Data Security 2.0: The Cloud, Mobile Devices & Encryption
Emerging challenges and trends, practical solutions, and upgraded preventative practices
- Product Number: 2160298P01
-
CLE Credits, earn up to:
3 substantive credits, 0 ethics credits CLE Credit Note -
Add to Favorites List
Choose Date/Location:
-
Product Description
Product Description
The world of data security is rapidly evolving from version 1.0 into a more sophisticated set of 2.0 best practices and policies. A plethora of ever-increasing regulations spanning a multiplicity of industries now demand more of businesses than just the “data security of old” that often consisted of simple firewalls, anti-virus and anti-malware measures, access limitations, password protection, and outdated policies. The challenges to data security are multiplying so quickly that businesses are hard-put to keep up with the technology and stay in compliance with the law.
This new program examines the hottest emerging challenges, including data security in the cloud, protection of mobile devices, and best use of encryption technology. The panelists map out practical solutions for businesses to assess their existing data security practices, identify their vulnerabilities, and integrate best-practice solutions into their data security protocols. This program also highlights the hottest current data breach situations, such as sophisticated email spoofs and common employee errors. The speakers discuss how to best avoid the most troublesome causes of data breaches—and how to best address data breaches when they occur.
Attend this program to upgrade your skillset to data security version 2.0—and get the valuable, real-world know-how to adeptly address the complicated data security compliance requirements and breach scenarios confronting your business clients.
-
Agenda
Agenda & Materials
-
9:00 - 9:10 a.m.
Welcome and Introduction
-
9:10 - 9:30 a.m.
Current Regulatory and Remedial Framework
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
9:30 - 10:20 a.m.
-
Vulnerabilities in an World of Developing Technology
-
Avoiding Breaches Before They Occur
-
Handling a Complicated Data Security Breach
-
Effective Cyber Liability Insurance
-
10:20 - 10:30 a.m.
Networking and Refreshment Break
-
10:30 - 10:50 a.m.
Data Security Compliance with Vendors and In M&A
on demand video Add to Cart -
10:50 - 11:10 a.m.
Business Email Compromise/Spear Phishing
on demand video Add to Cart -
11:10 - 11:20 a.m.
Law Firms as Data Security Targets
on demand video Add to CartCameron G. Shilling, Esq., McLane Middleton , Manchester
Kathleen M. Porter, Esq., Robinson+ Cole LLP , Boston
-
11:20 - 11:40 a.m.
Administrative, Congressional, and International Responses to Cyber-Threats
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
11:40 - 12:00 p.m.
"Ask the Experts" Q&A Session
Please Note
MCLE webcasts are delivered completely online, underscoring their convenience and appeal. There are no published print materials. All written materials are available electronically only. They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.
-
- Faculty