Attention:
Card image cap

Pennsylvania (PA) Cybersecurity CLE Course Catalog

Explore our entire library of CLE courses. Search the whole catalog or filter courses by state, practice area, provider, credit type, and format

Sort by

All CLE Courses For Pennsylvania (PA) Cybersecurity

Card image cap
87 minutes
cc
The Zero Trust Approach: A Comprehensive Guide on Leveling Up Your Cybersecurity
Join this session as a panel of distinguished IT professionals provide a comprehensive discussion of the Zero Trust approach. Speakers will offer practical tips and strategies appropriate for businesses to manage security threats.

The Knowledge Group

$115

Add to Cart
Card image cap
-1
61 minutes
cc
The Evolving World of Third & Fourth Party Cyber Threats: How to Effectively Defend Your Organization
Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. Fourth-party cyber risk, on the other hand, goes a step further. It refers to the potential risks that arise from the extended supply chain, involving the subcontractors or other indirect entities that have access to an organization's data through primary third-party relationships. Join this session as our experts discuss the need for organizations to assess and manage the security of their entire ecosystem of relationships and explore how best to protect against the vulnerabilities of interconnected parties.

General Counsel Conference

$65

Add to Cart
Card image cap
-1
60 minutes
cc
Staying Ahead of the Curve: Handling the Evolving Landscape of SEC Cyber Regulations and Compliance
As the digital landscape evolves, it is essential for organizations to stay ahead of the curve and effectively address cyber risks to protect sensitive information and maintain regulatory compliance. The SEC has taken a similar approach of trying to protect sensitive information with their broad suite of new cybersecurity rules, including policies and procedures to address cybersecurity risk, written incident response programs, and much more. Our panelists will share insights into the evolving expectations of the SEC, discuss compliance processes that should be implemented and identify best practices to improve incident response and reporting.

General Counsel Conference

$65

Add to Cart
Card image cap
59 minutes
cc
We've Been Hacked! Combating Cyber Attacks & Emerging Threats
The insurance industry continues to experience large growth in digital fraud attempts, but all industries are at risk as ransomware and social engineering claims continue to rise. This panel will warn against the new, sneaky ways you are being hacked, and emerging threats in cyberattacks, as well as offer expert advice on cybersecurity best practices and how to keep up with the changing fraud patterns.

Property Casualty 360

$65

Add to Cart
Card image cap
-1
77 minutes
cc
LJN Webinar Series: The Crypto Landscape Post-FTX
This presentation will cover the current status and near future outlook for the blockchain sector (or "crypto" broadly) from a legal standpoint. Questions answered include: What went wrong? Is crypto dead and buried? What's in store next for the industry and regulatory landscape? What's the cybersecurity state of play in crypto?

Law Journal Newsletters

$95

Add to Cart
Card image cap
-1
66 minutes
cc
Stand Up CLE: Cybersecurity, Privacy, Data Protection - and Magic!
We all know that CLE programs are boring and a chore to watch. But we’re breaking the rules – a CLE program that’s intentionally funny and (gasp) entertaining, yet somehow still informative. In this unique installment of this popular series, Mark Wooster is joined by Magician, Anthropologist, Cybersecurity Expert and Keynote Speaker Paul Draper. Paul teaches you what you need to know about cybersecurity, privacy and data protection, all the while keeping you entertained with some awesome magic tricks. From the basic steps you and your firm need to take right now to prevent being hacked by someone who dabbles in hacking to more advanced measures you need to consider if you might become a target of a more sophisticated ransomware attack, Paul gives you the benefit of his decades of practical experience working and consulting in cybersecurity for Fortune 100 companies. Reserve your seat today and we’ll waive the two-drink minimum!

New Media Legal

$75

Add to Cart
Card image cap
-1
60 minutes
cc
The Nexus between Discovery, Security and Privacy
The connection between Discovery, Security and Privacy is evolving, as new regulations materialize and the threat landscape expands. Join this session to hear from legal professionals on how Privacy and Security is front and center, to support and manage eDiscovery at Microsoft as well as other organizations.

Legalweek

$65

Add to Cart
Card image cap
-1
61 minutes
cc
Demystifying Cyber Insurance
Join this session as our cyber insurance experts consider the current status of cyber insurance, delve into the process and the due diligence required before adopting a policy, and offer insights into the challenges you can face with your policy downstream.

Legalweek

$65

Add to Cart
Card image cap
-1
58 minutes
cc
Surviving the App-ocolypse - eDiscovery in an Age of Atypical Data
Data has never been more intimidating: Slack attacks, Zoom booms, short format and continual messaging, and more apps that you can count. A tsunami of new and emerging data sources – ones that don’t work when handled as a traditional document – is crashing down on us. Learn how our panelists not just survive but thrive working with data like Slack, Teams, Zoom, WhatsApp, social media, and more.

Legalweek

$65

Add to Cart
    s