Protecting Your Connected World: Where IT and the Law Intersect

(293 Ratings)

Produced on: August 16, 2016

Course Format On Demand Audio

Taught by


Course Description

Time 96 minutes
Difficulty Intermediate

We live in a connected world. The technology we utilize on a daily basis exposes us all to potentially catastrophic cyber breaches. Every day, criminals, cyber-terrorists, and hacktivists target domestic and international business networks to obtain health records, social security numbers, and valuable trade secrets. The cyber-breach also threatens the integrity of business networks, with the risk of network degradation and/ or lockouts. In short, a cyber-breach can have devastating financial consequences and business operation.   

All companies should take meaningful steps toward securing their data, preventing data breaches, and minimizing potential liability. But if the unthinkable suddenly becomes reality, there are myriad legal and regulatory challenges that erupt the moment a breach is discovered. Cyber threats do not end with the initial response to a data breach. It continues to data security-related counseling and crisis management. Understanding that every decision made before and during a cyber breach can dramatically impact potential liability and the course of future litigation. Knowing the potential source of liability and the proper response can assist in minimizing the risks that loom after a breach.

David Schwed and James Paulino assist viewers in understanding the current nature and scope of cyber threats, and the duties imposed on businesses and business leaders in the current legal and regulatory environment.  This program also provides a practical guide on how to minimize corporate and personal exposure following a cyber breach through an examination of the legal and regulatory schemes governing cyber-breach response.

Learning Objectives:

  1. Discuss differences between traditional Information Technology objectives vs. information security
  2. Provide overview of cyber security landscape and why it’s important for all businesses to have a mature information security program
  3. Identify different regulatory requirements surrounding the protection of information (e.g. GLBA, HIPAA, HITECH, FERPA, COPA, etc.)
  4. Understand the importance of involving counsel before, during, including suspected, and after a breach has occurred
  5. Grasp how a business should engage and communicate with counsel (privilege/work product)
  6. Recognize the importance of a mature security incident response plan
  7. Appreciate the strategies surrounding breach related litigation and defense


David L. Schwed

Galaxy Digital

David L. Schwed is Chief Information Security Officer at Galaxy Digital. He has more than 20 years of Information Technology, Information Security, and Risk Management experience. He has worked in the financial services sector at a senior level for BNY Mellon, Merrill Lynch, Salomon Smith Barney, and Citigroup. Previously, he was a co-founder of MASS Communications, a leading connectivity and telecom management provider that takes a consultative approach to deliver a full suite of voice, data, risk management and security solutions where he served as its General Counsel and Chief Information Officer prior to its acquisition by Windstream. David is a member of the New York Bar and graduated Magna Cum Laude from Hofstra University School of Law where he was an associate editor of the Hofstra Law Review.

James M. Paulino II

Goldberg Segalla

James Paulino represents individuals and corporations in complex insurance coverage, intellectual property, cyber risk, labor and employment, and professional malpractice matters, as well as domestic and international contract disputes. His experience includes numerous mediation and settlement negotiations, including the negotiation of a multimillion-dollar settlement, and both the prosecution and defense of personal injury and medical malpractice actions. Jimmy has defended numerous medical providers, including a major university hospital, against malpractice actions regarding a wide range of treatments and services — handling motion practice, discovery, medical records review, depositions, and trial preparation.He is also a member of the firm’s data breach litigation team and a frequent contributor to its Data Privacy and Security blog.

In addition, Jimmy has represented educational institutions in a variety of education law matters, including those involving First Amendment religious freedom, Americans with Disabilities Act (ADA) and discrimination claims, the Family Educational Rights and Privacy Act (FERPA), disciplinary policies, high school athletics, student handbooks, employee handbooks, special education evaluations/students suspected of having disabilities, personal injury, and sexual harassment for high schools and universities.

He was the 2013 recipient of the Outstanding Young Lawyer Award, given by the Young Lawyers Section of the New York State Bar Association to recognize a young lawyer for outstanding service to both the community and the legal profession.

Jimmy’s background includes serving as a law clerk with the Monroe County Attorney’s Office, Children’s Services Unit.

At the University of Notre Dame Law School, Jimmy was a member of the Association of Trial Lawyers of America (ATLA) and Barristers Trial Team, and he received the Edward F. Barrett Award for Excellence in Trial Advocacy and the American College of Trial Lawyers Medal for Excellence in Advocacy. At the University of Rochester, Jimmy received the Joseph P. O’Hern Scholarship for Travel and Study in Europe and served as an intern for the United States House of Representatives.


William S.

Good reminder of the risks

Kevin C.

Good job covering all the basics. Thank you

Shawna D.

The presenters were fantastic - so much good information!

Joseph C.

Very good instructors

Freya C.

This was an excellent program! Extremely informative and engaging speakers who covered a lot of practical issues. Best one yet!

Mary Ann O.

Great presentation and material!

Rebecca Z.

Terrific presentation and presenters! Thanks!

Marjorie C.

They packed a lot of information into 90 minutes.

Yvenne K.

EXCELLENT speakers who made the presentation conversational and thus interesting. GREAT PRESENTATION. Thank you!

Heather G.

Having 2 speakers was a nice change!

Hubert L.

Very good introduction to cybersecurity and law firms.

Linda R.

One of the best courses I've watched on Lawline! Great attorney/teachers/experts in their field of law. Wonderfull presentation style.

Jonathan P.

Very entertaining. Was not expecting to be entertained with the subject matter, but it ended up being one of my favorite courses so far.

Leslie M.

Nice course.

Rhonda G. W.

Thank you for this superb program -- thorough, well-organized, clear, and highly timely.

Paula N.

Excellent program

Kim K.

AWESOME program, presenters and relevant content. Good one!

Julie A. B.

Timely. Informative. Practical. Useful. Valuable. Necessary. Knowledgeable, well-informed speakers relaxed, conversational style nicely moved the program along minus the dull interludes that may occur in any presentation. Examples shared highlight relevant points in an easy-to-remember fashion. Relished the Q&A with the LIVE audience. Valued the definitions of key (often technical) terms supplied in legal as well as lay language.

Load More


$ 89 Privacy & Cybersecurity In Stock


Get Unlimited Access to Lawline Courses

Unlimited CLE Subscription gives you access to take almost any course from our catalog and earn as much CLE credit as you need.