Attention:
Card image cap

Alaska (AK) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Alaska (AK) Cybersecurity

Card image cap
60 minutes
cc
The Danger of Digital Signatures (and Other Issues in Tech)
E-signatures have become a part of the practice, but there are ethical concerns with that. Join the CLE Performer Stuart Teicher, Esq., as he talks about digital signatures and a few other new ethics issues with technology.

Stuart Teicher

$75

Add to Cart
Card image cap
61 minutes
cc
Take Charge: Protecting Your Company Against Cyber Crime
Cybersecurity threats and data breaches remain at the forefront of in-house counsel minds. Especially in a world where many employees now work remotely, the risk of a data breach is no longer a matter of if, but a matter of when. This session will help GCs prepare for attacks, address what to do when there may be a threat, and reveal the best response to stay on the forefront of the issue.

General Counsel Conference

$65

Add to Cart
Card image cap
58 minutes
cc
Cybersecurity and Being Secure in Your Practice: How Confident Are You in Your Competency?
This panel will dive into the Model Rules of Professional Conduct, which require lawyers to be competent in technology. The panelists will review today’s hot ethical technology pointers, as well as pitfalls that every insolvency professional should be aware of in their practice.

American Bankruptcy Institute

$75

Add to Cart
Card image cap
55 minutes
cc
Hybrid Work and the Discovery of Collaborative, Social, and Mobile Content
2022 will continue to consist of employees located everywhere, and relying upon Microsoft Teams, Zoom, Slack, and mobile apps to get their jobs done. This is having profound effects on eDiscovery, most of which still depends on tools and review processes designed for email. How can firms prepare for the discovery onslaught of persistent chats, video recordings, whiteboards, and emojis?

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
Practical eDiscovery Insights from Norton Rose Fulbright's High Impact Cyber Incident Response
Norton Rose Fulbright’s David Kessler, Anna Rudawski and Sam Sessler work together guiding clients through the investigation, containment, and remediation of some of the world’s most high-profile cybersecurity incident response matters. Join us as they discuss legal considerations and data and reporting challenges, while also sharing practical strategies, tools and workflows for practicing effectively in this complex area.

Legalweek

$65

Add to Cart
Card image cap
60 minutes
cc
Managing Human Risk with M365 Tools & Business Partners
So you implemented Microsoft 365, but have questions around how to leverage the tools to better identify risky behavior in your organization and how to work with your counterparts in IT, Info Sec, Privacy and Legal to realize these benefits.

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
The Journey Starts Here: Building Your Client-Centric Legaltech Roadmap
Corporate legal teams with escalating workloads and competing business demands are increasingly looking to technology to help solve their problems. From document and e-billing to digital contracting, legaltech can help teams become more strategic and productive -- doing more with less and improving their efficiency and effectiveness across the company.

Legalweek

$65

Add to Cart
Card image cap
61 minutes
cc
We Have a Privacy Policy in Place, Are We Compliant?
Privacy Policies and Privacy Programs are unique to each organization. Understanding your data privacy risk and where your data is located should be the starting point to creating a Privacy Policy and Privacy Program. Learn about your data privacy risk by using various assessments and techniques, including data mapping and data privacy assessments.

Legalweek

$65

Add to Cart
Card image cap
57 minutes
cc
Responding to a Cyber Crisis: How to Rebuild After a Cyber Attack
Given the prevalence of data breaches in recent months, it is not too far-fetched to assume that any business is/will be a target. When the breach occurs, we will look at what businesses should do to respond in the most efficient manner possible and mitigate the consequences.

General Counsel Conference

$65

Add to Cart
    s