A global gathering of encryption and cyber control experts from India, the EU, Israel, and the UK will dive into the intricacies of complicated, fast-moving U.S. and foreign encryption controls including: decoding BIS semiconductor/advanced computing controls compliance, navigating the finer points of compliance around the long-anticipated intrusion software/communications surveillance cyber rule, the next wave of quantum computing/cryptography and end-to-end encryption, and re-assessing risk profiles for compliance programs.
Fireside Chat: U.S. Export Controls and China
Thea D. Rozman Kendler
Assistant Secretary of Commerce for Export Administration,
Bureau of Industry and Security (BIS)
Us. Department of Commerce
Roszel C. Thomsen II
Thomsen and Burke LLP
Global Export Trade Corporate Counsel
A GLOBAL CAST OF SPEAKERS
Global Sanctions Director, International Trade Group
Dr. Venu Ranganathan
Director, Export Compliance
Group Legal Counsel Trade Compliance
Ericsson AB (Sweden)
C. Devi Bengfort Keller
Director, Government Relations
Add more value to your conference experience by signing up for these hands-on and practical workshops and consider sending your team!
A Complete End-to-End Guide to Updating Your U.S. Encryption Compliance Roadmap: Classification, Licensing, Reporting and More Key Requirements
March 28, 2023
9:00 am – 12:30 pm
Putting Your U.S. Updated Encryption Compliance Roadmap into Practice: How to Resolve the Most Pressing Classification and Program Implementation Challenges
March 28, 2023
1:30 – 5:00 pm
Workshops are offered In-Person only
U.S. SEMICONDUCTOR/CYBER RULE GUIDANCE, CLOUD STRATEGIES AND QUANTUM OUTLOOK
- Supply Chain Impacts of the Semiconductor Rule: Where Will We Find Chips Now?
- Decoding Semiconductor Rule Compliance: ECCNs, FDPR’s, and Inter-Department Gap Analysis
- Category 5, Part Two and the Intrusion Software Rule: End-Use Restrictions for Encryption and License Exceptions
- Quantum Computing and Cryptography: Perspectives on the Next Wave of End-to-End Encryption
- Cloud Encryption and Sharing/Storing of Cloud Data: Mitigating Data Privacy and Technology Transfer Risks
NEW SESSIONS INCLUDE
- Russia: The Intersection of Sanctions and Encryption Control
- India: Drone-Related Amendments in SCOMET, CAROTAR Updates
- The Future Multilateral Export Regimes: Digitization and Innovation Impacts
EARN CLE CREDITS – Continuing Legal Education Credits
Accreditation will be sought in those jurisdictions requested by the registrants which have continuing education requirements. This course is identified as nontransitional for the purposes of CLE accreditation.
ACI certifies this activity has been approved for CLE credit by the New York State Continuing
Legal Education Board.
ACI certifies this activity has been approved for CLE credit by the State Bar of California.
ACI has a dedicated team which processes requests for state approval. Please note that event
accreditation varies by state and ACI will make every effort to process your request.
Questions about CLE credits for your state? Visit our online CLE Help Center at
WHAT PAST PARTICIPANTS HAD TO SAY
Best conference for legal, technical, operational encryption, cybersecurity issues and best practices.
Appreciated the workshops and the depth of information along with the topics covered.
I found all the material to be relevant and it was covered in just about enough depth to keep the audience engaged.
The combination of topics and speakers resulted in a dynamic exchange of information and opinions.