Warning: session_start() [function.session-start]: Cannot send session cookie - headers already sent by (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19

Warning: session_start() [function.session-start]: Cannot send session cache limiter - headers already sent (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19
Celesq® Attorneys Ed Center
Print Catalog:

Programs in Cybersecurity

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.



Filter by State
Filter by Category
 
 

Get Your Privacy House in Order

Program Number: 2997 Presenter: Shea Leitch, Esq.

With new privacy legislation proposed in various states around the country, organizations are struggling to keep up. In this rapidly-shifting legal landscape, getting your privacy house in order is more important than ever. Shea Leitch from Baker Hostetler provides insight on what organizations can do to ensure they are best positioned to meet new legal challenges while continuing to innovate.

$95.00Online Audio Add to Cart

Biometrics and the New Wave of Class Action Lawsuits

Program Number: 2984 Presenter: Harrison Brown, Esq., Jeffrey N. Rosenthal, Esq.

Whether it is an employee’s fingerprint used to clock in and out of work, or using your face to unlock a phone, the use of biometric information is becoming increasingly commonplace. Such biometric information provides convenience in a complicated world. But, at the same time, creates legal risk for businesses in all industries. This webinar will explore what biometric information is and how it is used; the jurisdictions which regulate biometric information; the requirements imposed on businesses; trends in lawsuits over the use of biometric information; and compliance strategies intended to reduce exposure.

$95.00Online Audio Add to Cart

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Online Audio Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and overall firm reputation.

$95.00Online Audio Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Cutting Edge Topics in Cyberinsurance Coverage

Program Number: 29119 Presenter: Austin Morris, Jr., Jordan M. Rand, Esq.

This course will first provide an overview of the cyberinsurance market and the coverages provided in most policies. It will then take a deeper dive into some of the most novel and important coverage issues facing carriers and policyholders alike, while also providing up-to-date data on the nature of cyber threats and the financial consequences of cyber attacks. Course attendees will gain an understanding of the key components of a cyberinsurance policy, and will also learn what issues require special attention when buying, renewing or litigating in this context.

$95.00Online Audio Add to Cart

Digital Asset Regulation: What the SEC Is Doing and Why It Matters

Program Number: 29114 Presenter: Richard Kelley, Esq., Benjamin Klein, Esq., Deborah Meshulam, Esq.

Since the U.S. Securities and Exchange Commission (SEC) issued its groundbreaking “DAO Report” in June 2017, pulled the plug on the Munchee Inc. ICO in December 2017, initiated its “Crypto Industry Sweep” in early 2018, and subsequently commenced numerous enforcement actions, market participants have been waiting for clear guidance from the regulator on what types of digital assets are subject to SEC regulation. In April 2019, the SEC staff at last responded with its “Framework for ‘Investment Contract’ Analysis of Digital Assets,” a 13-page memorandum that describes the factors used by SEC staff for assessing whether digital assets are "investment contracts" subject to federal securities laws. Simultaneously, the SEC staff issued its first crypto-related no-action letter. Join us for a discussion of this new guidance, the no-action letter, and their implications for digital assets.

$95.00Online Audio Add to Cart

Planning an Effective Response to a Cyber Incident

Program Number: 29108 Presenter: Carole Buckner, Esq., Christopher Todd Doss

A competent and effective response to a cyber incident requires advance consideration of many issues. In this program, Carole Buckner, Partner at the Procopio law firm in San Diego and a member of the firm’s Privacy and Cybersecurity Practice Group, and Christopher “Todd” Doss, Managing Director at Ankura in Washington DC, will assist attendees in developing an incident response plan in advance of a data breach. The speakers will discuss who should be on the incident response team, including internal and external members, and strategies for training for an effective response. The panel will also discuss the roles of legal counsel (in-house and outside counsel) in the development of a response strategy and preservation of attorney client privilege. Insurance considerations in a data breach incident will be addressed. Partnering with an external forensic consultant is a cornerstone of a strong incident response plan, both to address the breach and

$95.00Online Audio Add to Cart

Categories