Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward....more
The U.S. Department of Commerce’s Bureau of Industry and Security has issued the final rule that will determine how its Information and Communications Technology and Services regulations will work going forward. Originally...more
WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
On January 8, 2025, the Department of Justice (“DOJ”) published its final rule addressing Executive Order (E.O.) 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more
WHAT: The FAR Council published a proposed rule to incorporate the Controlled Unclassified Information (CUI) Program into the acquisition process and, in doing so, seeks to more clearly define government and contractor roles...more
Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more
The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more
On January 2, 2025, the US Department of the Treasury's regulations implementing Executive Order 14105 “Addressing United States Investments in Certain National Security Technologies and Products in Countries of Concern” (the...more
On October 28, 2024, the U.S. Department of the Treasury issued a Final Rule establishing the new Outbound Investment Security Program, set to take effect on January 2, 2025. This program, implemented under Executive Order...more
In a significant development, the Department of Justice (DOJ) indicted 14 North Korean nationals on December 11, 2024 for their involvement in a sophisticated scheme to defraud U.S. companies and violate international...more
Following years of development, on October 28, 2024, the U.S. Department of the Treasury published a final rule establishing its outbound investment security program (Final Rule). The new regime prohibits certain outbound...more
On Thursday, August 8, 2024, the United States Department of Justice (“DOJ”) announced that it had charged a Nashville man for his alleged role in assisting the Democratic People’s Republic of Korea (“DPRK” or “North Korea”)...more
Revised regulations restricting investments in Chinese companies developing semiconductors and microelectronics, quantum information technologies, and artificial intelligence systems are taking shape and could soon be in...more
On June 21, 2024, the US Department of the Treasury (Treasury) released proposed new federal regulations (Proposed Rules) that, if implemented, would prohibit or require notification of a broad range of outbound investment...more
The U.S. Department of Commerce's Office of Information and Communications Technology and Services (OICTS) within the Bureau of Industry and Security (BIS) issued a Final Determination on June 20, 2024, pursuant to Executive...more
Companies, particularly those in “critical infrastructure” sectors, have seen a dramatic increase in cybersecurity regulatory requirements in just the past few years – and the White House is looking to move faster. At the...more
On April 30, 2024 the White House updated the foundational U.S. government policy that defines critical infrastructure (CI) sectors and establishes a coordination structure within the federal government to support owners and...more
In March 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released the final version of its secure software development self-attestation common form (Form), requiring federal government contractors who...more
The growth of cloud services, Software-as-a-Service (“SaaS”) and Infrastructure-as-a-Service (“IaaS”) arrangements, Artificial Intelligence (“AI”) models, and increased reliance on the use outsourced technology service...more
On March 1, 2024, the US Department of Commerce’s (“Commerce”) Bureau of Industry and Security (“BIS”) published an Advance Notice of Proposed Rulemaking1 (the “Notice”) seeking public comments on potential regulation of the...more
StoneTurn Partner Sarah Keeling and Senior Adviser Richard Mackintosh host a discussion on the evolving risk landscape, examining geopolitical shifts, emerging threats in the Middle East, and the impact of AI on security....more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Over the last several months, companies have become entangled in an increasingly complex web of new and expanded sanctions and export control restrictions related to Russia in response to its war on Ukraine. The current...more