Attention:
Card image cap

Florida (FL) Privacy CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Florida (FL) Privacy

Card image cap
61 minutes
cc
Championing External Counsel Panels: Managing Cyber Risks & Leveraging AI
This session addresses the challenges and strategies related to building and managing legal panels, with a focus on addressing pain points, ensuring diversity and competence, managing cybersecurity risks, and promoting continuous panel management. The discussion will also cover important topics like cultural alignment, performance incentives, and ongoing monitoring of cybersecurity relationships.

Legalweek

$75

Add to Cart
Card image cap
-1
61 minutes
cc
Act Like a Lawyer, Think Like a Cyber Professional
Our expert panelists will cover topics such as legal and regulatory frameworks for cybersecurity, data protection laws, incident response planning, and risk management. Participants will leave with a better understanding of the legal and technical considerations involved in cybersecurity, enabling them to make informed decisions that protect their organizations from cyber threats.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
Generative AI & Data Privacy: Where Do the Risks Lie?
This session will pull back the curtain to the mysteries of Generative AI, with expert speakers answering some of the most complex questions regarding the impacts of AI on work and life. Panelists will also examine a possible new type of liability schema for regulators, and make predictions on the future of AI governance.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
The Nexus between Discovery, Security and Privacy
The connection between Discovery, Security and Privacy is evolving, as new regulations materialize and the threat landscape expands. Join this session to hear from legal professionals on how Privacy and Security is front and center, to support and manage eDiscovery at Microsoft as well as other organizations.

Legalweek

$65

Add to Cart
Card image cap
-1
59 minutes
cc
Data Breach Double Play: Lessons from Data Breach War Stories and Responding to Healthcare Data Breaches
In this program, you'll learn the lessons of some data breach cases that can help you protect your company when facing a data breach. This program also provides timely, actionable advice that includes the 5 things you can start doing today to help prevent data breaches and better prepare your company to respond to them if they do occur, focusing on the healthcare space where data breaches can include disclosure of personal health information regulated by state and federal laws including the Health Insurance Portability and Accountability Act (HIPAA).

New Media Legal

$75

Add to Cart
    s