No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Navigating the Updated SF-328 Form
Compliance into the Weeds: Changes in FCPA Enforcement
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Foreign Correspondent Podcast | The America First Investment Policy and What it Means for Investors
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
On January 8, 2025, the U.S. Department of Justice (Department or DOJ) issued new rules required by then-President Biden’s February 2024 Executive Order (EO) 14117 to establish a new regulatory framework aimed at “Preventing...more
Determine how the new administration will affect CFIUS practitioners and how the committee will continue its enforcement practices at ACI’s 11th National Conference on CFIUS. Don’t miss your best opportunity to hear how your...more
As Trump administration directives emerge, it’s crucial for businesses and other stakeholders to stay informed and adapt their strategies accordingly. We will provide ongoing coverage of these developments and their potential...more
The National Security Presidential Memorandum-33 (NSPM-33), issued in January 2021, directed federal agencies that fund research and development (R&D) projects to require certain "Covered Institutions" to certify that the...more
The Biden Administration announced on February 29, 2024, that it is commencing an inquiry into whether the involvement of “foreign adversaries” in the information and communications technology and services (“ICTS”) supply...more
Over the past year, we have seen the various agencies and branches of government issue a slew of rules, guidance, and directives over the use (and misuse) of Artificial Intelligence (AI). In May, the EEOC issued guidance on...more
AI in 2024: Monitoring New Regulation and Staying in Compliance With Existing Laws Companies that develop or employ AI tools have to consider proposed AI-specific regulation as well as an array of existing IP, privacy,...more
Welcome to the October edition of Akin Intelligence. We continue to see bipartisan and international interest in artificial intelligence (AI) regulation. In the executive branch, agencies are working towards developing...more
On July 13, 2023, the Biden Administration released its National Cybersecurity Strategy Implementation Plan (NCSIP) with the goal of providng transparency and coordination for its existing goals. The NCSIP details more than...more
It is estimated that some 80 million Americans and more than one billion people use TikTok. It is well known that TikTok has a direct connection to the Chinese Communist Party, which is a foreign adversary of the U.S. This...more
President Biden recently signed a National Security Memorandum on cybersecurity. This memorandum was required by an earlier executive order, which we previously have discussed here. The new memorandum (NSM) requires certain...more
The regulations aim to protect the security of the CII and impose more compliance obligations in support of the Network Security Law. Key Points: The regulations are designed to provide clarification and guidance on: ...more
Recent U.S. IPOs of Chinese companies prompt data security concerns among government authorities, leading to a tightening of cyber regulations. Cybersecurity review will be mandatory for (i) purchase of network products and...more
On April 27, 2020, twelve Chinese government departments led by the Cyberspace Administration of China (CAC) jointly promulgated the Measures for Cybersecurity Review (the “Measures”) effective June 1, 2020 under the joint...more