Agenda
Flip through our conference brochure and discover what’s new this year.
Download Brochure
Day 1
November 13, 2024
Registration and Continental Breakfast
Peter HarrellAttorneyFormer Senior Director, International Economics and Competitiveness, The White House; National Security Council; National Economic Council
Kit ConklinSenior AdvisorU.S. House Select Committee on China
Jeanette ChuVice President, National Security PolicyNational Foreign Trade CouncilFormer Senior Policy Advisor, Bureau of Industry Security (BIS)
U.S. Department of Commerce
As the White House continues to try to slow the growth of Chinese advanced supercomputing and information/communications sector technology, as well as proposed rules to tighten biotechnology tech transfers to China, what can industry expect around China trade policy here forward, post-election, as US/China trade tensions continue to evolve?
Extended Networking Break
Case Studies
Deciding If and How to Continue Business Operations in China: Aligning Business, Operations, Trade Compliance and Risk Management
Sarah O’Hare O’NealDeputy General Counsel, International Trade LawMicrosoft
Elizabeth FitzpatrickVice President & General Counsel, Trade and Chief Export Counsel Honeywell
Mollie SitkowskiPartnerFaegre Drinker Biddle & Reath LLP
Evan Y. ChuckPartnerCrowell & Moring LLP
- Leveraging joint ventures to maintain select China operations
- What are the business thresholds for maintaining China operations?
- What are the impacts of China’s US export control/sanctions countermeasures on businesses in China: The relationship between The Anti-Foreign Sanction Law, Unreliable Entity List and the Blocking Order
- Completing the factual and legal due diligence and analysis needed to achieve clarity about the status of your business with China under international trade restrictions
STRATEGY SESSION #1 (Hypothetical Scenarios and Audience Polling)
Making the Toughest Export Compliance Calls on China: de minimis, FDPR and the Interplay with Economic Sanctions
Mark JonesExport Compliance ManagerWILO Group LLC
Nancy FischerPartnerPillsbury Winthrop Shaw Pittman LLP
Using hypothetical scenarios and audience feedback, this session will delve into the most vexing grey areas and compliance pain points
FDPR:
- Avoiding key pitfalls when applying the FDPR
- Foreign Direct Product Rule (FDPR)/advanced computing export controls rules
- de minimis threshold decision-making
- Examine necessary tools your peers are using for when your compliance teams are stumped by:
- Impacts of the FDPR rule: How do you tighten up compliance oversight around third-party due diligence procedures?
- Conducting gap analysis: Updating your compliance program protocols to make sure legal, engineering, and trade compliance are all in the loop
- What constitutes “controlled content”
- Ineligible items for de minimis
- Standardized methodologies of calculations, documentation, record and communication
- Examine necessary tools your peers are using for when your compliance teams are stumped by:
- Employee training and monitoring
- Understanding internal processes that lead to the export transaction: Working with all teams involved including development, fulfillment, logistics, finance and IT
- Has the company provided tailored training for high-risk and control employees?
- What resources have been available to employees to provide guidance
- Conducting gap analysis: Updating compliance programs to make sure legal, engineering, and trade compliance are all in the loop with new controls
- Third-party management
- Developing a model that stratifies your risk based on third parties — and how to perform due diligence accordingly
- What to do with information uncovered during the vetting process: How to evaluate red flags
Networking Lunch
ICTS FIRESIDE CHAT
The Office of Information and Communications Technology and Services (ICTS) Technology Restriction Priorities and Expectations
Elizabeth CannonExecutive Director of the OICTS, Bureau of Industry and SecurityU.S. Department of Commerce
Jeanette ChuVice President, National Security PolicyNational Foreign Trade CouncilFormer Senior Policy Advisor, Bureau of Industry Security (BIS)
U.S. Department of Commerce
Navigating ICTS Supply Chain Rules: How Industry is Screening, or Preparing to Screen, Technology Transactions Amid Increased ICTS Oversight
Bob BowenExport and Trade Compliance CounselServiceNow
Michael BermudezVice President, International Trade ComplianceParsons
Chris TimuraPartnerGibson Dunn
Businesses will need to keep a closer eye on their digital supply chains if they want to steer clear of looming government oversight and enforcement as part of a U.S. government push to secure the information and communications technology (ICTS) infrastructure from exploitation by foreign adversaries. The latest ANPRM now also brings connected vehicles (CVs) technology under the ICTS microscope. How is industry screening, or preparing to screen, such technology transactions out of their existing supply chains?
