Privacy & Cybersecurity

Sort by:
{"id":411354775,"title":"Course #501- Intellectual Property Law: World of Big Data (Part 1) - webinar","handle":"course-501-intellectual-property-law-world-of-big-data-part-i","description":"\u003cp\u003e\u003cstrong\u003eSpeaker: Jessica Holcombe\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 501\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThis course provides an overview of collecting and managing customer Personally Identifiable Information (PII).\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. What PII can your client collect?\u003c\/p\u003e\n\u003cp\u003e2. Sharing PII with third parties\u003c\/p\u003e\n\u003cp\u003e3. Review of privacy laws\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the definition of PII and formulate some examples of it\u003c\/li\u003e\n\u003cli\u003eUnderstand when \"permissible\" data collection goes too far\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJessica Holcombe is an attorney and the founder of Holcombe Law Group in Auburn, California. She focuses her practice on Business, Technology, and Real Estate Law. \u003c\/em\u003e\u003c\/p\u003e","published_at":"2014-11-22T12:51:00-08:00","created_at":"2014-11-22T12:56:20-08:00","vendor":"Aaron \u0026 Aaron Inc. (dba Ulrich, Nash \u0026 Gump) CLE","type":"Webinar","tags":["credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","intellectual-property","intermediate","privacy-cybersecurity","single-course","technology","webinar"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":991189031,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"Course# 501","requires_shipping":false,"taxable":true,"featured_image":null,"available":true,"name":"Course #501- Intellectual Property Law: World of Big Data (Part 1) - webinar","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":1,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_593ad7d9-1d47-404a-b4be-c5011944edcb.jpg?v=1502316980"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_593ad7d9-1d47-404a-b4be-c5011944edcb.jpg?v=1502316980","options":["Title"],"media":[{"alt":null,"id":10795909199,"position":1,"preview_image":{"aspect_ratio":1.653,"height":484,"width":800,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_593ad7d9-1d47-404a-b4be-c5011944edcb.jpg?v=1502316980"},"aspect_ratio":1.653,"height":484,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_593ad7d9-1d47-404a-b4be-c5011944edcb.jpg?v=1502316980","width":800}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cp\u003e\u003cstrong\u003eSpeaker: Jessica Holcombe\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 501\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThis course provides an overview of collecting and managing customer Personally Identifiable Information (PII).\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. What PII can your client collect?\u003c\/p\u003e\n\u003cp\u003e2. Sharing PII with third parties\u003c\/p\u003e\n\u003cp\u003e3. Review of privacy laws\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the definition of PII and formulate some examples of it\u003c\/li\u003e\n\u003cli\u003eUnderstand when \"permissible\" data collection goes too far\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJessica Holcombe is an attorney and the founder of Holcombe Law Group in Auburn, California. She focuses her practice on Business, Technology, and Real Estate Law. \u003c\/em\u003e\u003c\/p\u003e"}
Course #501- Intellectual Property Law: World of Big Data (Part 1) - webinar

Course #501- Intellectual Property Law: World of Big Data (Part 1) - webinar

$ 59.00

Speaker: Jessica Holcombe Course 501 1 hour MCLE Credit This course provides an overview of collecting and managing customer Personally Identifiable Information (PII). Key Points: 1. What PII can your client collect? 2. Sharing PII with third parties 3. Review of privacy laws Objectives: Understand the definition of PII and formulate some examp...


