Total MCLE Credits: 6.5 in Professional Practice
Featuring an all-star panel of speakers, this first annual Hot Topics in Law Practice Management summit focuses on security concerns for law firms. Panelists cover with practical advice what you need to know about cybersecurity, data security, office security and more.
Slides |
Bill Squier - Protecting Confidential Information | Available after Purchase |
Howard Shafer - Supplemental materials | Available after Purchase |
Kenneth Citarella - Supplemental materials | Available after Purchase |
Materials |
Security Concerns for Law Firms - Agenda and Courebook Front Pages | Available after Purchase |
Howard Shafer - Employer Duty to Protect Employees from Harm | Available after Purchase |
Gary Fiebert - Strategies and Best Practices for Building Security | Available after Purchase |
Gary Fiebert - Security Concerns for Law Firms | Available after Purchase |
Brian Stapleton - Strategies and Best Practices for Building Security.pdf | Available after Purchase |
Bill Squier - Protecting Confidential Information.pdf | Available after Purchase |
Joseph DeMarco - Security Issues Arising from Use of Social Media by Companies and their Employees.pdf | Available after Purchase |
Kenneth Citarella - Protecting Proprietary and Other Information When Using 3rd Party Vendors | Available after Purchase |
Christine Whalley - Concerns With Regard to Bring Your Own Device Policies.pdf | Available after Purchase |
Natalie Sulimani - Protecting Your Physical and Cloud Computing Networks | Available after Purchase |
Robert Cioffi- Securing Physical Equipment and the Information It Contains and Retains | Available after Purchase |
John Jablonski - Understanding E-discovery.pdf | Available after Purchase |
Adam Cohen - Protection and Exploitation of Metadata.pdf | Available after Purchase |
Charles A. Ross - Use and Defense of Data Subpoenas.pdf | Available after Purchase |
Seth L. Laver - Understanding and Protecting Against Cyber Risk.pdf | Available after Purchase |
Bio - Howard Shafer - Employer Duty to Protect Employees from Harm | Available after Purchase |
Bio - Gary B. Fiebert - Strategies and Best Practices for Building Security | Available after Purchase |
Bio - Brian T. Stapleton - Weapons in the Workplace-Risks and Rights | Available after Purchase |
Bio - Bill Squier - Protecting Confidential Information | Available after Purchase |
Bio - Joseph DeMarco - Security Issues Arising from Use of Social Media by Companies and their Employees | Available after Purchase |
Bio - Kenneth Citarella - Protecting Proprietary and Other Information When Using 3rd Party Vendors | Available after Purchase |
Bio - Christine Whalley Concerns With Regard to Bring Your Own Device Policies.pdf | Available after Purchase |
Bio - Natalie Sulimani - Protecting Your Physical and Cloud Computing Networks | Available after Purchase |
Bio - Robert Cioffi - Securing Physical Equipment and the Information It Contains and Retains | Available after Purchase |
Bio - John Jablonski - Understanding E-Discovery | Available after Purchase |
Bio - John Elbasan - Protection and Exploitation of Metadata | Available after Purchase |
Bio - Ian Hochman - Protection and Exploitation of Metadata | Available after Purchase |
Bio - Charles Albert Ross - Use and Defense of Data Subpoenas | Available after Purchase |
Bio - Jessica Thaler | Available after Purchase |
Registrant Information and Instructions | Available after Purchase |
Supplemental Materials Howard Shafer | Available after Purchase |
Supplemental materials Kenneth Citarella | Available after Purchase |