Attention:
Card image cap

Alaska (AK) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Alaska (AK) Cybersecurity

Card image cap
57 minutes
cc
Effective Data Breach Prevention and Response: Practical Tips and Strategies
In this program, data privacy professionals Nick Holland (Shoosmiths LLP) and Blair Dawson (McDonald Hopkins LLC) will discuss significant updates and issues in data protection. The speakers will also share the best approaches to data breach prevention and response to mitigate cyber incidents.

The Knowledge Group

$75

Add to Cart
Card image cap
85 minutes
cc
A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks
Listen as experienced data security attorneys Kenneth Dort (Faegre Drinker Biddle & Reath LLP) and Melissa Krasnow (VLP Law Group LLP) provide a comprehensive discussion of the latest trends, developments, and critical issues surrounding data privacy and security agreements. They will, among other things, offer practical tips and strategies for drafting these provisions in light of recent developments and the current legal landscape.

The Knowledge Group

$115

Add to Cart
Card image cap
85 minutes
cc
What the DOJ’s New Cryptocurrency Task Force Means for Your Firm: Key Trends and Risk Mitigation Strategies
As digital assets and distributed ledger technologies continue to develop, cybercrimes involving cryptocurrencies also worsen. From email phishing to ransomware, hackers have shifted their attacks into more pervasive and malicious forms breaking even the most sophisticated security systems. Thus, the DOJ, together with the National Cryptocurrency Enforcement Team (NCET) headed by Eun Young Choi, further expands its efforts to scrutinize and regulate the cryptocurrency market. Join a panel of key thought leaders and distinguished professionals as they provide a comprehensive discussion of the recent trends and developments surrounding cryptocurrency enforcement. Speakers, among other things, will offer practical tips and strategies to avoid non-compliance.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
58 minutes
cc
ChatGPT: Resource or Liability? What Legal Leaders Need to Know
Generative AI has recently taken the legal world by storm and with its capabilities and sophistication advancing at a rapid pace, many are wondering how this powerful tool can be applied to the legal profession. While it promise to streamline workflows, automate repetitive tasks, develop new products, services and content, important legal considerations should be taken into account prior to using these tools. Join this session as our panel of experts explore how legal departments can utilize generative AI and ChatGPT, highlight the risks and develop strategies to implement such technology.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
57 minutes
cc
IP Rights Enforcement and Technology Implications: Key Considerations and Best Compliance Practices Explored
Join this program for an in-depth analysis of IP rights enforcement amidst the current technological revolution. Speakers will discuss the various challenges brought by these developments and will offer helpful tips to strengthen one’s protection and compliance strategies in this evolving legal climate.

The Knowledge Group

$75

Add to Cart
Card image cap
87 minutes
cc
The Zero Trust Approach: A Comprehensive Guide on Leveling Up Your Cybersecurity
Join this session as a panel of distinguished IT professionals provide a comprehensive discussion of the Zero Trust approach. Speakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
Staying Ahead of the Curve: Handling the Evolving Landscape of SEC Cyber Regulations and Compliance
As the digital landscape evolves, it is essential for organizations to stay ahead of the curve and effectively address cyber risks to protect sensitive information and maintain regulatory compliance. The SEC has taken a similar approach of trying to protect sensitive information with their broad suite of new cybersecurity rules, including policies and procedures to address cybersecurity risk, written incident response programs, and much more. Our panelists will share insights into the evolving expectations of the SEC, discuss compliance processes that should be implemented and identify best practices to improve incident response and reporting.

General Counsel Conference

$65

Add to Cart
Card image cap
59 minutes
cc
We've Been Hacked! Combating Cyber Attacks & Emerging Threats
The insurance industry continues to experience large growth in digital fraud attempts, but all industries are at risk as ransomware and social engineering claims continue to rise. This panel will warn against the new, sneaky ways you are being hacked, and emerging threats in cyberattacks, as well as offer expert advice on cybersecurity best practices and how to keep up with the changing fraud patterns.

Property Casualty 360

$65

Add to Cart
    s