Attention:
Card image cap

Kentucky (KY) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Kentucky (KY) Cybersecurity

Card image cap
-1
64 minutes
cc
Exploring the Ethical Dimensions of AI Integration in Legal Departments
This session will explore the ethical implications of using AI in legal decision-making, including issues related to bias, privacy, and transparency. Our expert panelists will share best practices to use AI tools ethically and responsibly, and will provide valuable insight on how legal departments are navigating the risks.

General Counsel Conference

$75

Add to Cart
Card image cap
50 minutes
cc
Data Privacy Compliance: Pre-Attack Risk Mitigation and Post-Attack Best Practices
Top data privacy and security experts discuss the critical need for companies to prioritize data privacy compliance, risk assessment, and incident response planning to mitigate the impact of data breaches and adhere to evolving regulations.

Securities Docket

$75

Add to Cart
Card image cap
50 minutes
cc
Cybersecurity and Ransomware Attacks: Best Practices
This program highlights the escalating threat of ransomware attacks, emphasizing the need for robust cybersecurity measures and skilled professionals in cyber law and communication to manage breach incidents effectively.

Securities Docket

$75

Add to Cart
Card image cap
49 minutes
cc
A.I. and Cyber-Incident Response: The Latest Network Defenses, Monitoring and Countermeasures
AI is being increasingly used in cybersecurity, creating new challenges for incident responders, but also offering opportunities for quicker identification and security issue prevention. As such, it is crucial for CISOs to embrace AI for defense against bad actors while also considering the legal and security implications of its usage.

Securities Docket

$75

Add to Cart
Card image cap
57 minutes
cc
Handling a Breach: Mitigating Liability Through Compliance
Join this session and hear from our speakers as they consider SEC and DOJ enforcement trends, as well as a keen focus onESG, cyber and digital assets. Our panelists will also explore the future of prosecution activities and penalties.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
The Nexus between Discovery, Security and Privacy
The connection between Discovery, Security and Privacy is evolving, as new regulations materialize and the threat landscape expands. Join this session to hear from legal professionals on how Privacy and Security is front and center, to support and manage eDiscovery at Microsoft as well as other organizations.

Legalweek

$65

Add to Cart
Card image cap
59 minutes
cc
LJN Webinar Series: Cybersecurity - Anatomy of a Supply Chain Cyberattack
Details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

Law Journal Newsletters

$75

Add to Cart
    s