On Demand, On Purpose: Fashion Manufacturing That Doesn’t Cost the Earth
Compliance Tip of the Day: AI and 3rd Party Risk Management
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
GILTI Conscience Podcast | Beyond the Runway: Navigating Tax, Tariffs and Transfer Pricing in Luxury Fashion
How International Companies Can Prepare for July 9 Tariffs
Hot Topics in International Trade - Let's Be Serious-Supply Chain Audits
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Hot Topics in International Trade - Tariff Mitigation Strategies
A Voltage Voyage With Danielle Spalding, Cirba Solutions — Battery + Storage Podcast
Compliance in the Former Soviet Central Asian Republics
Tariffs and Trade Series: What Boards of Directors Need to Know
Episode 369 -- Stepping Into the Enforcement Spotlight -- Customs and Border Patrol and Import Enforcement
Tariffs and Trade Series: What Investors Need to Know
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Tariffs and Trade Series: What Senior Management Teams Need to Know
Wiley's 2025 Key Trade Developments Series: Trade Remedies
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Wiley's 2025 Key Trade Developments Series: U.S.-Mexico-Canada Agreement (USMCA)
In 2023, a data center experienced a complete power loss during a scheduled electrical grid maintenance. Less than five months later, that same facility faced another major power outage. However, this time the impact was...more
President Trump issued a cybersecurity Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity” (Trump EO), along with a corresponding Fact Sheet on June 6, 2025. The Trump EO clears some of the...more
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more
Citing the threats posed by foreign adversaries and criminal organizations, and seeking enhanced accountability for companies that provide software and cloud services to the federal government, the Biden administration has...more
The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more
While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more
Inflation relief for defense contractors, a ban on procurement of products and services containing certain Chinese semiconductors, and codification of the Federal Risk and Authorization Management Program (FedRAMP) governing...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
The Situation: The United States government has been ramping up its efforts to protect sensitive data and is making clear it expects its contractors to protect data they receive and create. According to a recent Inspector...more
The complexity of operations, research and compliance mandates in higher education presents unique challenges in securing information systems. Cybersecurity compliance affects everything from the handling of student data to...more
The rise of cloud computing services and the privacy/security issues involved have been much discussed. But when customers procure cloud-based services, a critical "behind the scenes" issue is often overlooked: is the cloud...more