More Info
{"id":411355623,"title":"Course #502- Intellectual Property: World of Big Data (Part 2) - webinar","handle":"course-502-intellectual-property-world-of-big-data-part-ii","description":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Jessica Holcombe\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 502\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThis course provides an overview of collecting and managing customer Personally Identifiable Information (PII).\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. What PII can your client collect?\u003c\/p\u003e\n\u003cp\u003e2. Sharing PII with third parties\u003c\/p\u003e\n\u003cp\u003e3. Review of privacy laws\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the definition of PII and formulate some examples of it\u003c\/li\u003e\n\u003cli\u003eUnderstand when \"permissible\" data collection goes too far\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJessica Holcombe is an attorney and the founder of Holcombe Law Group in Auburn, California. She focuses her practice on Business, Technology, and Real Estate Law. \u003c\/em\u003e\u003c\/p\u003e","published_at":"2014-11-22T12:57:00-08:00","created_at":"2014-11-22T13:03:07-08:00","vendor":"Aaron \u0026 Aaron Inc. (dba Ulrich, Nash \u0026 Gump) CLE","type":"Webinar","tags":["credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","intellectual-property","intermediate","privacy-cybersecurity","single-course","technology","webinar"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":991196107,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"Course# 502","requires_shipping":false,"taxable":true,"featured_image":null,"available":true,"name":"Course #502- Intellectual Property: World of Big Data (Part 2) - webinar","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":1,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_20aac6be-3307-40a8-b687-3205db6627e6.jpg?v=1502317321"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_20aac6be-3307-40a8-b687-3205db6627e6.jpg?v=1502317321","options":["Title"],"media":[{"alt":null,"id":10796007503,"position":1,"preview_image":{"aspect_ratio":1.653,"height":484,"width":800,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_20aac6be-3307-40a8-b687-3205db6627e6.jpg?v=1502317321"},"aspect_ratio":1.653,"height":484,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_20aac6be-3307-40a8-b687-3205db6627e6.jpg?v=1502317321","width":800}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Jessica Holcombe\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 502\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThis course provides an overview of collecting and managing customer Personally Identifiable Information (PII).\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. What PII can your client collect?\u003c\/p\u003e\n\u003cp\u003e2. Sharing PII with third parties\u003c\/p\u003e\n\u003cp\u003e3. Review of privacy laws\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the definition of PII and formulate some examples of it\u003c\/li\u003e\n\u003cli\u003eUnderstand when \"permissible\" data collection goes too far\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJessica Holcombe is an attorney and the founder of Holcombe Law Group in Auburn, California. She focuses her practice on Business, Technology, and Real Estate Law. \u003c\/em\u003e\u003c\/p\u003e"}
Course #502- Intellectual Property: World of Big Data (Part 2) - webinar

Course #502- Intellectual Property: World of Big Data (Part 2) - webinar

$ 59.00

Speaker: Jessica Holcombe Course 502 1 hour MCLE Credit This course provides an overview of collecting and managing customer Personally Identifiable Information (PII). Key Points: 1. What PII can your client collect? 2. Sharing PII with third parties 3. Review of privacy laws Objectives: Understand the definition of PII and formulate some exam...


