Attention:
Card image cap

Missouri (MO) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Missouri (MO) Cybersecurity

Card image cap
-1
58 minutes
cc
ChatGPT: Resource or Liability? What Legal Leaders Need to Know
Generative AI has recently taken the legal world by storm and with its capabilities and sophistication advancing at a rapid pace, many are wondering how this powerful tool can be applied to the legal profession. While it promise to streamline workflows, automate repetitive tasks, develop new products, services and content, important legal considerations should be taken into account prior to using these tools. Join this session as our panel of experts explore how legal departments can utilize generative AI and ChatGPT, highlight the risks and develop strategies to implement such technology.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
57 minutes
cc
IP Rights Enforcement and Technology Implications: Key Considerations and Best Compliance Practices Explored
Join this program for an in-depth analysis of IP rights enforcement amidst the current technological revolution. Speakers will discuss the various challenges brought by these developments and will offer helpful tips to strengthen one’s protection and compliance strategies in this evolving legal climate.

The Knowledge Group

$75

Add to Cart
Card image cap
87 minutes
cc
The Zero Trust Approach: A Comprehensive Guide on Leveling Up Your Cybersecurity
Join this session as a panel of distinguished IT professionals provide a comprehensive discussion of the Zero Trust approach. Speakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
Staying Ahead of the Curve: Handling the Evolving Landscape of SEC Cyber Regulations and Compliance
As the digital landscape evolves, it is essential for organizations to stay ahead of the curve and effectively address cyber risks to protect sensitive information and maintain regulatory compliance. The SEC has taken a similar approach of trying to protect sensitive information with their broad suite of new cybersecurity rules, including policies and procedures to address cybersecurity risk, written incident response programs, and much more. Our panelists will share insights into the evolving expectations of the SEC, discuss compliance processes that should be implemented and identify best practices to improve incident response and reporting.

General Counsel Conference

$65

Add to Cart
Card image cap
59 minutes
cc
We've Been Hacked! Combating Cyber Attacks & Emerging Threats
The insurance industry continues to experience large growth in digital fraud attempts, but all industries are at risk as ransomware and social engineering claims continue to rise. This panel will warn against the new, sneaky ways you are being hacked, and emerging threats in cyberattacks, as well as offer expert advice on cybersecurity best practices and how to keep up with the changing fraud patterns.

Property Casualty 360

$65

Add to Cart
Card image cap
-1
77 minutes
cc
LJN Webinar Series: The Crypto Landscape Post-FTX
This presentation will cover the current status and near future outlook for the blockchain sector (or "crypto" broadly) from a legal standpoint. Questions answered include: What went wrong? Is crypto dead and buried? What's in store next for the industry and regulatory landscape? What's the cybersecurity state of play in crypto?

Law Journal Newsletters

$95

Add to Cart
Card image cap
-1
66 minutes
cc
Stand Up CLE: Cybersecurity, Privacy, Data Protection - and Magic!
We all know that CLE programs are boring and a chore to watch. But we’re breaking the rules – a CLE program that’s intentionally funny and (gasp) entertaining, yet somehow still informative. In this unique installment of this popular series, Mark Wooster is joined by Magician, Anthropologist, Cybersecurity Expert and Keynote Speaker Paul Draper. Paul teaches you what you need to know about cybersecurity, privacy and data protection, all the while keeping you entertained with some awesome magic tricks. From the basic steps you and your firm need to take right now to prevent being hacked by someone who dabbles in hacking to more advanced measures you need to consider if you might become a target of a more sophisticated ransomware attack, Paul gives you the benefit of his decades of practical experience working and consulting in cybersecurity for Fortune 100 companies. Reserve your seat today and we’ll waive the two-drink minimum!

New Media Legal

$75

Add to Cart
Card image cap
-1
60 minutes
cc
The Nexus between Discovery, Security and Privacy
The connection between Discovery, Security and Privacy is evolving, as new regulations materialize and the threat landscape expands. Join this session to hear from legal professionals on how Privacy and Security is front and center, to support and manage eDiscovery at Microsoft as well as other organizations.

Legalweek

$65

Add to Cart
    s