Illness, Disability, and Workplace Performance: A Guide for Employers
Episode 384 -- Third-Party Risks and Sanctions
Building a Team of Trusted Advisors
ERGs: Valuable or Vulnerable?
Navigating U.S.-China Relations: Lessons From History for Today’s Global Economy
Work This Way: A Labor & Employment Law Podcast | How Employers Can Protect Intellectual Property with Bryan Baysinger of Maynard Nexsen
Regulatory Rollback: Impact of the CFPB's Withdrawal of Overdraft and Deposit Account Fee Guidance on Financial Institutions and Related Litigation Risks — The Consumer Finance Podcast
Protect Yourself and Your Business with Indemnification Understanding
False Claims Act Insights - An FCA Perspective on Artificial Intelligence in the Healthcare Industry
Data Driven Compliance: The Failure to Prevent Fraud Offense: Insights for US General Counsels with Mike DeBernardis
AI Today in 5: August 22, 2025, The Angst Episode
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Demystifying Wage and Hour Audits: One-on-One with Courtney McFate
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Hot Topics in International Trade - The Daunting Task of Export Compliance With Braumiller Law Group
New FLSA Notice Standard, DOL’s PAID Program, Axed Wage and Hour Penalties - #WorkforceWednesday® - Employment Law This Week®
Cuando la marca viaja en turista y sin registro
Compliance Tip of the Day: Trust and Verify
Earlier this month the Cybersecurity and Infrastructure Security Agency (“CISA”), the U.S. federal agency under the Department of Homeland Security (“DHS”) whose mission is to protect the nation’s critical infrastructure from...more
The Texas Responsible AI Governance Act (the “Act”) is set to take center stage during the 89th Texas legislative session, which began on January 14, 2025. The Act proposes new legislation to regulate development and...more
On May 31, 2025, the Alberta Security Management for Critical Infrastructure Regulation (the Regulation) will come into force and is expected to alter existing security requirements for critical resource infrastructure in...more
On November 6, 2024, the Transportation Security Administration (TSA) published a Notice of Proposed Rulemaking (NPRM) that would mandate cyber risk management and reporting requirements for certain surface transportation...more
The Transportation Security Administration's ("TSA") proposed rule would require owners and operators of certain pipeline, freight railroad, passenger railroad, rail transit, and over-the-road bus ("OTRB") systems to...more
Cybersecurity continues to be top of mind for federal and state policymakers. This advisory identifies and analyzes some major recent developments that present opportunities and challenges in the coming months for a broad...more
The U.S. Transportation Security Administration (TSA) issued its second Security Directive to the pipeline industry on July 20, 2021, following the Colonial Pipeline cybersecurity incident. ...more
New cybersecurity requirements for oil and gas pipelines signal important changes to the regulatory landscape for midstream companies. A new security directive from the Transportation Security Administration (TSA), effective...more
The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more
Find out why the cyberattack on Colonial Pipeline will have broad implications on how the energy industry defends and responds to future incidents....more
Find out why developing and continually maintaining a business continuity plan can help energy companies better prepare for unexpected disturbances....more
Is your ETRM system leaving you exposed to cybersecurity threats?...more
A cyberattack on a single gas compression facility resulted in the shutdown of a natural gas pipeline for two days, according to a recent alert from the US Department of Homeland Security’s Cybersecurity and Infrastructure...more
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
Energy Blockchain’s Most Obvious Use Case is Not What You Think - "Instead, a select group of blockchain companies is finding success with a focus on certificates of origin, helping demonstrate the provenance of renewable...more
Sunday’s release of a long-awaited Labor Department final rule on joint employment spells trouble for workers hoping to “sue large companies for wrongdoing by contractors or franchisees.” The rule reverses Obama-era policies...more
On March 22, 2019, Foley Hoag hosted the New England Electricity Restructuring Roundtable, organized by Raab Associates. The roundtable featured keynote addresses by Federal Energy Regulatory Commission (“FERC”) Commissioner...more
• The pipeline sector is a crucial aspect of the nation's economic and national security. While the sector has a host of regulators on various aspects of the industry from the Federal Energy Regulatory Commission (FERC), U.S....more
On Tuesday, July 31, 2018, the Department of Homeland Security (DHS) hosted a National Cybersecurity Summit, featuring the nation's top homeland, national security and law enforcement officials. The event featured Vice...more
According to the National Institute of Standards and Technology (NIST), the energy sector relies on industrial control systems assets to “generate, view article transmit, and distribute power and to drill, produce, refine,...more
DNV GL recently issued a new globally applicable recommended practice (DNLVGL-RP-G108) to assist oil and gas operators, system integrators and managers, and vendors in the offshore industry to manage increasing cybersecurity...more
Gov. Dannel P. Malloy recently appointed Democrat Arthur H. House the state’s first cybersecurity czar. House moves into the role after serving as the chairman of the Public Utilities Regulatory Authority for the past four...more
In this issue: - A Sea Change Sweeps over Congress: A Look Back and a Look Ahead - Shipping & International Trade Law (Second Edition 2015) - Congress Passes Coast Guard Bill in Waning Hours of 113th...more