On Demand, On Purpose: Fashion Manufacturing That Doesn’t Cost the Earth
Compliance Tip of the Day: AI and 3rd Party Risk Management
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
GILTI Conscience Podcast | Beyond the Runway: Navigating Tax, Tariffs and Transfer Pricing in Luxury Fashion
How International Companies Can Prepare for July 9 Tariffs
Hot Topics in International Trade - Let's Be Serious-Supply Chain Audits
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Hot Topics in International Trade - Tariff Mitigation Strategies
A Voltage Voyage With Danielle Spalding, Cirba Solutions — Battery + Storage Podcast
Compliance in the Former Soviet Central Asian Republics
Tariffs and Trade Series: What Boards of Directors Need to Know
Episode 369 -- Stepping Into the Enforcement Spotlight -- Customs and Border Patrol and Import Enforcement
Tariffs and Trade Series: What Investors Need to Know
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Tariffs and Trade Series: What Senior Management Teams Need to Know
Wiley's 2025 Key Trade Developments Series: Trade Remedies
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Wiley's 2025 Key Trade Developments Series: U.S.-Mexico-Canada Agreement (USMCA)
As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more
The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more
Tariffs may seem like a headline reserved for economists and politicians, but at last week’s International Franchise Association (IFA) Legal Symposium in Washington D.C., they were front and center in nearly every room. From...more
What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more
Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more
Uncover hidden vulnerabilities and protect your business. In today’s interconnected world, supply chain disruptions can severely impact your business. Are you confident in your supply chain’s resilience? Do you fully...more
Stay on top of ever-evolving ESG requirements and emerging trends - With the SEC’s newly issued rules surrounding ESG disclosures and the continued growth of regulations rolling out in the EU, Canada, Asia and elsewhere...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
Elevate your resilience in the new year by understanding top GRC trends, patterns, and best practices across AI, TPRM, cyber risk, and more. As we step into 2024, technological advancements and an increasingly connected —...more
Vendor risk has the power to impact an organization’s reputation, ESG (environmental, social, governance) initiatives, and information security. Similarly, vendors can affect a project’s performance due to their financial and...more
Effective Third-Party Risk Management (TPRM) is all about understanding that working with any third-party vendor or supplier carries an inherent risk. Across all industries, organizations are faced with a two-fold...more
Supply chain considerations for firearms industry members break down into two key relationships: your customers and your vendors. Ensuring that you have the components and other supplies you need and ensuring that you can...more
Managing your vendor network and supply chain used to be easier. You knew who all your suppliers were, you could visit their sites, and you knew them as individuals you’d worked with for many years....more
Organizations around the globe began 2021 grappling with two significant supply-chain attacks. First, the SVR, Russia’s foreign intelligence service, planted malicious code in Orion, SolarWinds’ flagship network management...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
With more than 153,000 cases reported globally (as of March 15, 2020), including more than 1,600 in the United States (as of March 13, 2020)–and both totals increasing by the hour–the COVID-19 pandemic is already wreaking...more
Over the past nine months in Hong Kong, luxury retailers have encountered a challenging market. Hong Kong has traditionally been a popular destination for Mainland Chinese seeking to purchase luxury goods, but recent...more
Supply chains are emerging as an increasingly complex risk area for compliance. The risk includes trade compliance, vendor management issues associated with cyber/privacy, product compliance, REACH, ROHS and California...more
On December 26, Marty and Dave McFly were playing video games when, downstairs in the living room, the hoverboard that Marty had received for Christmas ignited. The fire quickly engulfed the Christmas tree and spread...more
The United Kingdom has a number of interesting ideas and policy initiatives. The UK Bribery Act was a strong statement against corruption, but remains unenforced. The United Kingdom has enacted the Modern Slavery Act,...more