CHPS Podcast Episode 3: Unlocking America's Mineral Potential
Analyzing the Overlap Between CFIUS and FOCI
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Contratación para el Desarrollo de Infraestructura del Agua
El Plan Nacional de Desarrollo
Introducing TAG Infrastructure with Board Chair Sarah Ellis - TAG Infrastructure Talks Podcast
Introducing TAG Infrastructure Talks - TAG Infrastructure Talks Podcast
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
Protection of Critical Infrastructure via LIPA and ICTS
Energy + Cybersecurity: What's In the Pipeline? [More with McGlinchey Ep. 23]
On-Demand Webinar | Living on the Edge: Managing Sea Level Rise in California
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
DHS and Cyber: What Should Companies Expect?
#WorkforceWednesday: Guidance for Critical Infrastructure Workers; OSHA Reporting Guidance; EEOC Update - Employment Law This Week®
AF COVID-19 PODCAST: Can Construction Projects Move Forward?
Podcast: CFIUS Update: Key Takeaways from the FIRRMA Implementing Regulations
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
Jones Day Talks: Italy Embraces Foreign investment but Maintains Oversight
Jones Day Talks: Doing Deals Down Under: Australia's Foreign Direct Investment Regime
Earlier this month, Secretary of the Department of Homeland Security (DHS) Kristi Noem announced plans to disband the Critical Infrastructure Partnership Advisory Council (CIPAC). First created in 2006, CIPAC is a...more
With the arrival of the Regulation on Digital Operational Resilience (DORA) and the Network and Information Security 2 (NIS2) Directive, the security of information systems and the protection of critical infrastructures have...more
Amidst an ever-evolving cyber threat landscape, a recent slew of regulatory updates and cybersecurity standards are defining a new battlefront for securing critical infrastructure and corporate data across varying sectors....more
The Cybersecurity and Infrastructure Security Agency (“CISA”) recently released its new Proposed Rule pursuant to the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (“CIRCIA”), which was published in the...more
The newly promulgated measures increase the threshold of data triggering security assessments and contract requirements while leaving room for Chinese authorities to heavily restrict cross-border data transfers. In...more
On July 13, 2023, the Biden Administration released its National Cybersecurity Strategy Implementation Plan (NCSIP) with the goal of providng transparency and coordination for its existing goals. The NCSIP details more than...more
On August 17, 2021, China released the new regulations on the Security and Protection of Critical Information Infrastructure (CII Regulations), which became effective on September 1, 2021. Even though China started its...more
The regulations aim to protect the security of the CII and impose more compliance obligations in support of the Network Security Law. Key Points: The regulations are designed to provide clarification and guidance on: ...more
Recent U.S. IPOs of Chinese companies prompt data security concerns among government authorities, leading to a tightening of cyber regulations. Cybersecurity review will be mandatory for (i) purchase of network products and...more
On April 27, 2020, twelve Chinese government departments led by the Cyberspace Administration of China (CAC) jointly promulgated the Measures for Cybersecurity Review (the “Measures”) effective June 1, 2020 under the joint...more
The Chinese government has recently issued a flurry of regulations and standards, several in draft form for public comment, to implement the Cybersecurity Law. These mostly reflect a lengthy policy development process...more
The Standing Committee of China's National People's Congress (NPC) adopted the country's Cybersecurity Law1 on November 7—the latest in a spate of national security-related measures targeting the ICT industry. Drafts of the...more