Celesq® Attorneys Ed Center
Print Catalog:

Programs in Corporate and Securities Law

** URGENT UPDATE **

Our checkout cart is not currently working properly. In an effort to continue addressing your CLE needs, we would like to offer you a manual solution. Please go through our programs list. If you see a program that you would like to take to help satisfy your CLE needs, and it is past the program date (future dates are not yet available, of course), please send us the name of the program and the program number associated with it.

We will send you: 1) the audio file 2) the pdf of the presentation materials and 3) a manual affirmation form that you can fill out affirming that you listened to the entire program.

Once we receive the affirmations from you, we will issue manual certificates that you will be able to use to certify your CLE requirements.

Thank you so much and we apologize for the extreme inconvenience.

Please email customer.care@celesq.com with the above mentioned requests and we will get back to you as soon as possible!

Filter by State
Filter by Category
 
 

Social Media and the Lifecycle of the Attorney/Client Relationship (03/08/2021)

Program Number: 3145 Presenter: Dr. Sharon Meit Abrahams, Jan L. Jacobowitz, Esq., Lucian T. Pera, Esq.

Social media has become an integral part of our society. The Pew Research Center reports that approximately 70% of the adult population uses social media, and it even impacts the lives of those who elect not to engage. Lawyers’ clients are awash in social media, so it is no surprise that every stage of the life cycle of an attorney-client relationship may involve a lawyer’s need not only to explore the social media terrain, but also to understand both the benefits and dangerous landmines that await the uninformed. Join our discussion with two seasoned legal ethics lawyers to explore both the necessity of employing social media and the potential ethical perils of lawyers on social media. Topics include the use of social media in advertising; investigating all aspects of a case from a potential client’s claim to discovering information about the opposing parties, witnesses, jurors, and judges; and finally,

$95.00Audio CD Add to Cart

One Step Ahead of the Bad Guys: Preventing and Responding to Ransomware Attack (02/12/2021)

Program Number: 3139 Presenter: Tony Kirtley, Jena M. Valdetero, Esq

It seems you can’t read the news without seeing a story about another company who fell victim to a ransomware attack. This CLE will cover the legal landscape of preventing a ransomware, including regulatory requirements concerning minimum cybersecurity measures, and responding to a ransomware attack, including how to comply with the patchwork of laws governing data breaches and recent U.S. Treasury warnings on paying a threat actor. You’ll also hear from a forensic investigation specialist for inside tips on preventing and responding to ransomware attacks from a technical perspective.

$95.00Audio Tape Add to Cart

Lessons in Disaster: Learning from Law Firm Cyber Breaches (02/23/2021)

Program Number: 3134 Presenter: Mark Sangster

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

$95.00Audio Tape Add to Cart

Targeting Law Firms: Inside the Cyber Criminal Economy (01/22/2021)

Program Number: 3133 Presenter: Mark Sangster

Law firms are a proven target for everything from smash-and-grab, fraudulent wire transfers, to sophisticated and elaborate schemes designed to garner a huge criminal payday after crippling your firm. Unfortunately, most firms don’t take the threat seriously or see their adversary as opportunistic amateurs. The reality is, a robust cybercriminal economy exists to bring together experts in phishing lures, intrusion and exfiltration of data, malware deployment and detonation, the fencing of stolen data and laundering of ransoms. Mark Sangster cybersecurity expert and author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business” as he exposes the economic operations and technical apparatus behind real world cyberattacks, and provides a lightweight framework that law firms can protect their business and clients.

$95.00Audio Tape Add to Cart

The SEC’s Whistleblower Program in 2021 and Beyond (02/24/2021)

Program Number: 3129 Presenter: Jay A. Dubow, Esq., Robert L. Hickok, Esq., Kaitlin L. Meola, Esq.

The Securities and Exchange Commission’s Whistleblower Program was created in 2010 to assist the SEC in discovering securities law violations by providing incentives for individuals to report possible violations. The Program has been successful; to date, the SEC has received tens of thousands of whistleblower tips, resulting in more than $2 billion in monetary sanctions, and has awarded more than $700 million to whistleblowers whose tips resulted in enforcement actions. On September 23, 2020, the SEC voted to amend the Program’s rules in order “to provide greater clarity to whistleblowers and increase the program’s efficiency and transparency.” The amendments—effective December 7, 2020—include changes to the way the SEC determines awards, changes that streamline the process for submitting and evaluating tips, and clarifies various definitions. The changes may incentivize whistleblowers to report possible securities law violations, and companies should ensure that their internal whistleblower policies are current and provide adequate internal processes for

$95.00Audio Tape Add to Cart

What is “Authorized Access” and How Do Employers Deal with Misuse of Access Credentials Post-VanBuren vs United States (02/03/2021)

Program Number: 3122 Presenter: Michelle A. Schaap, Esq.

