Even a cursory look at recent news stories makes it clear that digital threats are on the rise. Attackers often view lawyers and law firms as high value, soft targets for cyber attacks, social engineering scams and data theft.
In Part 1 of a 2-part program, attorney and information security consultant Scott Aurnou discusses numerous data security threats and how to mitigate the associated risk to your firm. He begins by covering technology and security basics, before moving on to specific threats facing computers, mobile devices and networks. He talks about how these attacks occur and what you can do to safeguard yourself and your practice.
In "Cyber Security for Attorneys: First Steps to Protecting Yourself Now - Part 2," Mr. Aurnou will continue with a discussion of password attacks, incident response, and computer security do's and don'ts.
I. Understand the fundamental technology underlying cyber security
II. Recognize the basic cyber-related threats facing a modern organization
III. Comprehend the essential steps needed to safeguard client and firm data found in a modern law firm computer network
IV. Understand the basic methods and tools used to protect computers, mobile devices and networks
V. Comprehend the importance of using secure day-to-day processes to protect your office
VI. Recognize how hackers try to trick people and how to avoid becoming a victim
Scott Aurnou, Esq., CISSP is an attorney and founder of The Security Advocate, which helps organizations with information security and data privacy issues. This includes privacy and security awareness training, security consulting, compliance with cyber security and privacy laws and related legal concerns.
Scott spent over a decade as a litigation attorney in the NYC area, and served as lead counsel for a private client services group at Smith Barney. He uses his legal, security, and business background to make complex information security concepts easy to understand (and even entertaining on occasion) for non-technical audiences. He has published security related articles in national publications ranging from the New York Law Journal to SC Magazine. In addition, he has created and delivered numerous presentations on information security and data privacy issues for executives, managers, and professionals.
Scott is a Certified Information Systems Security Professional (CISSP), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Professional (CIPP/US) and a Fellow of Information Privacy (FIP). He is admitted to practice law in New York, Colorado, the U.S. District Courts for the Eastern and Southern Districts of New York; as well as the U.S. Court of Appeals for the Second Circuit. He is also the author of the Introduction to Information Security LiveLessons video training series for Pearson Publishing.
Interesting and informative!
great job of making the complex understandable.
Anorher excellent program by this presenter.
Great job. Far more engaging than I expected.
Wonderful program. Admittedly much more than I (a non-techie) can absorb in one pass through, but I'm delighted to have the information for reference and for periodic viewing. Thank you for such a very well-organized and comprehensive program. Excellent charts and graphics, and even video of a sinking ship to get the point across.
This is worth watching multiple times. Great information.
This was one of the most informative cles I have ever taken
Well done. Thanks
Great Presentation....... Very knowledgeable and engaging speaker. WELL DONE!!!
Excellent seminar. Well worth while.
This was one of the best courses I've ever taken online.
really interesting stuff & good advice for firms
Very timely topic.
Excellent speaker and very informative.
Wow! This presentation is FULL of valuable info,
A little over my head, but thank you!
enlightening and well organized-thank you
Lot of good information and resource material.
The speaker imparted a great deal of knowledge. His use of analogy was genius! Great presentation!
Excellent program and speaker. Scott really knows what he is talking about.
Exceptionally detailed and thorough overview of cyber security issues.
Great course, great instructor.
Speaker was engaging. Enjoyed the course.
Loved it! Amazing presentation!
Normally hate cle's. I liked this one though, learned a lot about how internet security attacks actually happen.
Excellent instructor and extremely well done PowerPoint. Well worth it!
Any teacher that can throw in a reference to Battlestar Galactica in their presentation gets an A from me!
Very good program
Very thorough. A LOT of useful information.
This was an exceptional CLE
Very in depth and informative!
Crammed full of useful information
Excellent presentation of the material, and very informative. Will definitely watch the second part.
Very good use of analogies in his presentation. It made the material a lot easier to understand.
Excellent speaker and very helpful material.
Wow. Scott was excellent and subject matter really interesting.
Excellent in a hard to understand area if tech not your thing
Very informative, very comprehensive, very well presented
Great overview for anyone new to cyber security, but may not be as helpful for individuals with experience in this area.
Arnou is a great lecturer. I've been listening to him for a couple years now and hes top shelf. Great at making difficult concepts understandable, and I love the background knowledge.
Very densely-packed with useful, practical information!
Really good information
This was really a very interesting class!
Can't wait to watch part two; part one was so informative and eye opening.
Awesome overview of cyber security issues. I knew a lot of this stuff due to my work, but this really helped fill in the gaps in my knowledge. I wish my co-workers (non-attorney consultants) could review.
This guy is amazing! I am a Project Manager and consult in Cyber Security and he knows his stuff! Excellent job!
Great overview of security principles and a bonus for the Szent István story to illustrate compartment security theory.
This course covers a wealth of information to comprehend in the changing landscape of technology and cyber security. Now onto part 2.
one of the best programs i've watched in years. packed with tons of useful information. highly recommended
Outstanding. Comprehensive look. Goes from basic to geeky, with understandable analogies.
very informative presentation
Amazing! Technical but so well presented that it was easily understood. Excellent printed material for reference later. I would give this speaker and presentation 10s if possible.
Excellent speaker and topic.
Really great course; covers a lot of ground and deals with important and practical issues
Wow. He was great and obviously knew his subject matter inside and out.
Very informative and timely.
Learned a lot. Well done thank you.
Scott did a great job all the way through an excellent presentation!
Concise and informative
I enjoyed and benefitted from the slides...
Presenter did an excellent job!
a must course...excellent instructor...clarity for non-tech attorneys...or anyone
This is an eyeopener.
Talented presenter shared critical and important information necessary in this Cyber age.
Exceptionally well done presentation. I wish they were all this good.
A wealth of valuable information. Good program!
You're an attorney. You've worked with computers for years, and you think you know how they work, as well as how software, the internet and cybersecurity work. You don't. Take this course.
Extremely informative and an exceptional presenter!
REALLY good speaker!
This was one of the better courses. Both substantively and speaker wise.
Very informative presentation and great presenter. Lots of work was put into this. I found it very informative and have a lot of new tools as a result of this. Many thanks.
Unlimited CLE Subscription gives you access to take almost any course from our catalog and earn as much CLE credit as you need.