Celesq® Attorneys Ed Center
Print Catalog:

Programs in Cybersecurity

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.

PROGRAMS ARE NOT AVAILABLE UNTIL AFTER THE PROGRAM DATE – IF THE ONLINE PURCHASE BUTTON IS NOT SHOWING – THE PROGRAM IS NOT YET AVAILABLE FOR LISTENING. PLEASE DO NOT ADD AUDIO TAPE TO YOUR CART AS THE PROGRAM IS NOT YET AVAILABLE. ONLY ADD TO YOUR CART IF YOU SEE ‘ONLINE AUDIO’ - THANK YOU SO MUCH!

Filter by State
Filter by Category
 
 

Cyber Considerations in the Time of Covid-19 (03/27/2020)

Program Number: 3097 Presenter: Scot Lippenholz, Jena M. Valdetero, Esq

Please join data security legal counsel and a leading forensic investigator for an empowering discussion of cyber considerations for companies in light of Covid-19. Attendees will hear about recent Covid-19 cyber threats and how to address them, how in-house counsel can prepare for a data breach in a remote work environment, and how incident response teams can address the myriad legal issues arising from a data breach.

$95.00Online Audio Add to Cart

Digital Risks and Digital Duties: Finding a Standard of Care in Cyberspace - Part 1 (05/28/2020)

Program Number: 3090 Presenter: Michael A. Goode, Esq., James M. Paulino II, Esq.

In this two-part presentation, we will begin by discussing the patchwork of data privacy statutes, regulations and case law in an effort to define the baseline for reasonable security measures, and then apply these standards to recent breach events in the medical, construction, agricultural, retail, manufacturing, financial and legal industries to highlight common security failures, and opportunities for improvement. At the conclusion of the presentation, we will discuss best practices to consider to assist in reducing the risk of data breach incidences as well as the potential exposure in the event an incident occurs.

$95.00Online Audio Add to Cart

Demystifying Blockchain and Cryptocurrencies (05/07/2020)

Program Number: 3078 Presenter: David Kalat

In conventional usage, the term “hacking” generally refers to an unauthorized user gaining access to an electronic resource. Hackers use various means to steal, guess, calculate, or otherwise obtain credentials to access systems and data they are not allowed to access. When we talk about “hacking” a blockchain, however, this does not adequately or accurately describe what has happened and blinds us to understanding where the real risks lie in this new technology of distributed ledgers and crypto-assets. The high-profile, most destructive, and expensive “hacks” in blockchain environments actually represent *authorized* users misbehaving. In some cases, these are authorized users acting on their own behalf to exploit weaknesses in the system to their own gain at the expense of other users, in other cases these are authorized users who are misusing the trust placed in them by their customers. The key to protecting yourself against fraud in this new alien

$95.00Online Audio Add to Cart

An Overview of NY SHIELD and What You Need to Do to Comply (03/19/2020)

Program Number: 3063 Presenter: Bradford P. Meisel, Esq., Diane D. Reynolds, Esq.

This program will provide an overview of the recently enacted New York SHIELD Act, which applies to any entity that possesses the personally identifiable information of a New York resident and requires such entities to implement reasonable administrative safeguards to protect such information from data breaches and cyberattacks. The program will explain the new statute’s specific requirements including those concerning risk identification, assessment of existing controls, and vendor agreements governing personally identifiable information. The program will also address how attorneys can best advise clients seeking to establish compliant information security safeguards and assist clients in proactively preventing cybersecurity incidents that could create exposure under the New York SHIELD Act and other state, federal, and international laws.

$95.00Online Audio Add to Cart

Legal Elements of Cybersecurity (02/13/2020)

Program Number: 3040 Presenter: John Lande, Esq.

Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity legal issues through the lens of real case studies, and specifically cover: (1) current threats, (2) liability issues, (3) insurance coverage, and (4) mitigating legal cybersecurity risk.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Understanding Your Obligations Under the Model Rules of Professional Conduct (01/07/2020)

Program Number: 3039 Presenter: Daniel A. Cotter, Esq.

