This program discusses the constantly evolving threat of ransomware and the legal implications associated with such cyber attacks. We will explore the various types of ransomware attacks, threat actor tactics, and the potential resulting legal obligations often faced by impacted companies based upon our significant experience responding to data security incidents. This program also discusses the current regulatory environment related to data breaches and provides some important considerations for complying with all of the various potentially applicable state and federal laws.
This companion program to Part 1 goes deeper into the rhetorical power of Shakespeare, emphasizing h...
Part II builds on the foundation established in Part I by examining how classical rhetorical styles ...
This session highlights the legal and compliance implications of divergences between GAAP and IFRS. ...
Synthetic identity fraud creates a significant legal and compliance challenge for professionals by c...
A practical overview designed for attorneys new to financial reporting. The session connects GAAP co...
The False Claims Act continues to be the federal Government’s number one fraud fighting tool. ...
Tracking and using consumer’s data without consent is a high stakes game. From class actions t...
A litigator’s role is to shape how key decision-makers - judges, jurors, and opposing counsel ...
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...