All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
Analyzing the Overlap Between CFIUS and FOCI
A Comprehensive Overview of FOCI Mitigation
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
AI Post-Election – Initial Government Insights
Mitigating FOCI Under Section 847
Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more
The Department of Defense stands at a critical crossroads in how it processes, authorizes, and utilizes data in operational environments. Despite living in an era of unprecedented information availability, our military...more
During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more
Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more
On December 27, 2024, the Department of Justice (DOJ) released a Final Rule, Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons....more
On November 14, 2024, the Department of Homeland Security (“DHS”) announced a set of voluntary recommendations called the “Roles and Responsibilities Framework for Artificial Intelligence in Critical Infrastructure”...more
On April 26, 2023, China’s legislature approved revisions to the Counter-Espionage Law of the People’s Republic of China (PRC Counter-Espionage Law). A draft version of the law had been released for public comment in December...more
Today, after months of rumors regarding its release and contents, the White House issued its National Cybersecurity Strategy “to secure the full benefits of a safe and secure digital ecosystem.” The full strategy is 39 pages...more
The U.S. government’s national security and economic priorities around encouraging and adopting innovation is on full display in the soon-to-be-finalized Fiscal Year 2023 National Defense Authorization Act (NDAA). In this...more
Report on Research Compliance 19, no. 3 (March, 2022) - Since the start of the year, the Animal and Plant Health Inspection Service (APHIS) has issued notices of alleged violations of the Animal Welfare Act (AWA) to one...more
Beyond causing long lines and shortages at the gas pump, the cyberattack on the Colonial Pipeline this month may have important implications for federal contractors. As part of the federal government’s response, President Joe...more
In the immediate aftermath of the May 7, 2021 Colonial Pipeline ransomware attack, the focus, naturally, is on the rush to get the pipeline back on line after identifying and patching any vulnerabilities that caused the...more
The U.S. Department of Commerce (DOC), Department of Justice (DOJ), and the Office of the Director of National Intelligence (ODNI) jointly issued a White Paper containing information about privacy protections under U.S. law...more
The latest on the potential Oracle/TikTok deal includes news that the Treasury Department has added requirements addressing “how TikTok’s data and source code would be handled and secured” to any potential deal that the...more
The White House has “doubled down” on its recent actions against TikTok by “formally giving ByteDance, the Chinese owner of the popular video-sharing app, 90 days to divest from its American assets and any data that TikTok...more
On January 13, 2020, the U.S. Department of the Treasury (Treasury), on behalf of the Committee on Foreign Investment in the United States (CFIUS or the Committee), issued two sets of final regulations implementing the...more
In data 20 novembre 2019 è stata pubblicata in G.U. la Legge 18 novembre 2019, n. 133 (la “Legge Cybersecurity”), con cui è stato convertito in legge, con modifiche, il Decreto Legge 21 settembre 2019, n. 105 (il “Decreto...more
On September 17, 2019, the Department of the Treasury, on behalf of the Committee on Foreign Investment in the United States (CFIUS or Committee), issued two sets of proposed regulations seeking to further implement the...more
DJI, a supplier of approximately 70 percent of all drones in the United States, announced this week that it will begin manufacturing some of its products in the U.S. DJI plans to repurpose a warehouse in Cerritos, California...more
In the last three weeks, the Committee for Foreign Investment in the United States (CFIUS) has reportedly informed two Chinese companies that they must sell their stakes in two U.S. companies....more
Not all cybersecurity risks are the stuff of super-secret code hacks or high-tech digital attacks. One of the biggest culprits: off-the-shelf thumb drives (also known as flash drives or memory sticks) that you can purchase...more