Help

Cyber Law: Briefings & eBook Bundle

6 webcast programs and a value-added companion eBook for core fluency

  • Product Number: 2230214RB2
  • CLE Credits, earn up to:
    10 substantive credits, 0 ethics credits CLE Credit Note
  • Add to Favorites List

Choose Date/Location:

Registration for this program is closed
Also Available:
Ondemand Webcast
On Demand Webcast Add to Cart
Includes downloadable supporting materials. $245.00; Members $220.50; New Lawyers $122.50 Free for OnlinePass subscribers.
  • Product Description
  • Agenda & Materials
  • Faculty
  • Product Description

    Product Description

    This curated bundle of 10 hours of dynamic webcast programming paired with MCLE’s award-winning e-publication gives you a concrete understanding of cyber threats, cryptocurrency, security practices and policies, and prevention and handling of incidents and breaches. Clients expect all business lawyers to have core fluency in this enveloping area that permeates all industries. Set your own schedule, expand your skill set, and advance your practice with confidence.

    Webcast Briefings

    • Cyber Security Threats & Best Practices in the Remote World: How remote workplaces differ from in-person workplaces and threats encountered; Evaluating privacy practices and examining security; Best practicess
    • How Personal Information Is Collected, Sold & Used: Defining personal information and effective measures businesses should take to protect it; Importance of privacy practice; Causes of action arising from the sale and use of personal information
    • Cyber Security Plans on a Budget: Overview of data security laws and key developments; Factors and risk areas considered during an informal security audit and key IT operational practices; Company-focused perspective on developing an effective security program; Best practices for WISPs and other security policies; Cost savings options—operational measures
    • Cybersecurity Insurance: Overview and scope of different cybersecurity insurance policies; Typical exclusions; Effective measures for mitigating cybersecurity risk profiles; Best practices in preparing for a cybersecurity event
    • How to Handle a Data Security Incident or Breach: Data security issues: integrity, privacy, fair information practices; Anatomy of data incident investigations and attorneys’ role; Mitigating incidents and dealing with day-today issues; How to respond to common data incidents, including ransomware; Working with cybersecurity professionals and preserving privilege; How to work with government agencies; Application of fair information practices
    • Blockchain & Cryptocurrency: Blockchain basics; Cryptocurrency, ICOs, and other uses; Regulatory landscape and responses; Other challenges; Data privacy

    Companion eBook

    • Data Security and Privacy in Massachusetts: Written by experts in this complex and ever-evolving area of the law, the award-wining book gives you a working familiarity with data security compliance, breach prevention, and the protection of privacy.

    Unparalleled Expertise—Speakers & Authors

    • Top-notch Guidance—from the Best in the Practice
    • Practical Insight You Can Trust
    • Detailed Speaker & Author Information at www.mcle.org
  • Agenda

    Agenda & Materials

    • Cyber Security Threats & Best Practices in the Remote World

      How remote workplaces differ from in-person workplaces and threats encountered; Evaluating privacy practices and examining security; Best practices
    • How Personal Information Is Collected, Sold & Used

      Defining personal information and effective measures businesses should take to protect it; Importance of privacy practice; Causes of action arising from the sale and use of personal information
    • Cyber Security Plans on a Budget

      Overview of data security laws and key developments; Factors and risk areas considered during an informal security audit and key IT operational practices; Company-focused perspective on developing an effective security program; Best practices for WISPs and other security policies; Cost savings options—operational measures
    • Cybersecurity Insurance

      Overview and scope of different cybersecurity insurance policies; Typical exclusions; Effective measures for mitigating cybersecurity risk profiles; Best practices in preparing for a cybersecurity event
    • How to Handle a Data Security Incident or Breach

      Data security issues: integrity, privacy, fair information practices; Anatomy of data incident investigations and attorneys’ role; Mitigating incidents and dealing with day-to-day issues; How to respond to common data incidents, including ransomware; Working with cybersecurity professionals and preserving privilege; How to work with government agencies; Application of fair information practices
    • Blockchain & Cryptocurrency

      Blockchain basics; Cryptocurrency, ICOs, and other uses; Regulatory landscape and responses; Other challenges; Data privacy

    Please Note

    MCLE webcasts are delivered completely online, underscoring their convenience and appeal. There are no published print materials. All written materials are available electronically only. They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.

  • Faculty

    Faculty

    Deborah Briggs, Netscout Systems, Inc, Westford
    Stephen Y. Chow, Esq., Stephen Y. Chow, PC, Boston
    Nick DeLena, OCD Tech, Braintree
    Ellen M. Giblin, Esq., Privacy Hub LLC, Marblehead
    Frank S. Maniscalco, Esq., Advocate Mercantile LLC, Boston
    Kent D.B. Sinclair, Esq., Sinclair Law LLC, Beverly
    Dylan White, Esq., Massachusetts Securities Division, Boston
TOP