A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
Between tariffs, tightening export controls, evolving sanctions, and ramped up enforcement, the cost and complexity of compliance is rising for oil and gas supply chains. ACI’s Trade & Sanctions Compliance for the Oil and...more
There is no opportunity without risk – but there are plenty of dangers that don’t come with a potential payoff. In today’s fraught global geopolitical climate, it can feel difficult to differentiate between the two....more
On September 9, 2024, China’s National Technical Committee 260 on Cybersecurity released the first version of its AI Safety Governance Framework (the Framework), which was formulated to implement the Global AI Governance...more
Hosted by American Conference Institute, the 13th West Coast Forum on FCPA Enforcement and Compliance returns for another exciting year, providing the opportunity to connect with decision-makers from your industry, gather...more
Under the TFTEA, CBP has taken an increasingly enforcement-minded posture to prevent and penalize the importation of goods produced using forced labor into the United States. On August 13, 2020, CBP announced that it had...more
Report on Supply Chain Compliance 3, no. 4 (February 20, 2020) - The coronavirus that has, at the time of writing, infected more than 40,000 people around the world and killed more than 1,000, is also ravaging...more
Exporters and US importers of goods claiming Vietnamese origin face increasing risk. President Trump recently indicated his administration will pay close attention to goods exported from Vietnam, including those suspected of...more
Despite a volatile, uncertain trade environment, you can take steps to protect your US market share - One year into the US-China trade war, after several waves of unprecedented punitive US tariffs on US$250 billion worth...more
On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more
The ongoing trade tensions between the U.S. and China have caused some U.S. companies to become increasingly concerned that the Chinese authorities may subject their local operations to closer scrutiny, leading these...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more