CHPS Podcast Episode 3: Unlocking America's Mineral Potential
Analyzing the Overlap Between CFIUS and FOCI
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Contratación para el Desarrollo de Infraestructura del Agua
El Plan Nacional de Desarrollo
Introducing TAG Infrastructure with Board Chair Sarah Ellis - TAG Infrastructure Talks Podcast
Introducing TAG Infrastructure Talks - TAG Infrastructure Talks Podcast
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
Protection of Critical Infrastructure via LIPA and ICTS
Energy + Cybersecurity: What's In the Pipeline? [More with McGlinchey Ep. 23]
On-Demand Webinar | Living on the Edge: Managing Sea Level Rise in California
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
DHS and Cyber: What Should Companies Expect?
#WorkforceWednesday: Guidance for Critical Infrastructure Workers; OSHA Reporting Guidance; EEOC Update - Employment Law This Week®
AF COVID-19 PODCAST: Can Construction Projects Move Forward?
Podcast: CFIUS Update: Key Takeaways from the FIRRMA Implementing Regulations
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
Jones Day Talks: Italy Embraces Foreign investment but Maintains Oversight
Jones Day Talks: Doing Deals Down Under: Australia's Foreign Direct Investment Regime
The Federal Communications Commission (FCC) has taken significant steps to institutionalize national security within its regulatory framework through the creation of the Council on National Security (CNS). Chaired by Chairman...more
As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
U.S. supply chain security is increasingly under threat. The White House’s National Security Strategy describes this moment as an inflection point. Many federal agencies have taken charge in elevating the very concept of...more
Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (UK NCSC), along with partner agencies from 17 nations, have released Guidelines for Secure AI System Development (the...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
On September 15, 2022, President Biden signed an executive order (EO) that reaffirms longstanding U.S. open investment policy and elaborates and expands on the existing list of statutory factors that the Committee on Foreign...more
On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more
On July 2, 2021, Kaseya Ltd., a Florida-based firm that provides software tools to thousands of primarily small and mid-sized businesses, became the latest victim of a high-profile ransomware attack. The attack is believed to...more
The President’s FY 19 Proposed Budget, issued on Feb. 12, 2018, featured a heavy focus on the cybersecurity risks to the nation’s critical infrastructure and included budget increases for cyber specific missions within...more