Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Join
Cyber Security Webinar
Tell a Friend About This EventTell a Friend

Cyber Security Webinar presented by Kyle Janecek

 Export to Your Calendar 8/26/2020
When: Wednesday, August 26, 2020
12:00 PM
Where: Hosted via Zoom
United States
Contact: Andrew McPhee

« Go to Upcoming Event List  

REGISTER HERE for Zoom Details.


Cyber Security Webinar presented by Kyle Janecek. 

How to Address Cyber Security in 2020


Kyle Janecek, an associate in the Newport Beach office of Newmeyer Dillion, is a member of the Transactional group. He brings to the team a breadth of experience including corporate, real estate, finance, intellectual property and construction law.


Regularly supporting the firm’s research, Kyle utilizes an analytical mindset to strategize and problem solve on behalf of the firm’s clients with a focus on alternative dispute resolution processes. Kyle enjoys coming up with creative and effective solutions to move a client's end goals further to highly favorable results.


 How to Address Cybersecurity in 2020


Summary: Since 2012, the ABA had implemented in its model rules that attorneys should know the benefits and risks associated with technology and that more generally, firms have a duty to take reasonable steps to protect a client’s personal information.   Law firms themselves are highly desirable targets for hackers, as they contain and safeguard personal information and may have minimal safeguards in place. Now with individuals working from home, new legislation, and the ever-advancing technology available to us, the need to adequately understand cybersecurity obligations, threats, and security measures is more important now than ever.  While many large entities may believe that they can properly address these threats through information technology systems, firewalls, and encryption measures, there are still stories showing examples of where they falter.  It could be said that it is not if a breach will occur, but when.   This presentation will focus on the laws and regulations governing cybersecurity in California,  the training required, how hacking occurs, and what is required in the aftermath of a breach. While some of these have been well-known for years, examples continue to mount, and additional legislation has been passed increasing the responsibility of entities to protect and secure information. 


•         To understand the risks and warning signs of common cybersecurity threats.

•         To understand the laws and regulations in place governing an entity’s responsibilities in securing an      individual’s data.

•         To understand the what actions can be taken to implement a cybersecurity policy.

•         To understand the responsibilities and required actions of an entity after a data breach.


CLM® Application Credit for Functional Specialists: 1 hour in the subject area of Operations Management (OM) toward the additional hours required of some Functional Specialists to fulfill the CLM application requirements.

CLM® Recertification Credit: 1 hour in the subject area of Operations Management (OM).

Membership Management Software Powered by YourMembership  ::  Legal