Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
MODERATED- I’m ok. I can work this out for myself. I’m not like a “real” ...
MODERATED-Session 4 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...
Part 2 of 2 - Lawyers at all levels of experience and even sophisticated law firms and general couns...
MODERATED-Session 6 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...
Join Steve Herman on December 8, 2025, for "Maintaining Ethical Standards: Essential Strategies for ...
The always idiosyncratic Nassim Taleb likes to say, “Nothing is more permanent than ‘tem...
MODERATED-Session 9 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...
Food, sex, exercise – all may involve a variety of commonly enjoyed experiences that are healt...
Scam typologies help legal professionals by providing a framework to understand, identify, and preve...
Synthetic identity fraud creates a significant legal and compliance challenge for professionals by c...