A global gathering of encryption and cyber control experts from India, the EU, Israel, and the UK will dive into the intricacies of complicated, fast-moving U.S. and foreign encryption controls including: decoding BIS semiconductor/advanced computing controls compliance, navigating the finer points of compliance around the long-anticipated intrusion software/communications surveillance cyber rule, the next wave of quantum computing/cryptography and end-to-end encryption, and re-assessing risk profiles for compliance programs.
KEYNOTE ADDRESS
Fireside Chat: U.S. Export Controls and China

Thea D. Rozman Kendler
Assistant Secretary of Commerce for Export Administration,
Bureau of Industry and Security (BIS)
Us. Department of Commerce
CONFERENCE CO-CHAIRS

Roszel C. Thomsen II
Partner
Thomsen and Burke LLP

Mathilde Latour
Global Export Trade Corporate Counsel
Cisco (France)
A GLOBAL CAST OF SPEAKERS

Jason Rhoades
Global Sanctions Director, International Trade Group
Intel

Dr. Venu Ranganathan
Director, Export Compliance
Microsoft

Richard Tornberg
Group Legal Counsel Trade Compliance
Ericsson AB (Sweden)

C. Devi Bengfort Keller
Director, Government Relations
Texas Instruments

Garima Prakash
Deputy Manager
NASSCOM (India)
PRE-CONFERENCE WORKSHOPS
Add more value to your conference experience by signing up for these hands-on and practical workshops and consider sending your team!
WORKSHOP A
A Complete End-to-End Guide to Updating Your U.S. Encryption Compliance Roadmap: Classification, Licensing, Reporting and More Key Requirements
March 28, 2023
9:00 am – 12:30 pm
WORKSHOP B
Putting Your U.S. Updated Encryption Compliance Roadmap into Practice: How to Resolve the Most Pressing Classification and Program Implementation Challenges
March 28, 2023
1:30 – 5:00 pm
Workshops are offered In-Person only
U.S. SEMICONDUCTOR/CYBER RULE GUIDANCE, CLOUD STRATEGIES AND QUANTUM OUTLOOK
- Supply Chain Impacts of the Semiconductor Rule: Where Will We Find Chips Now?
- Decoding Semiconductor Rule Compliance: ECCNs, FDPR’s, and Inter-Department Gap Analysis
- Category 5, Part Two and the Intrusion Software Rule: End-Use Restrictions for Encryption and License Exceptions
- Quantum Computing and Cryptography: Perspectives on the Next Wave of End-to-End Encryption
- Cloud Encryption and Sharing/Storing of Cloud Data: Mitigating Data Privacy and Technology Transfer Risks
NEW SESSIONS INCLUDE
- Russia: The Intersection of Sanctions and Encryption Control
- India: Drone-Related Amendments in SCOMET, CAROTAR Updates
- The Future Multilateral Export Regimes: Digitization and Innovation Impacts
EARN CLE CREDITS – Continuing Legal Education Credits
Accreditation will be sought in those jurisdictions requested by the registrants which have continuing education requirements. This course is identified as nontransitional for the purposes of CLE accreditation.
ACI certifies this activity has been approved for CLE credit by the New York State Continuing
Legal Education Board.
ACI certifies this activity has been approved for CLE credit by the State Bar of California.
ACI has a dedicated team which processes requests for state approval. Please note that event
accreditation varies by state and ACI will make every effort to process your request.
Questions about CLE credits for your state? Visit our online CLE Help Center at
www.americanconference.com/accreditation/cle/
WHAT PAST PARTICIPANTS HAD TO SAY
![]()
Best conference for legal, technical, operational encryption, cybersecurity issues and best practices.
![]()
Appreciated the workshops and the depth of information along with the topics covered.
![]()
I found all the material to be relevant and it was covered in just about enough depth to keep the audience engaged.
![]()
The combination of topics and speakers resulted in a dynamic exchange of information and opinions.