Episode 385 -- Five Strategies to Mitigate a New Risk Environment
The Presumption of Innocence Podcast: Episode 68 - The Legacy and Lessons of Guantanamo Bay: A Defense Attorney’s Perspective
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
Great Women in Compliance: LATAM Compliance Update with Alejandra Montenegro Almonte
Compliance into the Weeds: A Deep Dive into Cadence Design Systems’ Export Control Violations
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Daily Compliance News: August 1, 2025, The All AI Edition
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Navigating the Updated SF-328 Form
Compliance into the Weeds: Changes in FCPA Enforcement
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Foreign Correspondent Podcast | The America First Investment Policy and What it Means for Investors
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
On May 12, 2025, the Defense Counterintelligence and Security Agency (DCSA) released an updated Standard Form 328 (SF-328), “Certificate Pertaining to Foreign Interests.”...more
On October 11, 2024, the United States Department of Defense (DOD) published a final rule implementing its Cybersecurity Maturity Model Certification (CMMC) program, which is designed to verify that defense contractors are...more
CMMC 2.0 – Simplification and Flexibility of DoD Cybersecurity Requirements - Evolving and increasing threats to U.S. defense data and national security networks have necessitated changes and refinements to U.S. regulatory...more