Networking Break
EXPORT SANCTIONS AND GEOPOLITICAL RISKS IN THE BIG PICTURE
How Senior Corporate Leadership is Evaluating and Ranking Trade, Cyber, Data Privacy and Supply Chain Risks
Irene ChiuSenior Vice President & Chief Compliance OfficerMicroPort Orthopedics
Michael DiPaula-CoyleHead of International Trade Policy/Director for Trade, Enterprise Risk and Supply Chain ResiliencyIBM
This session will feature current corporate executive insights into current supply chain risks amid increased cyber hazards, the Bulk Data EO, evolving advanced computing restrictions as well as anticipated increased technological restraints in a tense geopolitical environment.
HYPOTHETICAL SCENARIOS AND AUDIENCE POLLING
MEU, MIEU and CCMC Rules: New Enforcement Risks and the Hidden Lessons for Updating Compliance and Licensing Practices
Sahra Park-SuLead Senior Legal Counsel, Export Control (Global)SAP
Debbie ShafferSenior Manager, Global Trade ComplianceL3 Harris Technologies
Jahna HartwigOf CounselWilson Sonsini Goodrich & Rosati
- Key Elements: CCMC, MEU, MIEU
- How industry is updating screening, compliance policies and procedures around MEU, MIEU and CMIC regulations: What are best practices?
- Getting previous Returned Without Action (RWA) notices approved:
- Hypothetical Scenario: What do you do if a customer’s subcontractor ends up on the MEU list, even if they have no military intent? How do you prove to BIS that this subcontractor will avoid military activities to get your RWA approved?
- License applications, approvals, and denials: What are the lessons learned from ever-evolving trends?
- CMMC, MEU, MIEU due diligence tools:
- Development of a Heat Map to focus on risk-based compliance
- Preparing questionnaires to help the business flag risk areas based on likely business opportunities
- Leveraging relationships in countries where business opportunities are likely to arise
- Beneficial owner screening:
- Screening for the customer and any entity with a 50% or greater ownership interest
- Best practices around screening all significant shareholders (5% or more) and the company’s Directors and Officers
- Resources beyond screening:
- Open-source research: Conduct searches of each end-user to verify and confirm business relationships and dealings
- Questionnaires
- Common practice includes sending questionnaires regarding the use of products, requests for org charts, and end use certificates
- End Use Certification: Customer confirmation of their anticipated end use of the product
- End User Questionnaire: Exporters should conduct due diligence to determine an entity’s ownership, business background, and intended use of product
Close of Day One
Day 2
November 14, 2024
Registration and Continental Breakfast
Fireside Chat
Special Update on Disruptive Technology Task Force Progress and the Future of China Export Controls and Sanctions Enforcement
Kevin KurlandDeputy Assistant Secretary, Bureau of Industry and SecurityU.S. Department of Commerce
Julie EdelsteinPrincipal Deputy Section Chief, Counterintelligence and Export Control SecurityU.S. Department of Justice
Renee LatourPartnerClifford Chance LLP
STRATEGY SESSION #2 (Hypothetical Scenarios and Audience Polling)
Managing Cross Border Data Transfers Under the Proposed Bulk Data EO Regulations: Aligning Risk Mitigation for Export Compliance and Licensing
Hena SchommerDirector, Trade LegalApplied Materials
Yan LuoPartnerCovington & Burling LLP
Businesses and entities involved in data-related activities must adapt to an evolving regulatory landscape to ensure compliance and protect their operations from potential risks. How are multinationals preparing for anticipated enforcement around the Bulk Data EO?
