New York CLE - Cybersecurity and Data Protection Courses

Device Icon
All Courses Available
iOS / Android / Web
New York selected on map

New York CLE
Accreditation Info

Courses purchased through UnitedCLE.com are provided and fully accredited by The National Academy of Continuing Legal Education, an Accredited NYS CLE Provider. To view our full accreditation details please .

All Courses

Cybersecurity and Data Protection Courses

  • Ethics in the Digital Era: What Attorneys Need to Know

    Data breaches are becoming increasingly common, posing a great challenge to law firms. Between the Ethical Rules of Conduct, your individual state’s regulations on professional conduct and the potential for financial and other penalties, it’s critical to recognize and take steps to prevent as well as reduce the impact of data breaches. This CLE course will explain various strategies to prevent data breaches, cybersecurity and the ethical and legal obligations in the wake of a breach.... More Info

    $34
    1Cyber/Ethics
  • Cybersecurity, Privacy, and Data Protection Issues: Ethical Considerations and New Requirements

    Several states are currently considering mandating CLE hours that concentrate on cybersecurity, privacy, and data protection. The obligation for lawyers to possess technology competency is not new, as many states have already adopted the American Bar Association (ABA) Model Rule's requirement. The aim of the CLE program is to address lawyers' ethical obligations and requirements and highlight its relevance for other states. The program will also offer practical strategies, explain impo... More Info

    $34
    1Cyber/Ethics
  • Cyber Security and Cyber Breach: What Lawyers and Their Law Firms Need to Know Now

    This CLE program will explore the issues surrounding cyber security, the potential consequences of a cyber breach, and the ethical considerations that accompany such an event. With over 50 state laws in the United States concerning data privacy and security, companies must understand what legal and ethical obligations their business and clients have when it comes to personal information. The Federal Trade Commission also keeps an eye on companies to make sure that they are following th... More Info

    $34
    1Cybersecurity
  • Cybersecurity and Data Privacy Obligations for Lawyers

    Focusing on the vast cyber threats to the legal community, this CLE course will explain why lawyers are such tempting targets to hackers. The course will explain the cost of data breaches and an attorney’s obligation to cybersecurity, particularly in the context of ESI. This course will include discussions on general ethical responsibilities that lawyers have when it comes to securing both their clients’ and opposing parties’ data. Discussions of the threat landscape, what to be on th... More Info

    $34
    1Cybersecurity
  • The Biggest Cybersecurity Threat of All - Human Behavior: How to Build a Security First Culture to Protect Your Law Firm

    The most vulnerable part of your firm’s security is not in your technology, it’s in your employees. The vast majority of cyber breaches are due to human behavior, which poses the biggest risks to your cybersecurity. This CLE course will explain how to address that threat through training and education, employing strategies to ensure a security-first culture and survive in the face of cyberattacks. More Info

    $34
    1Cybersecurity
  • Preventing Your Worst Tech Nightmare: Protecting Your Firm and Clients from Cybercriminals

    Cyberattacks are on the rise and everyone is at risk. This CLE course will present a comprehensive plan for preventing cyberattacks and protecting your firm’s technology. The course will cover everything from an attorney’s ethical obligations with regards to technological competence to the cybersecurity myths that can invite harm. You will receive practical, concrete strategies to secure your practice against cybercrime as well as the leadership skills to create a culture of security-f... More Info

    $34
    1Cybersecurity
  • Five Steps to Protect Your Firm from Catastrophic Cyber Attacks

    Protecting your firm from cyber-attacks has become increasingly difficult, and increasingly imperative. With cyberattacks on the rise, all businesses are at risk. This CLE course will present 5 critical steps to protect client data and stop cyber-attacks from accessing information. The steps presented will increase your security overall as well as lessen the likelihood you will be a victim of cyber-criminals. More Info

    $34
    1Cybersecurity
  • Privacy and Cyber Breaches: Are You Next?

    It is critical for businesses, regardless of their size, to comply with state, federal and foreign privacy laws and regulations. These will govern a company’s procedures including data collection, storage, use, sharing and disposal with regards to personally identifiable information (PII), personal health information (PHI) and payment card information (PCI). A company that fails to adhere to privacy guidelines, even inadvertently or unknowingly, or to disclose its procedures, are simpl... More Info

    $65
    1.5Cybersecurity
  • Cyber Security Compliance Trifecta: Recent Revisions to Three Important Security & Privacy Standards

    Both large and small companies have been faced with increasing cybersecurity compliance concerns. This informative CLE course will review the standards and requirements revisions published recently, which have broad implications for cybersecurity compliance. These include the Spec. Pub 800-53 (Security and Privacy Controls for Information Systems and Organizations), released by the National Institute of Standards and Technology (NIST), the PCI-DSS 4.0 published by the Payment Card Indu... More Info

    $34
    1Cybersecurity
  • Emerging Post Pandemic Cybersecurity Issues for Lawyers

    Cybersecurity is an absolute necessity for law firms today. In the post-pandemic world, with attorneys working remotely and from a variety of devices and networks, the ethical and professional obligations with regards to competency, supervision and confidentiality are further amplified. Creating a defensible cybersecurity protocol means taking into account the process (technology) as well as the policies, such as incident response, business continuity, disaster recovery, work-from-home... More Info

    $34
    1Cybersecurity
Decorative Arc

Want Different Options?

For a custom suite of courses, our custom CLE option satisfies your CLE cycle requirements in one easy step.

Customize OptionsRight ArrowCustomize Options