On Demand Webinar

Cybersecurity 101

Webinar Details$219

WHO should be involved in revising or implementing a cybersecurity regime?

WHAT are the major threats to data, including individuals’ personally identifiable information (“PII”) and protected health information?

WHERE and how should one store employees’ PII and PHI?

WHY invest resources in building out cybersecurity policies and protocols?

WHEN should one develop and implement a data-breach incident-response plan?


I.The Big Picture – Data Breaches’ Prevalence; and Key Cyber Threats

II.U.S. and International Cybersecurity and Privacy Recent Legal Developments

III.Proactive Practical Protective Measures, including HR-Focused Ones


Learning Objectives:

Learn about the ever-expanding universe of data leakage concerns

Learn the basics of some of the key pertinent rules of law

Learn many practical steps – both proactive and reactive

Guest Speaker

Robert Brownstone, Esq

Robert Brownstone, Esq

Bob Brownstone, an attorney, technologist and thought leader, just wrapped up a long-term run as the Technology & eDiscovery Counsel and Electronic-Information-Management (EIM) Group Chair at Fenwick & West LLP, headquartered in Silicon-Valley.  In May, he will launch his own law firm, tech consulting company and law/technology education provider.  Bob will continue to advise and train clients on all things “e”, including eDiscovery, information-security, data-privacy, retentio... View Full Profile

HRCI Credit

This program has been approved for credit hours through the HR Certification Institute. For more information about certification or recertification, please visit the HR Certification Institute website at www.hrci.org.

SHRM Credit

Aurora Training Advantage is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org.