Attention:
Card image cap

California (CA) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For California (CA) Cybersecurity

Card image cap
59 minutes
cc
LJN Webinar Series: Cybersecurity - Anatomy of a Supply Chain Cyberattack
Details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

Law Journal Newsletters

$75

Add to Cart
Card image cap
61 minutes
cc
Take Charge: Protecting Your Company Against Cyber Crime
Cybersecurity threats and data breaches remain at the forefront of in-house counsel minds. Especially in a world where many employees now work remotely, the risk of a data breach is no longer a matter of if, but a matter of when. This session will help GCs prepare for attacks, address what to do when there may be a threat, and reveal the best response to stay on the forefront of the issue.

General Counsel Conference

$65

Add to Cart
Card image cap
58 minutes
cc
Cybersecurity and Being Secure in Your Practice: How Confident Are You in Your Competency?
This panel will dive into the Model Rules of Professional Conduct, which require lawyers to be competent in technology. The panelists will review today’s hot ethical technology pointers, as well as pitfalls that every insolvency professional should be aware of in their practice.

American Bankruptcy Institute

$75

Add to Cart
Card image cap
55 minutes
cc
Hybrid Work and the Discovery of Collaborative, Social, and Mobile Content
2022 will continue to consist of employees located everywhere, and relying upon Microsoft Teams, Zoom, Slack, and mobile apps to get their jobs done. This is having profound effects on eDiscovery, most of which still depends on tools and review processes designed for email. How can firms prepare for the discovery onslaught of persistent chats, video recordings, whiteboards, and emojis?

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
Practical eDiscovery Insights from Norton Rose Fulbright's High Impact Cyber Incident Response
Norton Rose Fulbright’s David Kessler, Anna Rudawski and Sam Sessler work together guiding clients through the investigation, containment, and remediation of some of the world’s most high-profile cybersecurity incident response matters. Join us as they discuss legal considerations and data and reporting challenges, while also sharing practical strategies, tools and workflows for practicing effectively in this complex area.

Legalweek

$65

Add to Cart
Card image cap
60 minutes
cc
Managing Human Risk with M365 Tools & Business Partners
So you implemented Microsoft 365, but have questions around how to leverage the tools to better identify risky behavior in your organization and how to work with your counterparts in IT, Info Sec, Privacy and Legal to realize these benefits.

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
The Journey Starts Here: Building Your Client-Centric Legaltech Roadmap
Corporate legal teams with escalating workloads and competing business demands are increasingly looking to technology to help solve their problems. From document and e-billing to digital contracting, legaltech can help teams become more strategic and productive -- doing more with less and improving their efficiency and effectiveness across the company.

Legalweek

$65

Add to Cart
Card image cap
61 minutes
cc
We Have a Privacy Policy in Place, Are We Compliant?
Privacy Policies and Privacy Programs are unique to each organization. Understanding your data privacy risk and where your data is located should be the starting point to creating a Privacy Policy and Privacy Program. Learn about your data privacy risk by using various assessments and techniques, including data mapping and data privacy assessments.

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
Responding to a Cyber Crisis: How to Rebuild After a Cyber Attack
Given the prevalence of data breaches in recent months, it is not too far-fetched to assume that any business is/will be a target. When the breach occurs, we will look at what businesses should do to respond in the most efficient manner possible and mitigate the consequences.

General Counsel Conference

$65

Add to Cart
    s