More Info
{"id":425443951,"title":"Course #518- Ethics \u0026 IP Law: The Cloud and Social Media - webinar","handle":"course-518-ethics-ip-law-navigating-the-cloud-and-social-media-1-mcle-credits-webinar","description":"\u003cp\u003e\u003cstrong\u003eSpeaker: Joanna Mendoza\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 518\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. The Cloud\u003c\/p\u003e\n\u003cp\u003e2. Social Media\u003c\/p\u003e\n\u003cp\u003e3. Ethical Concerns\u003c\/p\u003e\n\u003cp\u003e4. What Rules Apply?\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eLearn the definitions of the cloud and social media\u003c\/li\u003e\n\u003cli\u003eUnderstand how to apply the rules governing the cloud and social media to one's practice\u003c\/li\u003e\n\u003cli\u003eIdentify other issues within social media: client and evidentiary problems\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJoanna Mendoza is an attorney in Granite Bay, California, at the IP Law Firm. She focuses her practice on intellectual property and business litigation.\u003c\/em\u003e\u003c\/p\u003e","published_at":"2014-12-30T15:43:00-08:00","created_at":"2014-12-30T15:43:54-08:00","vendor":"Aaron \u0026 Aaron Inc. (dba Ulrich, Nash \u0026 Gump) CLE","type":"Webinar","tags":["cloud","credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","entertainment-law","ethics","intellectual-property","intermediate","privacy-cybersecurity","single-course","Social Media","technology","webinar"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":43563773260,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"Course# 518","requires_shipping":false,"taxable":true,"featured_image":null,"available":true,"name":"Course #518- Ethics \u0026 IP Law: The Cloud and Social Media - webinar","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":1,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/joanna-mendoza.jpg?v=1502389230"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/joanna-mendoza.jpg?v=1502389230","options":["Title"],"media":[{"alt":null,"id":11674157135,"position":1,"preview_image":{"aspect_ratio":0.78,"height":205,"width":160,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/joanna-mendoza.jpg?v=1502389230"},"aspect_ratio":0.78,"height":205,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/joanna-mendoza.jpg?v=1502389230","width":160}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cp\u003e\u003cstrong\u003eSpeaker: Joanna Mendoza\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 518\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. The Cloud\u003c\/p\u003e\n\u003cp\u003e2. Social Media\u003c\/p\u003e\n\u003cp\u003e3. Ethical Concerns\u003c\/p\u003e\n\u003cp\u003e4. What Rules Apply?\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eLearn the definitions of the cloud and social media\u003c\/li\u003e\n\u003cli\u003eUnderstand how to apply the rules governing the cloud and social media to one's practice\u003c\/li\u003e\n\u003cli\u003eIdentify other issues within social media: client and evidentiary problems\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJoanna Mendoza is an attorney in Granite Bay, California, at the IP Law Firm. She focuses her practice on intellectual property and business litigation.\u003c\/em\u003e\u003c\/p\u003e"}
Course #518- Ethics & IP Law: The Cloud and Social Media - webinar

Course #518- Ethics & IP Law: The Cloud and Social Media - webinar

$ 59.00

Speaker: Joanna Mendoza Course 518 1 hour MCLE Credit Key Points: 1. The Cloud 2. Social Media 3. Ethical Concerns 4. What Rules Apply? Objectives: Learn the definitions of the cloud and social media Understand how to apply the rules governing the cloud and social media to one's practice Identify other issues within social media: client and evi...


