This program discusses the constantly evolving threat of ransomware and the legal implications associated with such cyber attacks. We will explore the various types of ransomware attacks, threat actor tactics, and the potential resulting legal obligations often faced by impacted companies based upon our significant experience responding to data security incidents. This program also discusses the current regulatory environment related to data breaches and provides some important considerations for complying with all of the various potentially applicable state and federal laws.
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Part 2 - This program will continue the discussion from Part 1 focusing specifically on cross?examin...
Part 1 - This program focuses specifically on cross?examining expert witnesses, whose credentials an...
This companion program to Part 1 goes deeper into the rhetorical power of Shakespeare, emphasizing h...
In this course, Dr. Carlson will present a broad overview of what scientific research has discovered...
Law firms across the country are rethinking traditional staffing models to stay competitive, reduce ...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Part 2 dives deeper into advanced cross?examination techniques, teaching attorneys how to maintain c...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
This presentation explores courtroom staging—how movement, spatial awareness, posture, and pre...