Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
Analyzing the Overlap Between CFIUS and FOCI
A Comprehensive Overview of FOCI Mitigation
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
AI Post-Election – Initial Government Insights
Mitigating FOCI Under Section 847
Podcast - Staying Compliant When Sharing Employees or Services
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
Melissa Duffy and Trevor Coval contributed their thought leadership to the American Conference Institute’s 14th Annual Global Encryption, Cloud & Cyber Export Controls Conference, held in San Francisco on May 14-16. Melissa...more
On January 29, 2024, the Department of Commerce’s Bureau of Industry and Security (BIS) issued a proposed rule to prevent foreign actors from using U.S. cloud computing services for malicious cyber activities. The proposal...more