Print Catalog:

Programs in Cybersecurity



Filter by State
Filter by Category
 
 

Get Your Privacy House in Order

Program Number: 2997 Presenter: Shea Leitch, Esq.

With new privacy legislation proposed in various states around the country, organizations are struggling to keep up. In this rapidly-shifting legal landscape, getting your privacy house in order is more important than ever. Shea Leitch from Baker Hostetler provides insight on what organizations can do to ensure they are best positioned to meet new legal challenges while continuing to innovate.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Biometrics and the New Wave of Class Action Lawsuits

Program Number: 2984 Presenter: Harrison Brown, Esq., Jeffrey N. Rosenthal, Esq.

Whether it is an employee’s fingerprint used to clock in and out of work, or using your face to unlock a phone, the use of biometric information is becoming increasingly commonplace. Such biometric information provides convenience in a complicated world. But, at the same time, creates legal risk for businesses in all industries. This webinar will explore what biometric information is and how it is used; the jurisdictions which regulate biometric information; the requirements imposed on businesses; trends in lawsuits over the use of biometric information; and compliance strategies intended to reduce exposure.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and overall firm reputation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Cutting Edge Topics in Cyberinsurance Coverage (June 19, 2019)

Program Number: 29119 Presenter: Austin Morris, Jr., Jordan M. Rand, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** This course will first provide an overview of the cyberinsurance market and the coverages provided in most policies. It will then take a deeper dive into some of the most novel and important coverage issues facing carriers and policyholders alike, while also providing up-to-date data on the nature of cyber threats and the financial consequences of cyber attacks. Course attendees will gain an understanding of the key components of a cyberinsurance policy, and will also learn what issues require special attention when buying, renewing or litigating in this context.

$95.00Audio CD Add to Cart

Digital Asset Regulation: What the SEC Is Doing and Why It Matters (June 18, 2019)

Program Number: 29114 Presenter: Richard Kelley, Esq., Benjamin Klein, Esq., Deborah Meshulam, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** Since the U.S. Securities and Exchange Commission (SEC) issued its groundbreaking “DAO Report” in June 2017, pulled the plug on the Munchee Inc. ICO in December 2017, initiated its “Crypto Industry Sweep” in early 2018, and subsequently commenced numerous enforcement actions, market participants have been waiting for clear guidance from the regulator on what types of digital assets are subject to SEC regulation. In April 2019, the SEC staff at last responded with its “Framework for ‘Investment Contract’ Analysis of Digital Assets,” a 13-page memorandum that describes the factors used by SEC staff for assessing whether digital assets are "investment contracts" subject to federal securities laws. Simultaneously, the SEC staff issued its first crypto-related

$95.00Audio CD Add to Cart

Planning an Effective Response to a Cyber Incident (June 25, 2019))

Program Number: 29108 Presenter: Carole Buckner, Esq., Christopher Todd Doss

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** A competent and effective response to a cyber incident requires advance consideration of many issues. In this program, Carole Buckner, Partner at the Procopio law firm in San Diego and a member of the firm’s Privacy and Cybersecurity Practice Group, and Christopher “Todd” Doss, Managing Director at Ankura in Washington DC, will assist attendees in developing an incident response plan in advance of a data breach. The speakers will discuss who should be on the incident response team, including internal and external members, and strategies for training for an effective response. The panel will also discuss the roles of legal counsel (in-house and outside counsel) in the development of a

$95.00Audio CD Add to Cart

One Ring to Rule Them All: The Changing US Legal Landscape in Cybersecurity and Data Privacy (August 5, 2019)

Program Number: 29101 Presenter: Rebecca L. Rakoski, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** The European Union’s General Data Protection Regulation (“GDPR”) took effect on May 25, 2018, the California Consumer Privacy Act (CCPA) will take effect on January 1, 2020, and with 42 of the 50 different data breach reporting laws substantially changed in 2018, the US legal landscape is drastically changing. What does this mean for businesses? Uncertainty and high costs of compliance. The current regulatory framework benefits the criminals and penalizes the corporations. This presentation will discuss the impact these ever-changing regulations have on the collection, processing, and storage of data. The discussion will include a comparison of the requirements for security and privacy domestically, and the implications of the recent Pennsylvania Supreme Court decision in Dittman v.

$95.00Audio CD Add to Cart

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she discusses eight steps your company can take to see if it is defending its customer data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories