Attention:
Card image cap

Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Cybersecurity

Card image cap
57 minutes
cc
Data Security Management: Common Threats and Best Practices to Bolster Defenses
The rise of data has created a host of opportunities for businesses and organizations across all industries. However, as data has become a company’s most valuable asset, safeguarding it from internal and external threats has also become crucial to business continuity and success. Join distinguished data security and privacy lawyers Paul Lanois and Kenneth Dort as they explore the latest trends, critical security issues, and compliance challenges facing organizations and consumers today. Speakers will also offer best practices in developing and implementing an effective data security strategy.

The Knowledge Group

$75

Add to Cart
Card image cap
-1
63 minutes
cc
Navigating the Complexities of State Privacy Laws: Effectively Staying Compliant
Privacy regulations are shifting frequently and GCs need to stay current with the emerging laws to avoid legal and financial ramifications. With various jurisdictions creating their own data privacy regulations and the complexities continuously growing, the landscape of data privacy will continue to evolve making it even more essential for in-house teams to be prepared and build a robust privacy program. Join this session as our privacy experts review existing privacy laws, and share their insights into navigating the upcoming risks and changes expected in the privacy space.

General Counsel Conference

$65

Add to Cart
Card image cap
57 minutes
cc
Effective Data Breach Prevention and Response: Practical Tips and Strategies
In this program, data privacy professionals Nick Holland (Shoosmiths LLP) and Blair Dawson (McDonald Hopkins LLC) will discuss significant updates and issues in data protection. The speakers will also share the best approaches to data breach prevention and response to mitigate cyber incidents.

The Knowledge Group

$75

Add to Cart
Card image cap
85 minutes
cc
A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks
Listen as experienced data security attorneys Kenneth Dort (Faegre Drinker Biddle & Reath LLP) and Melissa Krasnow (VLP Law Group LLP) provide a comprehensive discussion of the latest trends, developments, and critical issues surrounding data privacy and security agreements. They will, among other things, offer practical tips and strategies for drafting these provisions in light of recent developments and the current legal landscape.

The Knowledge Group

$115

Add to Cart
Card image cap
85 minutes
cc
What the DOJ’s New Cryptocurrency Task Force Means for Your Firm: Key Trends and Risk Mitigation Strategies
As digital assets and distributed ledger technologies continue to develop, cybercrimes involving cryptocurrencies also worsen. From email phishing to ransomware, hackers have shifted their attacks into more pervasive and malicious forms breaking even the most sophisticated security systems. Thus, the DOJ, together with the National Cryptocurrency Enforcement Team (NCET) headed by Eun Young Choi, further expands its efforts to scrutinize and regulate the cryptocurrency market. Join a panel of key thought leaders and distinguished professionals as they provide a comprehensive discussion of the recent trends and developments surrounding cryptocurrency enforcement. Speakers, among other things, will offer practical tips and strategies to avoid non-compliance.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
58 minutes
cc
ChatGPT: Resource or Liability? What Legal Leaders Need to Know
Generative AI has recently taken the legal world by storm and with its capabilities and sophistication advancing at a rapid pace, many are wondering how this powerful tool can be applied to the legal profession. While it promise to streamline workflows, automate repetitive tasks, develop new products, services and content, important legal considerations should be taken into account prior to using these tools. Join this session as our panel of experts explore how legal departments can utilize generative AI and ChatGPT, highlight the risks and develop strategies to implement such technology.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
57 minutes
cc
IP Rights Enforcement and Technology Implications: Key Considerations and Best Compliance Practices Explored
Join this program for an in-depth analysis of IP rights enforcement amidst the current technological revolution. Speakers will discuss the various challenges brought by these developments and will offer helpful tips to strengthen one’s protection and compliance strategies in this evolving legal climate.

The Knowledge Group

$75

Add to Cart
Card image cap
87 minutes
cc
The Zero Trust Approach: A Comprehensive Guide on Leveling Up Your Cybersecurity
Join this session as a panel of distinguished IT professionals provide a comprehensive discussion of the Zero Trust approach. Speakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
    s