Attention:
Card image cap

Georgia (GA) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Georgia (GA) Cybersecurity

Card image cap
59 minutes
cc
LJN Webinar Series: Cybersecurity - Anatomy of a Supply Chain Cyberattack
Details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

Law Journal Newsletters

$75

Add to Cart
Card image cap
61 minutes
cc
Take Charge: Protecting Your Company Against Cyber Crime
Cybersecurity threats and data breaches remain at the forefront of in-house counsel minds. Especially in a world where many employees now work remotely, the risk of a data breach is no longer a matter of if, but a matter of when. This session will help GCs prepare for attacks, address what to do when there may be a threat, and reveal the best response to stay on the forefront of the issue.

General Counsel Conference

$65

Add to Cart
Card image cap
58 minutes
cc
Cybersecurity and Being Secure in Your Practice: How Confident Are You in Your Competency?
This panel will dive into the Model Rules of Professional Conduct, which require lawyers to be competent in technology. The panelists will review today’s hot ethical technology pointers, as well as pitfalls that every insolvency professional should be aware of in their practice.

American Bankruptcy Institute

$75

Add to Cart
Card image cap
60 minutes
cc
Managing Human Risk with M365 Tools & Business Partners
So you implemented Microsoft 365, but have questions around how to leverage the tools to better identify risky behavior in your organization and how to work with your counterparts in IT, Info Sec, Privacy and Legal to realize these benefits.

Legalweek

$65

Add to Cart
Card image cap
61 minutes
cc
We Have a Privacy Policy in Place, Are We Compliant?
Privacy Policies and Privacy Programs are unique to each organization. Understanding your data privacy risk and where your data is located should be the starting point to creating a Privacy Policy and Privacy Program. Learn about your data privacy risk by using various assessments and techniques, including data mapping and data privacy assessments.

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
Responding to a Cyber Crisis: How to Rebuild After a Cyber Attack
Given the prevalence of data breaches in recent months, it is not too far-fetched to assume that any business is/will be a target. When the breach occurs, we will look at what businesses should do to respond in the most efficient manner possible and mitigate the consequences.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
62 minutes
cc
Handling the Next Generation of Cyber Threats & Tactics
By the end of 2021, the world will be significantly digitized and connected. So, how do you arm your company with the necessary security to survive a new wave of cyber attacks unlike any we have seen in the past? Panelists in this session will examine all aspects of cyber threats from detection, and mitigation strategies, to the importance of staff training and education.

Women, Influence & Power in Law Conference

$65

Add to Cart
    s