Attention:
Card image cap

Oklahoma (OK) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Oklahoma (OK) Cybersecurity

Card image cap
-1
58 minutes
cc
ChatGPT: Resource or Liability? What Legal Leaders Need to Know
Generative AI has recently taken the legal world by storm and with its capabilities and sophistication advancing at a rapid pace, many are wondering how this powerful tool can be applied to the legal profession. While it promise to streamline workflows, automate repetitive tasks, develop new products, services and content, important legal considerations should be taken into account prior to using these tools. Join this session as our panel of experts explore how legal departments can utilize generative AI and ChatGPT, highlight the risks and develop strategies to implement such technology.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
Staying Ahead of the Curve: Handling the Evolving Landscape of SEC Cyber Regulations and Compliance
As the digital landscape evolves, it is essential for organizations to stay ahead of the curve and effectively address cyber risks to protect sensitive information and maintain regulatory compliance. The SEC has taken a similar approach of trying to protect sensitive information with their broad suite of new cybersecurity rules, including policies and procedures to address cybersecurity risk, written incident response programs, and much more. Our panelists will share insights into the evolving expectations of the SEC, discuss compliance processes that should be implemented and identify best practices to improve incident response and reporting.

General Counsel Conference

$65

Add to Cart
    s