Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 2
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 1
In May, the US State Department’s Directorate of Defense Trade Controls (DDTC) published its long-awaited rule amending the International Traffic in Arms Regulations (ITAR) to implement the AUKUS Trilateral Security...more
The U.S. Department of Commerce and U.S. Department of State have been continuously easing restrictions on export-controlled trade between the United States, United Kingdom and Australia to foster technological innovation...more
The U.S. and the U.K. are focused on common national security risks, including preventing foreign access to key emerging technologies, the integrity of the defense supply chain, protection of critical infrastructure, and...more
The 10th episode of "Are We All Clear? Facilitating Security Clearances" explores the mitigation of foreign ownership, control or influence (FOCI) in a cleared company. Host Molly O'Casey and International Trade attorney...more
Concerns regarding the integrity of the U.S. defense industrial base supply chain continue to grow. Similar to national cybersecurity risks, national security risks to the defense supply chain are asymmetric and can arise at...more
When we talk about defense related procurement, we're referring to defense and security contracts which are public contracts. Defense procurement reform has been a significant topic on the House of Commons agenda for...more
On July 8, 2024, the Office of Investment Security (Department of the Treasury) published a proposed rule to expand CFIUS’s current restrictions on foreign investment in U.S. real estate to cover many additional government...more
On June 14, the House voted 217-199 to pass its version of the fiscal year 2025 National Defense Authorization Act (NDAA) (H.R. 8070), and the Senate Armed Services Committee voted 22-3 to advance their chamber’s version of...more
Current and future U.S. defense contractors, and entities interested in acquiring these contractors, should prepare for increased regulatory scrutiny of mergers and acquisitions (M&A) transactions. Congress is signaling that...more
Remarks given by Commerce Secretary Gina Raimondo and Undersecretary Alan Estevez during the 2024 Policy Update Conference sponsored by the U.S. Department of Commerce’s Bureau of Industry and Security (“BIS”) emphasized the...more
On Saturday, April 20, the House voted on a series of five separate bills, three of which would provide emergency funding to Israel, Ukraine and the Indo-Pacific, a fourth so-called “sidecar” spending bill that would cover a...more
In January, the Department of Defense (DoD) released its inaugural National Defense Industrial Strategy (NDIS), which seeks to “catalyze generational change” to the existing defense industrial ecosystem. This...more
Welcome to Holland & Knight's monthly defense news update. We are excited to bring you the latest in defense policy, regulatory updates and other significant developments....more
The Australian government has announced a major overhaul of its naval defence surface fleet, doubling the number of warships to create Australia’s “biggest navy since the second world war”. The move comes in the wake of an...more
The U.S. Department of Defense (“DoD”) updated its list of “Chinese military companies” operating “directly or indirectly” in the United States on January 31, 2024, adding 17 new entities and removing three. The list was...more
Welcome to Holland & Knight's monthly defense news update. We are excited to bring you the latest in defense policy, regulatory updates and other significant developments. ...more
On Jan. 11, the Department of Defense (DOD) released its first-ever National Defense Industrial Strategy (NDIS). The NDIS outlines a multifaceted approach to strengthen U.S. defense capabilities, innovation and global defense...more
As the first session of the 118th Congress comes to a close, Congress unveiled a vast array of policy recommendations and legislation furthering their focus on U.S.-China strategic competition. Throughout the year, China...more
Join our panel of experts for a one-hour conversation about the pressing issues surrounding the transshipment of restricted tools and technologies, with a particular focus on mitigating the risk of these products ending up in...more
The new measures build on sweeping restrictions that the United States introduced in October 2022. On October 17, 2023 — just over a year after introducing extensive regulations aimed at restricting parties in China from...more
In this episode of "Regulatory Phishing," former U.S. Department of Defense Chief Information Security Officer (CISO) Katie Arrington joins Government Contracts and Cybersecurity attorney Eric Crusius to discuss the state of...more
In this episode of "Regulatory Phishing," government contracts and cybersecurity attorney Eric Crusius examines the newly released Cybersecurity Maturity Model Certification (CMMC) program documents. Mr. Crusius breaks down...more