Don’t Get Hooked: Recognizing and Responding to Phishing and Cyberattacks

Don’t Get Hooked: Recognizing and Responding to Phishing and Cyberattacks

Jan 14, 2025

6:30 PM - 8:30 PM ET

Credits in

Icon About This Course

The rate of cyber attacks continues to grow each year and will most likely continue to grow. This course will shed light on attorneys' ethical obligations and responsibilities in safeguarding client data and how to recognize and respond to common forms of cyberattacks. 

Attendees will familiarize themselves with pertinent ethics rules and guidelines, ensuring compliance and heightened protection for their clients. This program will walk through common types of cyberattacks, how to recognize them and respond to them, including potential ethical requirements to notify clients. 

This program is designed for attorneys at all levels of experience who regularly use technology in their practice. It makes it highly relevant and beneficial for legal professionals across the industry.

Learning Objectives:

  • Explore ethical rules to protect client data
  • Recognize and respond to five common forms of cyberattacks
  • Realize ethical requirements when responding to a cyberattack
  • Evaluate what should be included in an incident response plan


Course Time Schedule:

Eastern Time: 6:30 PM - 8:30 PM
Central Time: 5:30 PM - 7:30 PM
Mountain Time: 4:30 PM - 6:30 PM
Pacific Time: 3:30 PM - 5:30 PM
Alaska Time: 2:30 PM - 4:30 PM
Hawaii-Aleutian Time: 1:30 PM - 3:30 PM

This course is also being presented on the following dates:

Tuesday, February 11, 2025
Tuesday, March 11, 2025
Tuesday, April 15, 2025
Tuesday, May 13, 2025
Tuesday, June 10, 2025

About the Presenters

Josh Rowland, Esq.

Law Offices of Josh Rowland, Esq.

Practice Area: Other

Employment Attorney, Joshua Rowland Esq. Durham, North Carolina (October 2017-Present)Legal ResearchCorporate Law Legal Education Course Development Cybersecurity Consultant, Fidelity Investments, Durham, North Carolina (December 2010 – Present)Cybersecurity ConsultingPrivacy Assessments Audit Coordination Data Analysis Policy and Procedure Development Identity and Access Management (IAM) Security Representative III (3 years) Anti-money Laundering InvestigationsCrisis Response Coordinator Security Device Programmer Physical Risk...

View Details