More Info
{"id":11558006284,"title":"Course #656- Cybersecurity Risk Management - webinar","handle":"course-656-cybersecurity-webinar","description":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e \u003ciframe id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/accounts\/10812142\/events\/7532779\/videos\/161828532\/player?width=640\u0026amp;height=360\u0026amp;enableInfo=true\u0026amp;defaultDrawer=\u0026amp;autoPlay=true\u0026amp;mute=false\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"\"\u003e \u003c\/iframe\u003e\u003cscript type=\"text\/javascript\" data-embed_id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/assets\/plugins\/referrer_tracking.js\"\u003e\u003c\/script\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Erin Hill, JD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 656\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCybersecurity Risk Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGoals:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThe goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks.\u003c\/p\u003e\n\u003cdiv id=\"zype_599df11cb0cc5b15bc000b88\" style=\"width: 100%; min-width: 300px; max-width: 560px;\"\u003e\u003c\/div\u003e\n\u003cstrong\u003e\u003cscript src=\"https:\/\/play.zype.com\/javascripts\/subscription_embed.js\" type=\"text\/javascript\"\u003e\u003c\/script\u003e\u003cscript type=\"text\/javascript\"\u003e\/\/ \u003c![CDATA[\nzype.siteId = \"nQxMdqycvGlSxCakHpT8PxDR0kioTqyjOFzvwxWYfB4sPJRZiUgKfxTTcZx1bgGx\";zype.videoId = \"599df11cb0cc5b15bc000b88\";zype.videoEmbed(\"zype_599df11cb0cc5b15bc000b88\");\n\/\/ ]]\u003e\u003c\/script\u003e\u003c\/strong\u003e\n\u003cp\u003e\u003cstrong\u003e Outline:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e1) An Effective Risk Assessment Framework, 3 pm to 310 pm\u003c\/p\u003e\n\u003cp\u003e2) Critical Elements Scope 3:10 p to 320 pm\u003c\/p\u003e\n\u003cp\u003e3) Thorough Risk Assessment 320 pm to 340 pm\u003c\/p\u003e\n\u003cp\u003e4) Proactive Incident Response Planning 340 pm to 350pm\u003c\/p\u003e\n\u003cp\u003e5) Dedicated Cybersecurity Resources 350 pm to 4 pm\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eDr Erin Hill is a licensed attorney and is a professor at William Jessup University in Rocklin, CA, and has spent decades working in business management. She stays current in her field by maintaining international certifications in finance, law, quality control, and project management.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eCall 916 652 3000 to enroll.\u003c\/p\u003e","published_at":"2017-07-27T14:51:57-07:00","created_at":"2017-08-25T09:32:20-07:00","vendor":"aaroncle.com","type":"Webinar","tags":["advanced","counseling clients on IP","credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","cyberlaw","email","Internet","internet technology","IP","privacy-cybersecurity","single-course","technology","webinar","your email can hurt you"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":43969979532,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Course #656- Cybersecurity Risk Management - webinar","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":1,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773","options":["Title"],"media":[{"alt":null,"id":457868247119,"position":1,"preview_image":{"aspect_ratio":1.0,"height":480,"width":480,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773"},"aspect_ratio":1.0,"height":480,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773","width":480}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e \u003ciframe id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/accounts\/10812142\/events\/7532779\/videos\/161828532\/player?width=640\u0026amp;height=360\u0026amp;enableInfo=true\u0026amp;defaultDrawer=\u0026amp;autoPlay=true\u0026amp;mute=false\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"\"\u003e \u003c\/iframe\u003e\u003cscript type=\"text\/javascript\" data-embed_id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/assets\/plugins\/referrer_tracking.js\"\u003e\u003c\/script\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Erin Hill, JD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 656\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCybersecurity Risk Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGoals:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThe goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks.\u003c\/p\u003e\n\u003cdiv id=\"zype_599df11cb0cc5b15bc000b88\" style=\"width: 100%; min-width: 300px; max-width: 560px;\"\u003e\u003c\/div\u003e\n\u003cstrong\u003e\u003cscript src=\"https:\/\/play.zype.com\/javascripts\/subscription_embed.js\" type=\"text\/javascript\"\u003e\u003c\/script\u003e\u003cscript type=\"text\/javascript\"\u003e\/\/ \u003c![CDATA[\nzype.siteId = \"nQxMdqycvGlSxCakHpT8PxDR0kioTqyjOFzvwxWYfB4sPJRZiUgKfxTTcZx1bgGx\";zype.videoId = \"599df11cb0cc5b15bc000b88\";zype.videoEmbed(\"zype_599df11cb0cc5b15bc000b88\");\n\/\/ ]]\u003e\u003c\/script\u003e\u003c\/strong\u003e\n\u003cp\u003e\u003cstrong\u003e Outline:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e1) An Effective Risk Assessment Framework, 3 pm to 310 pm\u003c\/p\u003e\n\u003cp\u003e2) Critical Elements Scope 3:10 p to 320 pm\u003c\/p\u003e\n\u003cp\u003e3) Thorough Risk Assessment 320 pm to 340 pm\u003c\/p\u003e\n\u003cp\u003e4) Proactive Incident Response Planning 340 pm to 350pm\u003c\/p\u003e\n\u003cp\u003e5) Dedicated Cybersecurity Resources 350 pm to 4 pm\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eDr Erin Hill is a licensed attorney and is a professor at William Jessup University in Rocklin, CA, and has spent decades working in business management. She stays current in her field by maintaining international certifications in finance, law, quality control, and project management.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eCall 916 652 3000 to enroll.\u003c\/p\u003e"}
Course #656- Cybersecurity Risk Management - webinar

Course #656- Cybersecurity Risk Management - webinar

$ 59.00

  Speaker: Erin Hill, JD Course 656 1 hour MCLE Credit Cybersecurity Risk Management Goals: The goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks.  Outline: 1) An Effective Risk Assessment Framework, 3 pm to 310 pm 2) Critical Eleme...


More Info