-015-1) proposed by the North American Electric Reliability Corporation ("NERC") to enhance cybersecurity of the nation's bulk electric system ("BES"). In a related...more

King & Spalding

Cyber Resilience Is Key: The Never-Ending Delays of NIS2 Implementation

King & Spalding on

The European Union’s ("EU") NIS2 Directive (Directive (EU) 2022/2555) capitalizes on the success of its predecessor, NIS, the first horizontal minimum harmonization cyber security and resilience frameworks at the EU level....more

King & Spalding

EU Space Act: What In-House Counsel Need to Know About the Potential Regulatory Framework for Space Activities in Europe

King & Spalding on

On June 25, 2025, the European Commission published the long-anticipated draft EU Space Act (“Act”), a potentially landmark regulation that will apply to both EU and non-EU operators providing space services in Europe. The...more

A&O Shearman

EU Delegated Regulation on threat-led penetration testing published in OJ

A&O Shearman on

Commission Delegated Regulation (EU) 2025/1190 of 13 February has been published in the Official Journal of the European Union. The Delegated Regulation supplements the Digital Operational Resilience Act (DORA) with regard to...more

Mitratech Holdings, Inc

The 2025 TPRM Study: Key Findings and Recommendations

The 2025 Mitratech Third-Party Risk Management (TPRM) Study conveys a clear message: the third-party risk landscape is evolving into a complex, interconnected ecosystem — one where every vendor, supplier, and partner plays a...more

Thomas Fox - Compliance Evangelist

Great Women in Compliance: GWIC X EC Q2 2025 - Exploring Compliance Innovations

We are back with another GWIC X EC crossover episode. Today we have the quartet of Great Women in Compliance of Kristy Grant-Hart, Karen Moore, Lisa Fine and Hemma Lomax. The GWIC quartet discuss various intriguing topics...more

Thomas Fox - Compliance Evangelist

#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.

Join Tom Fox and hundreds of other GRC professionals in the city that never sleeps, New York City, on July 9 & 10 for one of the top conferences around, #Risk New York. The current US landscape, shaped by evolving policies,...more

McCarter & English Blog: Government Contracts...

Building the Cyber Fortress: New Cybersecurity Executive Order Targets Quantum, AI, and Supply Chain Security

On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more

McCarter & English Blog: Government Contracts...

The Need for Speed: DoD’s “Software Fast Track” Targets Bureaucracy at Mach 2

The Department of Defense (DoD) is revving its engines again—this time to rocket past its own software acquisition drag. Launched via an April 24 memo from Acting DoD CIO Katie Arrington, the DoD’s Software Fast Track (SWFT)...more

American Conference Institute (ACI)

[Webinar] Operationalizing AI: Governance, Culture, Bias, Privacy, Data and Cyber Security Considerations - June 24th, 1:00 pm -...

This complimentary webinar will delve into the real-life aspects of implementation – with a focus on organizational preparedness and proactive strategic foresight. Join us as we discuss how to design and roll out a...more

EDRM - Electronic Discovery Reference Model

Strategic Signals: May 2025 HSR Filings Reveal Steady M&A Amid Market Shifts

ComplexDiscovery Editor’s Note: Strategic transactions in the U.S. are holding steady, even as economic pressures mount. The latest Hart-Scott-Rodino (HSR) filing data through May 2025 reveals not a retreat, but a...more

PilieroMazza PLLC

Managing Litigation Risk During the Business Lifecycle, Part 4: M&A Transactions with Government Contractors

PilieroMazza PLLC on

Transactions that involve government contracts carry a unique set of challenges. Unlike a typical merger or acquisition, deals involving government contracts require the navigation of a complex web of federal laws,...more

Thomas Fox - Compliance Evangelist

Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder

Innovation comes in many areas and compliance professionals need to not only be ready for it but embrace it. Join Tom Fox, the Voice of Compliance as he visits with top innovative minds, thinkers and creators in the...more

1,137 Results
 / 
View per page
Page: of 46

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide