This program discusses the constantly evolving threat of ransomware and the legal implications associated with such cyber attacks. We will explore the various types of ransomware attacks, threat actor tactics, and the potential resulting legal obligations often faced by impacted companies based upon our significant experience responding to data security incidents. This program also discusses the current regulatory environment related to data breaches and provides some important considerations for complying with all of the various potentially applicable state and federal laws.
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
This ethics program examines common, but often avoidable, professional responsibility mistakes that ...
This companion program to Part 1 goes deeper into the rhetorical power of Shakespeare, emphasizing h...
Part I introduces the foundational principles of cross?examination, explaining how lawyers must meth...
Part 2 - This program will continue the discussion from Part 1 focusing specifically on cross?examin...
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
Tailored for attorneys, this training demystifies EBITDA and contrasts it with GAAP- and IFRS-based ...
This presentation explores courtroom staging—how movement, spatial awareness, posture, and pre...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...