- The concept of “controlled” to include bulk sensitive data that might not traditionally fall under the EAR other ITAR
- How the proposed rule aligns with export control restrictions that focus on preventing the transfer of critical technologies and sensitive information
- Reviewing transactions involving bulk sensitive data with foreign adversaries, similar to how export controls require licenses for certain exports to controlled destinations
- How both the EO and export controls use similar criteria to assess national security risks, including the potential use of data for surveillance or intelligence activities
Networking Break
COMPLIANCE PROGRAM INTEGRATION
Integrating Export Controls and Sanctions for an Optimal Compliance Program: Revisiting Your Organization’s Risk Profile and Detecting Program Weak Spots
Barb SecorVice President, Global Trade ComplianceThermo Fisher Scientific
Mollie SitkowskiPartnerFaegre Drinker Biddle & Reath LLP
Panelists will describe the evolution of their sanctions and export control compliance programs, lessons learned, what tools they have used, and other hallmarks of a best-in-class program to maintain compliance while maintaining supply due diligence and keeping supply chains moving.
- Delve into certain components that companies have integrated within their current processes
- Using root cause analysis to identify recurring problems and improve compliance efficiencies
- Industry specific challenges – Semiconductor companies, telecommunication companies, aerospace companies, O&G, etc.
- Program differences and similarities between industries
- Working with verified entities – How much due diligence is enough?
- How to conduct a sanctions risk assessment as part of your compliance program
- Keeping up with evolving export control requirements
- Assessing the benefits of self-disclosure amid a possible violation
- Getting buy-in for compliance efforts from the top down
- Resource challenges: Getting top down buy-in
Networking Lunch
TRANSACTIONAL RISK MANAGEMENT
Export, Sanctions, JV and M&A Transaction Risk Management in China: How the Financial Community is Re-Assessing Their Risk Tolerance and Decision-Making
Sasha KalbDirector, Financial Crimes LegalBarclays (Hong Kong)
Paul MarquardtPartnerDavis Polk & Wardell LLP
- How are financiers changing their risk assessments and what have the impacts been on those making investments?
- Screening supply chains for compliance and revisiting contractual obligations for risk mitigation
- Leveraging joint ventures to maintain select China operations
- What are the business thresholds for maintaining China operations?
- What are the impacts of China’s US export control/sanctions countermeasures
FOREIGN ADVERSARY CONTROLLED APPLICATIONS
Beyond TikTok: The Establishment of the Committee for the Review of Foreign Adversary Controlled Applications
Eric S. JohnsonPrincipal Deputy Chief, Foreign Investment Review SectionU.S. Department of Justice
Benjamin G. JoseloffPartnerCravath, Swaine, & Moore LLP
When Congress passed the Protecting Americans from Foreign Adversary Controlled Applications Act in April 2024, most of the headlines focused on the law’s effect on a single popular social media app: TikTok. In July 2024, however, President Biden used authorities under the new law to establish the Committee for the Review of Foreign Adversary Controlled Applications, which could have far-ranging consequences across the digital landscape. What is the status of the new committee and how will it fit in among the U.S. Government’s other tools for combatting commercial hybrid threats?
Break
PROVING SOURCE OF ORIGIN UNDER THE UFLPA
UFLPA and the Interplay with Export Controls and Sanctions Compliance
Kelly HermanCorporate CounselNorthrop Grumman
Ted MurphyPartnerSidley Austin LLP
Erika Vidal-FaulkenberryGlobal Head, Trade ComplianceBiogen
David LynchSVP, Analytical Solutions & ServicesSayari
- Exporting UFLPA detained/excluded merchandise (when/how/where)
- Should economic sanctions and export control measures be employed as a tool of the UFLPA?
- Overlap between UFLPA Entity List and BIS Entity List for human rights violations
- Shared Government Agencies participating in the FLETF and End-User Review Committee
REPUTATIONAL RISK AND NIGHTMARE SCENARIOS
The Unwritten Lessons for Reputational Risk, Crisis Management and the Fear of Retaliation: Recent Examples of Hits and Misses
David A. RingPartnerWiggin and Dana LLP
Rod MenasDirector, Export ComplianceKeysight Technologies
- How reputational and retaliatory risks have evolved for financial institutions and corporations doing business in China
- Rethinking China-centric reputational risk management amid geopolitical shifts, a rise in shareholder activism, public pressures and enforcement developments
- The evolving role of legal and compliance in managing reputational risk
- Managing the reputational aftermath of China trade related regulatory disclosures and government investigations
- Implementing new Board and Audit Committee priorities, including anti-bribery, ESG and emergency preparedness