eCourse art

eCourse

Protecting Confidential Information in the Age of Cyber Attacks: Do You Have a Plan?

Contains material from Jul 2017

Protecting Confidential Information in the Age of Cyber Attacks: Do You Have a Plan?
4.78 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

good course

Technical Questions?
512.475.6700
service@utcle.org



Explore current hot topics in cybersecurity and protecting sensitive personal information, trade secrets, and other confidential business information in the digital age.

Includes: Video Audio Paper Slides


Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions

Show session details

1. Protecting Confidential Information in the Age of Cyber Attacks: Do You Have a Plan? (Jul 2017)

Jason M. Storck

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
26 mins
(mp3)
26 mins
(pdf)
22 pgs
(pdf)
9 pgs
Session 1 —26 mins
Protecting Confidential Information in the Age of Cyber Attacks: Do You Have a Plan? (Jul 2017)

Explore current hot topics in cybersecurity and protecting sensitive personal information, trade secrets, and other confidential business information in the digital age.

Originally presented: Jun 2017 Labor and Employment Law Conference

Jason M. Storck, Wilson Sonsini Goodrich & Rosati, P.C. - Austin, TX