NOTE: In order to obtain credit for this webcast it MUST be viewed on 9/7/2016 starting at 12 (noon) CST, because this program is being broadcast at that date and time, the credit is considered unlimited (live) credit by OBA/MCLE.
CLE CREDIT: This course has been approved by the Oklahoma Bar Association Mandatory Continuing Legal Education Commission for 1.5 hours of mandatory CLE credit, including 0 hours of ethics.
TUITION: Registration for the webcast is $75.00
NOTE: This program is NOT approved for Texas credit. The Texas Bar will not permit members to submit online programs for Texas credit.
CHECKPOINTS: This program will contain random checkpoints. In order to submit credit for this program, you must confirm your presence at the checkpoints. If you do not meet the checkpoint requirement you may not receive credit for the live program. The checkpoint submission is entirely dependent on your successful completion of the system check.
NOTE: At the end of the program click on the “Credit Submission Tab” to go to your credit profile and begin the credit submission process. Please remember to submit credit on the day of the event.
Locked Down: Practical Information Security for Lawyers
Sharon D. Nelson, Esq., President Sensei Enterprises, Inc.
John Simek, Vice President Sensei Enterprises, Inc.
The War Against Data Breaches: Locking Law Firm Data Down
Yes, law firms have been breached – many of them. Our cybersecurity experts will tell you real- life stories of law firm data breaches and explain how they could have been prevented. They will also share practical tips for ethically protecting your confidential data– many of those tips are low or no-cost. They will go through the changes to the ABA Model Rules of Professional Conduct (Rules 1.1 and 1.6) and talk about the states that have thus far adopted those rules.
They will also cover:
* The most successful tactic for breaking into law firms
* How to prevent data breaches using a combination of technology, policies and training
* The move from “defending the perimeter” to “detect, respond and recover”
* Encryption, which has become cheap and easy – and may be ethically required
* The new rules for strong passwords and the move to multi-factor authentication
* Common sources of breaches: User Error, Technology Snafus, Insiders, Hackers (including state-sponsored hackers) and Hacktivists
* How to manage smartphones in a BYOD (bring your own device) world
* What you must do after a data breach
* Secure computing when you’re on the road