“Ransomware and Law Firms: Pay Me Now or Pay Me Later”
August 31 — Tom Scott, Executive Director, SC Cyber
Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. In recent years, personal use of computers and the internet has exploded and, along with this massive growth, cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. The vast majority of these threats are aimed at directly or indirectly making money from the victims. Today, ransomware has emerged as one of the most troublesome malware categories of our time. Law firms are not exempt from these threats. Learn some of the strategies needed to safeguard your firm and your clients from the perils of Ransomware in this highly engaging presentation from SC Cyber.
- Approved for 1 hour CLE credit (177314)
September 28 — John Gardner, Co-Founder, Accurate Data Partners, LLC
The purpose of the CLE will be to inform attorneys of the basics of Identity Theft, what it is, how it affects those victimized by it (law firms have fallen victim to Identity Theft), a quick overview of the laws that are driven by it, and where all this is heading.
Attorneys are under special requirements to maintain a high level of client security and personal responsibility for the technology in use in their practices. Failure to understand these requirements, including Identity Theft, can result in ethics violations, malpractice claims and financial ruin for the firm. This is an important seminar for all attorneys, whether large firm or small firm, to attend.
- Approved for 1 hour Ethics CLE credit (177356)
“Rethinking Trust and Verification: Uses for Blockchains in the Practice of Law”
October 12 — Jack Pringle, Partner, Technology Lawyer and Information Privacy Professional at Adams and Reese LLP
All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification.
But what if a technology system could replace the third-party’s role so that any two people could contract directly with one another? Blockchains (also called distributed ledger systems) may soon offer validation in a number of areas where lawyers practice, including financial transactions, proof and chain of title, and authentication of many types. Understanding the technology, or at least its potential, is important for those attorneys who take part in the process of authentication and verification.
- Approved for 1 hour CLE credit (177503)
“Breach Response: Be Prepared or Face the Consequences”
October 26 — Karen Painter Randall — Partner, Chair — Cyber Security & Data Privacy Group, Connell Foley LLP
One can hardly turn on the news these days without hearing about the latest victim of a cyber-attack. The legal profession is not immune from the threat of a costly cyber breach. Cybersecurity is one of the biggest risks that law firms face today. Law firms are attractive targets because they hold valuable client information such as PII, PHI, and proprietary information including corporate mergers, patent and trade secrets, litigation strategy, and more. In fact, corporate clients are now conditioning retention on the strength of a firm’s data security plan and protection tools. The 2016 ABA Legal Technology Survey Reported that 30.7% of all law firms and 62.8% of firms over 500 lawyers had clients requesting details of its security protocols. The FBI repeatedly has issued warnings and held meetings with nearly all of the largest law firms in the United States about the risk of a data breach and theft of confidential and proprietary client information by countries such as China, Russia, North Korea and many others. Despite these warnings we continue to see some of the largest law firms in the United States get tangled up in major cybersecurity breaches. Whether or not you are prepared to manage a security breach will determine the final outcome. Thus, this program will focus on the importance of being prepared to respond to a data breach quickly to mitigate legal, ethical, regulatory and reputational loss.
- Approved for 1 hour Ethics CLE credit (177668)
“Cybersecurity at Warp Speed for the Legal Profession”
November 9 — Sharon D. Nelson, Esq., President and John Simek, Vice President, Sensei Enterprises, Inc.
Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating and remediating data breaches is hideously expensive, not to mention the necessity of complying with state data breach notification laws. But there are a host of free and budget friendly tips. Our presenters will cover:
- Cybersecurity standards for small businesses
- How to prevent data breaches using a combination of technology, policies and training
- Secure computing when you’re on the road
- Two factor authentication
- Intrusion detection systems
- The new rules for strong passwords and password management
- What you must do after a data breach and the components of an Incident Response Plan
- Defending against — and recovering from — ransomware
- Approved for 1 hour Ethics CLE credit (178040)
“Cybersecurity, It’s not always Cyber”
November 16 — Lieutenant Britt Dove, Supervisor, Computer Crime Unit, South Carolina Law Enforcement Division (SLED)
Many times when we hear the word cybersecurity, we wonder where to start; firewalls, strong passwords, malicious actors, ransomware, and encryption. As we attempt to protect our networks from the complex and changing technologies, we can easily overlook the physical aspect.
According to research by the National White Collar Crime Center (NW3C), after reviewing 1,800 instances of reported data breach from 2005 to 2016, 71.1% were not a result of hacking, but more attributed to personnel and organizational issues. “Unintentional Insider” leading the way with 33.5%.
This seminar will talk about cybersecurity and law enforcement, how the human element affects cybersecurity, no tech hacking, and what can be done to protect yourself.
- Approved for 1 hour CLE credit (178041)