Managing Sanctions Compliance
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Episode 364 -- Five Strategies to Mitigate a New Risk Environment
Strengthening Compliance: Lessons From the OCC's Consent Order With Patriot Bank — Payments Pros – The Payments Law Podcast
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Compliance Tip of the Day: Superforecasting
Compliance Tip of the Day: The Last Mile
Key Takeaways From the OIG's New Compliance Guidance for Nursing Facilities — Assisted Living and the Law Podcast
Envisioning a Compliant Workforce
Updating the Research Compliance Handbook
The Election's Impact on the FTC Will Bring Big Changes, But Being Vigilant Must Remain a Priority
Navigating the NYDFS' Cybersecurity Guidance on AI — The Consumer Finance Podcast
The Future of AI Regulation and Legislation: 5 Key Takeaways
Investigations and Cognitive Interviews
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Implications of the SEC Cybersecurity Disclosure Rule
Privacy Issues from Third-Party Website Tags
On February 20, 2025, the State Department designated multiple Mexican drug cartels and Transnational Criminal Organizations (“TCOs”) as foreign terrorist organizations (“FTOs”). At the same time, these groups were designated...more
Contractors interested in offering federal agencies artificial intelligence (AI) can now glean insight into how agencies are expected to conduct AI acquisitions. On September 24, 2024, the Office of Management and Budget...more
The Office of Management and Budget (OMB) has released Memorandum M-24-18, introducing new requirements and guidance for federal agencies on the responsible acquisition of artificial intelligence (AI). This memorandum aims to...more
On August 15, 2024, the Department of Defense (DOD) announced the much-anticipated Proposed Rule that would amend the Defense Federal Acquisition Regulation Supplement (DFARS) to include Cybersecurity Maturity Model...more
In this series of articles, we explore the different certification requirements of CMMC Levels 1, 2 and 3; the impact on contractors and external service providers; and proposed next steps... On December 26, 2023, the US...more
The oversight obligations of boards continue to expand. Recent enforcement actions and new laws in areas such as cybersecurity, artificial intelligence and supply chains create new challenges for boards, as we explain in this...more
On December 26, 2023, the Department of Defense (“DoD”) belatedly gifted defense contractors and subcontractors a Proposed Rule on the Cybersecurity Maturity Model Certification (“CMMC”) Program. DoD also released eight CMMC...more
The U.S. Department of Defense released a special holiday treat for government contractors and subcontractors last week in the form of long-promised proposed regulations for its Cybersecurity Maturity Model Certification...more
Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
President Biden signed an executive order to bolster the federal government’s cybersecurity posture on May 12. The order focuses on implementing vital improvements to networks of federal departments and agencies, many of...more
An executive order was signed on May 12, directing the federal government to overhaul its approach to cybersecurity. Corporate compliance and risk management professionals should consider this order carefully — because, in...more
Ah yes, hope is in the air as we turn the corner on winter and approach spring. This year more than most, hope is riding on a wave of vaccinations that promises to break the grip of uncertainty that COVID has had on our...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
In 1657, mathematician Blaise Pascal commented in a letter to his church leaders “I have made this longer than usual because I did not have time to make it shorter.” More than 100 years later, another Frenchman, Napoleon...more
With the novel coronavirus (COVID-19) spreading outside of China at an ever-increasing rate, government contractors should prepare for possible service and payment interruptions. In addition, the administration is considering...more
On November 25, 2019, the Government Accountability Office (“GAO”) published a report examining the financial and nonfinancial fraud and national security risks to the Department of Defense (“DoD”) when contractors employ...more
Two recent False Claims Act (FCA) settlements between the Department of Justice (DOJ) and transportation companies point to the continuation of a recent trend by the DOJ to use the FCA as a significant enforcement tool...more
Healthcare industry business, legal and compliance executives and investors will learn strategies for proactively managing and effectively responding to compliance risks, investigations and litigation at our fourth annual...more
• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more
On August 2, 2016, the Department of Defense (“DOD”) rolled out new requirements for defense contractors that provide electronic parts and assemblies containing electronic parts. The new rules impose significant risks on DOD...more
In this presentation: - Why cybersecurity matters - Recently-implemented cybersecurity rules and laws - Rapid reporting of cyber incidents and additional cybersecurity measures coming soon -...more