The Model Rules of Professional Conduct changed in the last few years to take a more proactive approach to privacy obligations for lawyers, especially when it comes to the use of technology and client representation. All states have adopted changes to Rule 1.1 and more than half the jurisdictions have adopted Comment 8 to Rule 1.1, which addresses an ethical duty of technology competence. Rule 1.6(e) also changed and comments in many jurisdictions were added to address confidentiality concerns. Recently, the American Bar Association issued Opinion 477, dealing with Rules 1.1 and 1.6(e) and confidentiality of email communications with clients. In addition to the ABA and other rule changes for lawyers, organizations such as the Association of Corporate Counsel have issued guidelines for clients to consider when dealing with law firms. Please join Daniel Cotter as he provides an overview of the relevant rules of professional conduct and the changes that have recently been implemented

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Botnet Extortion and Disparagement and Section 230: Do Businesses Have Any Recourse? (01/28/2020)

Program Number: 3037 Presenter: Bradford P. Meisel, Esq., Diane D. Reynolds, Esq.

Cybercriminals have presented targeted businesses with a frightening choice: pay up or have Botnets post thousands of negative reviews in a matter of minutes. Botnets, which are groups of computers controlled by a single person, have also famously flooded social media platforms with disparaging posts about politicians and political parties in the days before recent elections in the United States and other industrialized countries. Businesses, politicians, and other victims of Botnet-mediated disparagement seeking damages face a daunting obstacle in the form of Section 230, the controversial federal statute that immunizes computer service providers from liability for content provided by another person or entity. This program will examine the legal arguments regarding whether or not Botnet-mediated disparagement is subject to Section 230-a question which courts have yet to address. This program will also examine the intensifying debate in Congress regarding both the Botnet epidemic and Section 230 and how it could impact litigation

$95.00Online Audio Add to Cart

March 2020: How to Be Ready for New York’s New Data Protection Law (the SHIELD Act) (01/16/2020)

Program Number: 3032 Presenter: Nawa Lodin, Esq., Caroline A. Morgan, Esq.

On October 23, 2019, the Stop Hacks and Improve Electronic Data Security Act (the SHIELD Act) went into effect. The New York law imposes data breach notification requirements on any business that owns or licenses certain private information of New York residents, regardless of whether it conducts business in New York. In March 2020, the second part of the Act goes into effect, requiring businesses to develop, implement and maintain a data security program to protect private information. Through this course, attorneys can gain an understanding of the SHIELD Act with an emphasis on key actions businesses should take to comply, the penalties for not doing so, and cybersecurity best practices to mitigate loss.

$95.00Online Audio Add to Cart

Legal Ethics and Cyber Security 2020 (01/10/2020)

Program Number: 3031 Presenter: Carole Buckner, Esq.

Lawyers and law firms are at risk of data security breaches and must have reasonable measures in place to address cyber security. This presentation will discuss some of the practical risks associated with data security and the ethical obligations of lawyers in dealing with cybersecurity issues. A lawyer’s primary ethical duties involve the duty of competency, which requires a reasonable understanding of issues involving technology and data security, and the duty of confidentiality, which requires that lawyers take reasonable steps to protect their communications with clients and their clients’ electronic data, and the duty to disclose significant developments related to the representation, including possible security breaches. We will discuss ethics opinions concerning reasonable measures and preparation for cyber incidents, as well as several common scenarios including ransomware, phishing, lost laptops, missing smartphones, and cybersecurity when working remotely. In addition, we will discuss the availability of cyber insurance. In addition,

$95.00Online Audio Add to Cart

Ethically Developing A Law Firm Security Game Plan (12/17/2020)

Program Number: 30291 Presenter: Kenneth Jones, Dan Schatz, Esq.

Increasingly, law firms face the challenge of developing a comprehensive game plan to defend against the myriad of cyber threats ever-present in today’s world. Attorneys themselves, pursuant to ABA Model Rule 1.1, are called upon to act reasonably and promptly to stop data breaches and mitigate damage resulting from the breach. Similarly, Model Rule 1.6 calls for lawyers to make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. To help mitigate risk, this program will discuss areas such as end user security training, the importance of executing backup drills, key elements of a proper law firm defensive infrastructure, advice for remote working scenarios and other topics.

$95.00Audio Tape Add to Cart

Categories