🚨 Catch-All in Export Control – Are You Covered? Even if your item, software, or technology isn’t on a control list… 👉 You might still need a license. Why? Because of Catch-All rules. These apply when your export has a critical end-use like: 🧪 Weapons of mass destruction 🪖 Military applications 🔐 Cyber surveillance 🚫 Human rights violations 🌍 National or international security threats 📌 In such cases, even “safe” items can become sensitive. ✅ What should exporters do? -Ask your customer about end-use and end-user -Check if the destination is sanctioned -Document anything that looks risky -Apply for a license if needed 🛡 Catch-All helps plug the gaps where control lists stop. It’s not just about what you export, but also where, how, and why it’s used. #ExportControl #CatchAll #TradeCompliance #DualUse #WMD #CyberSurveillance #HumanRights #Sanctions #RiskManagement #EUCompliance #EAR #ITAR #RespectUs #DecodedSeries #SupplyChainSecurity #ExportRisk #B2B #TechCompliance #ControlLists
Patrick Goergen’s Post
More Relevant Posts
-
Cybersecurity Export Regulations: ITAR and EAR Explained Cybersecurity tools and technologies often cross international borders but so do the laws that regulate them. Two key U.S export control frameworks govern how cybersecurity products, services, and even encrypted data can be shared globally: ➡️ ITAR (International Traffic in Arms Regulations) : Regulates defense related items, including certain cybersecurity tools designated as military grade. ➡️ EAR (Export Administration Regulations) : Covers commercial technologies with potential military applications, such as dual use encryption and information security software. Follow Learn Lounge with Raviteja Mureboina for more such posts #Cybersecurity #ITAR #EAR #ExportControls #Compliance #CyberLaw #Encryption #InformationSecurity #DualUseTechnology #RiskManagement #GlobalTech
To view or add a comment, sign in
-
Cyber adversaries aren’t just going after systems—they’re going after people, roles and the ecosystem around them. 🛡️What You Can Do 1. Conduct personal-data asset inventory — Understand what data you and your ecosystem hold about leadership, sensitive roles, contractors, etc. 2. Limit and monitor access — Ensure that sensitive CRM or cloud data (especially third-party) is under strict access controls and logging. 3. Strengthen identity security — Enforce MFA, implement strong password hygiene, monitor for credential leaks (including for high-risk roles). 4. Adopt proactive threat intelligence — Identify when out-of-scope data (e.g., within CRM systems) is exposed, especially for roles within government or critical infrastructure. 5. Educate users on evolving threat vectors — Phishing campaigns leveraging personal information are increasing; tailor awareness training accordingly. 6. Review third-party and supply-chain exposure — Are your contractors, SaaS applications, and cloud providers adequately protected and audited? 🔗https://lnkd.in/edKfJgtq
To view or add a comment, sign in
-
🚨 Major Cybersecurity Alert: Personal Data of Thousands of US Government Officials Exposed. The recent report from 404 Media is a stark reminder of the massive impact of supply chain attacks and third-party data breaches on national security. A hacking group claims to have compiled personal dossiers on tens of thousands of U.S. government employees, including personnel from the NSA, Defense Intelligence Agency (DIA), Air Force, DHS, ICE, and FBI. The key takeaway for every organization: The data was reportedly acquired not from a direct hack on a government network, but by sifting through caches of stolen Salesforce customer data. This underscores the critical vulnerability introduced by relying on third-party vendors. A breach at one company (the vendor) can cascade into a national security crisis for countless others (the clients). What this means for us: ✔️ Supply Chain Risk is Real: Your vendor's security is your security. Vet partners rigorously. ✔️ PII Protection: The personal information of all employees, especially those in sensitive roles, must be treated as a top-tier security asset. ✔️ Zero Trust: Assume external vendor environments are compromised and design systems accordingly. The stakes couldn't be higher. We need to elevate our focus on third-party risk management immediately. -- 404 Media https://lnkd.in/gSXP3hfk #Cybersecurity #NationalSecurity #DataBreach #SupplyChainSecurity #RiskManagement #hackers #hack #data
To view or add a comment, sign in
-
Malicious actors can exploit unencrypted satellite communications for passive corporate espionage, potentially leading to undetected intellectual property theft and financial fraud. A recent academic study found that over 50% of observed satellite communications carried cleartext (unencrypted) data, exposing internal communications from telecommunications, utilities, military, aviation and retail sectors. The study shows that sensitive data can be accessed without hacking, allowing adversaries to monitor business operations and supply chains. Customer data leaks can result in costly litigation over violations of data protection laws in various countries. For more information on Emergent RiskIQ™, visit: https://lnkd.in/e7njbsD6 #StrategicIntelligence #RiskIntelligence #RiskManagement #Geopolitics #SecurityIntelligence #PoliticalRisk #Intelligence #Security #CyberSecurity #CrisisManagement #SupplyChain #FutureForwardResilience
To view or add a comment, sign in
-
-
⚠️ Are shipping cyberattacks on the rise, or are they overlooked by War, Spoofing, or Jamming? Henry Clack from HFW recently explained to the BBC News why hackers are targeting the shipping world 🚢 🚨 “Cargo ships are facing a surge in cyber attacks from both criminal gangs and hostile nation states, posing significant threats to global trade. 🖥️ 💵 The primary motivations for these attacks include ransom demands, espionage, and attempts to disrupt supply chains and shipping operations. ⚠️ Vulnerabilities in maritime IT systems and shipboard networks make shipping companies and vessels attractive targets for hackers.” Is this actually a significant problem? Is the industry prepared for cyber ransoms on a large scale? #maritimesecurity #maritimesafety
To view or add a comment, sign in
-
-
Global Sourcing Faces Rising Cyber Threats: Shipping Costs and Risks Surge Worldwide The global shipping industry—responsible for transporting around 80% of world trade—is experiencing a significant surge in cyber attacks, which jeopardize operational stability and financial resilience across the supply chain. According to law firm HFW, Nigerian criminal gangs are behind many high-value “man-in-the-middle” frauds, where hackers intercept communications to steal payment data or gain control of systems. Average cyber incident costs for shipping firms doubled to US$550,000 between 2022 and 2023, with ransom demands now averaging US$3.2 million. Learn more at: https://lnkd.in/d2NT9GpK
To view or add a comment, sign in
-
"About 10,000 cleared companies are in the National Industrial Security Program, and only 20 percent of them ever submit a suspicious contact report, Redding said. “So, what we know is limited.”" In Australia - DISP Members - How many SOUP or Contact Reports via AGSVA or ASIO have you submitted? Read more: https://zurl.co/vHsrw
To view or add a comment, sign in
-
-
"About 10,000 cleared companies are in the National Industrial Security Program, and only 20 percent of them ever submit a suspicious contact report, Redding said. “So, what we know is limited.”" In Australia - DISP Members - How many SOUP or Contact Reports via AGSVA or ASIO have you submitted? Read more: https://zurl.co/vHsrw
To view or add a comment, sign in
-
-
The report I worked on over the summer is now LIVE on the Orion Policy Institute's website! The report outlines case studies of how Russian and Chinese non-state actors conduct cyber-espionage operations, while analyzing the effectiveness of the US response. An important read in an ever-changing technological environment.
In our most recent research, Suleyman Ozeren and Kate Shymkiv maps how state actors like #China conduct #cyberespionage operations using zero‑day exploits, supply chain attacks, insider access, and advanced persistent threat (APT) tactics. The report argues that the U.S. response has leaned heavily on diplomatic naming and shaming, sanctions, and criminal indictments. While these tools raise the cost for aggressors, their deterrent effect is limited in an environment of ambiguous attribution and weak enforcement. Read more below! #cybersecurity #nationalsecurity #cyberattacks https://lnkd.in/edkFJ-rS
To view or add a comment, sign in
-
The Computer Emergency Response Team of Ukraine, CERT-UA, operating under the State Service of Special Communications and Information Protection of Ukraine (SSSCIP), has issued a warning regarding a new wave of targeted cyberattacks observed since the second half of September 2025. The attacks, tracked under the identifier UAC-0239, are directed at the Defence Forces of Ukraine and local government authorities. The adversaries exploit the theme of "countering Russian sabotage and reconnaissance groups" and purport to act on behalf of the Security Service of Ukraine to distribute malicious software. Cybercriminals are disseminating emails through popular services such as Ukr.net and Gmail. These emails contain either a link to download an archive, which may be password-protected, or a directly attached file in the Virtual Hard Drive (VHD) format. Upon opening the VHD file, a virtual drive is mounted on the victim's computer. This drive contains an executable file alongside several decoy documents, typically in PDF format, intended to divert attention. Executing the file leads to the system being compromised by malicious software. Should you detect any sign of malicious activity, please report it immediately to CERT-UA at incidents@cert.gov.ua or by calling +38 (044) 281 88 25.
To view or add a comment, sign in
-