As this summary is being written on December 1, 2020, the United States Supreme Court is considering the fate of the Computer Fraud and Abuse Act (“CFAA”) in Van Buren v. United States. CFAA had been used by employers in certain circuit courts successfully to hold employees accountable for misuse and/or misappropriation of employers’ data to which the employees were otherwise authorized to access in the course of their employment. At the time this program is presented, we expect the Court will have rendered its ruling in Van Buren. Regardless of the fate of the CFAA, employers can and should employ other means, statutorily, contractually, and technologically, to protect their trade secrets and other confidential and proprietary information from misuse, exfiltration and alteration. Moreover, for employers who are attorneys, they are ethically required to not only keep client information confidential, but to stay abreast technology that may facilitate the protection of

$95.00Audio Tape Add to Cart

The Trouble with TikTok & Other Cautionary Foreign Investment Tales: Navigating the New CFIUS Landscape (02/19/2021)

Program Number: 3117 Presenter: David Hall, Esq., Tahlia Townsend, Esq.

As headline grabbing actions around TikTok, StaynTouch, Grindr, and PatientsLikeMe demonstrate, the risks associated with foreign investment in the U.S. have substantially increased. New regulations significantly tightened the rules governing overseas investment into U.S. businesses in 2020, dramatically expanding the circumstances in which pre-investment notification to the Committee on Foreign Investment in the United States (CFIUS) is either mandatory or recommended. This session will cover when foreign investments in the U.S. may trigger mandatory pre-transaction notification requirements, and when voluntary notification may be advisable; the impact of the recent increased focus on security of sensitive personal data; why understanding U.S. export controls is now essential to the CFIUS analysis; the key steps and timelines for making a CFIUS filing; the consequences of not making a filing when required or recommended; and key recommendations for investment due diligence and planning.

$95.00Audio Tape Add to Cart

Challenging the SEC in Federal Court: Recent Developments in Case Law and Practice Notes (01/14/2021)

Program Number: 3103 Presenter: Jay A. Dubow, Esq., Mary Grace W. Metcalfe, Esq., Ghillaine A. Reid, Esq.

Challenging an ongoing investigation by the SEC is a daunting task, particularly for those identified as subjects of the investigation. Two recent holdings, one by the Third Circuit in Gentile v. Sec. & Exch. Comm’n, 2020 WL 5416297 (3d Cir. Sept. 10, 2020) and the other by the United States District Court for the District of New Jersey in Sec. & Exch. Comm’n v. Gentile, 16-cv-01619-BRM-JAD (Order Sept. 29, 2020), both of which involved the same parties, offer some clarification on when and how best to mount such a challenge. The Third Circuit’s opinion makes clear that the SEC’s ability to investigate is one of the “rare circumstances” in which an agency’s action is exempt from the waiver of sovereign immunity that might otherwise apply under the Administrative Procedure Act and, as a result, is not subject to judicial review. By contrast, the district court’s opinion reinforces that, once an investigation

$95.00Audio Tape Add to Cart

Evaluating a Vendor's Privacy Practices: The Rise of the Vendor Privacy Assessment Questionnaire (01/13/2021)

Program Number: 3102 Presenter: Karin E. Ross, Esq., David A. Zetoony, Esq.

Many companies have institutionalized the practice of conducting due diligence on their vendors’ security practices. A familiar component of the diligence process is to have a vendor complete a security assessment questionnaire or SAQ . Historically, vendor privacy due diligence has been a less common phenomena. New cases, statutes, rules, and regulations are changing that. The program will discuss the growing need and upward trend for conducting privacy due diligence in light of the European court of justice decision in Schrems II, the CCPA, and the CPRA. It will also provide in-house counsel with practical insights into what to include in a privacy assessment questionnaire, and how to institutionalize the practice of conducting them

$95.00Audio Tape Add to Cart

Cyber Considerations in the Time of Covid-19 (03/27/2020)

Program Number: 3097 Presenter: Scot Lippenholz, Jena M. Valdetero, Esq

Please join data security legal counsel and a leading forensic investigator for an empowering discussion of cyber considerations for companies in light of Covid-19. Attendees will hear about recent Covid-19 cyber threats and how to address them, how in-house counsel can prepare for a data breach in a remote work environment, and how incident response teams can address the myriad legal issues arising from a data breach.

$95.00Online Audio Add to Cart

Categories