Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
On Demand, On Purpose: Fashion Manufacturing That Doesn’t Cost the Earth
Compliance Tip of the Day: AI and 3rd Party Risk Management
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
GILTI Conscience Podcast | Beyond the Runway: Navigating Tax, Tariffs and Transfer Pricing in Luxury Fashion
How International Companies Can Prepare for July 9 Tariffs
Hot Topics in International Trade - Let's Be Serious-Supply Chain Audits
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Hot Topics in International Trade - Tariff Mitigation Strategies
A Voltage Voyage With Danielle Spalding, Cirba Solutions — Battery + Storage Podcast
Compliance in the Former Soviet Central Asian Republics
Tariffs and Trade Series: What Boards of Directors Need to Know
Episode 369 -- Stepping Into the Enforcement Spotlight -- Customs and Border Patrol and Import Enforcement
Tariffs and Trade Series: What Investors Need to Know
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Tariffs and Trade Series: What Senior Management Teams Need to Know
Wiley's 2025 Key Trade Developments Series: Trade Remedies
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more
Texas emerged from its 89th legislative session with a sweeping set of laws aimed at cementing the state’s leadership in advanced nuclear energy. Through the passage of HB 14, SB 1535 and SB 1061, lawmakers demonstrated a...more
On 25 March 2025, the UK Home Office published its updated Transparency in Supply Chains (TISC): Statutory Guidance (the Guidance), which provides new and detailed recommendations to help organisations comply with Section 54...more
In an era where consumers are increasingly concerned about ethical sourcing and labor practices, the California Transparency in Supply Chains Act (CTSCA) stands as a significant piece of legislation. Enacted in 2010, the...more
After years of anticipation, the Federal Acquisition Regulation (FAR) Council has announced the arrival of its proposed rule to enhance the safeguarding of Controlled Unclassified Information (CUI) in federal contracts (the...more
Visitors from around the world will descend on the U.S., Mexico, and Canada next year as the three countries jointly host FIFA's 2026 World Cup -- and your business might want to start preparing already. It’s being billed as...more
In the global trade universe, where time holds huge importance, weak security practices in your international operations could be detrimental to your business. Customs and Border Protection (CBP), the folks behind CTPAT, are...more
The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more
You might have yet to hear of the NIS2 Directive, but you should be aware of it if you’re in any sector that relies on digital infrastructure. Whether you’re a business owner, IT professional, or curious about how the EU...more
The risks for international investments have sharply expanded in recent years. Identifying, managing, and mitigating investment risk, in the current regulatory environment, can be just as essential as managing risk in any...more
The human element in your supply chain - There is little risk in claiming that ESG (Environment, Social, Governance) has been one of the most used acronyms over the last few years. Some salient examples that changed how...more
In recent years, the global spotlight has illuminated the grave concerns surrounding human rights violations within China's Xinjiang region, particularly those impacting the Uyghur population. The Uyghur Forced Labor...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
If you think that there is a lot of talk about new factory construction in the United States in recent months, you are correct. Ryan Beene, a writer for Bloomberg News, noted last year that some in financial circles had...more
The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
One of the most noteworthy features of the October 18th Final Sale Notice (FSN) for the PACW-1 offshore lease auction – which will be the first west coast auction held by the Bureau of Ocean Energy Management (BOEM) – is the...more
During his first few days in office, President Biden signed numerous executive orders kick-starting the implementation of key features of his campaign platform. Federal contractors may feel overwhelmed by this flurry of...more
The coronavirus pandemic’s impact on the healthcare, travel, and hospitality industries has been severe. From ventilator shortages to empty airports to restaurant chain layoffs, the impacts of the pandemic on certain...more
Seyfarth Synopsis: The Department of Labor Standards and Enforcement, the Employment Development Department, and CalOSHA now have FAQs addressing how the COVID-19. coronavirus affects California businesses....more
The Internet Society’s Online Trust Alliance just released its 2018 Cyber Incident & Breach Trends Report, which says “2018–Some Better, Some Worse, All Bad.” That’s our experience, too. Below are our highlights from the...more
Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more
Two new California laws seek to combat human trafficking through required training and mandatory notice postings. These steps are intended to provide education and resources for employees who believe they, or someone they...more