Attention:
Card image cap

California (CA) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For California (CA) Cybersecurity

Card image cap
-1
60 minutes
cc
The Nexus between Discovery, Security and Privacy
The connection between Discovery, Security and Privacy is evolving, as new regulations materialize and the threat landscape expands. Join this session to hear from legal professionals on how Privacy and Security is front and center, to support and manage eDiscovery at Microsoft as well as other organizations.

Legalweek

$65

Add to Cart
Card image cap
-1
61 minutes
cc
Demystifying Cyber Insurance
Join this session as our cyber insurance experts consider the current status of cyber insurance, delve into the process and the due diligence required before adopting a policy, and offer insights into the challenges you can face with your policy downstream.

Legalweek

$65

Add to Cart
Card image cap
-1
58 minutes
cc
Surviving the App-ocolypse - eDiscovery in an Age of Atypical Data
Data has never been more intimidating: Slack attacks, Zoom booms, short format and continual messaging, and more apps that you can count. A tsunami of new and emerging data sources – ones that don’t work when handled as a traditional document – is crashing down on us. Learn how our panelists not just survive but thrive working with data like Slack, Teams, Zoom, WhatsApp, social media, and more.

Legalweek

$65

Add to Cart
Card image cap
-1
60 minutes
cc
AI and the Law: A Wild, Wild Ride Begins...
If you thought the rise of the Internet and services like Napster pushed the boundaries of the law, you ain’t seen nothing yet until you’ve seen artificial intelligence (“AI”). Experienced intellectual property lawyer Peter Afrasiabi provides an overview of AI.

New Media Legal

$75

Add to Cart
Card image cap
60 minutes
cc
Snap Out of It! Overcoming the Data Theft Blues & Finding Industry Leading Practices to Help Reduce the Impact
As organizations generate and store increasing volumes of personal and sensitive data they are becoming an ever greater target for cybercriminals wanting to extort data for financial gain. The risk of getting it wrong has never been so high. Listen to our panel of experts discuss the threat & regulatory landscape, considerations in breach response, and the opportunity to go from head-ache to head-start.

Legalweek

$65

Add to Cart
Card image cap
-1
59 minutes
cc
Data Breach Double Play: Lessons from Data Breach War Stories and Responding to Healthcare Data Breaches
In this program, you'll learn the lessons of some data breach cases that can help you protect your company when facing a data breach. This program also provides timely, actionable advice that includes the 5 things you can start doing today to help prevent data breaches and better prepare your company to respond to them if they do occur, focusing on the healthcare space where data breaches can include disclosure of personal health information regulated by state and federal laws including the Health Insurance Portability and Accountability Act (HIPAA).

New Media Legal

$75

Add to Cart
Card image cap
60 minutes
cc
Siri and Alexa Are Out to Get You
Stuart Teicher, Esq., doesn’t call them “virtual assistants”,  he calls them “virtual career killers.” That’s because the use of these devices are fraught with serious ethics issues. Join the CLE Performer Stuart Teicher, Esq., as he explores the never-ending problems with virtual assistants and related technologies. Rule 1.1 and Rule 1.6 discussed.

Stuart Teicher

$75

Add to Cart
Card image cap
60 minutes
cc
The Danger of Digital Signatures (and Other Issues in Tech)
E-signatures have become a part of the practice, but there are ethical concerns with that. Join the CLE Performer Stuart Teicher, Esq., as he talks about digital signatures and a few other new ethics issues with technology.

Stuart Teicher

$75

Add to Cart
Card image cap
59 minutes
cc
LJN Webinar Series: Cybersecurity - Anatomy of a Supply Chain Cyberattack
Details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

Law Journal Newsletters

$75

Add to Cart
    s