Download The Think Like A Lawyer Act Like A Hacker Brochure

 

 

Click here to get the Think Like A Lawyer Act Like A Hacker Brochure.

The biggest problems that law firms, companies and governments agencies make, is hiring people to protect their networks based on resumes, instead of skill sets.  Because of this, hackers have and always will win.

In this CLE our instructors will demonstrate to lawyers that a firm and/or their clients can be in compliance but not secure.  They should hire people based more on their skill sets, then the company can be both in compliance and secure.

In this Continuing Legal Education (CLE) titled “Think Like A Lawyer, Think Like A Hacker” you will learn the following topics:

PART I – Hacker

  • Proof that hackers with no college education can outthink your entire IT department
  • How hackers think outside-the-box
  • Tools that hackers use, that your IT Department should have
  • Demonstration of a hacker, hacking into a database
  • Live demonstration of a website vulnerability test

PART II – COUNTER MEASURES

  • How to really understand your risk factors
  • Artificial Intelligences vs. Your entire IT Department

PART – Q&A

  • Question and Answers

About The Instructors

Gregory Evans has been certified to teach CLE’s by the State Bard of Georgia, State Bar of California, State Bar of Nevada, and the State Bar of Georgia.  He is also a certified to teach with the International Law Enforcement Educations and Trainers Association.

Dr. Marla Shaver Stinson has MD, an MBA in Health Care, Master’s in Cyber Security and Information Assurance.  Dr. Stinson also has a CompTIA A+, CompTIA Network+, CompTIA Security+, and Certificated Ethical Hacker certifications.

Location For CLE:

  • On location for 10 or attorneys within 25 miles of Atlanta
  • Live online for 5 or more attorneys
  • OnDemand 24/7 for individual attorneys

Class Time Schedule:

1 Hour – Part 1

  • Proof that hackers with no college education can outthink your entire IT department
  • How hackers think outside-the-box
  • Tools that hackers use, that your IT Department should have
  • Demonstration of a hacker, hacking into a database
  • Live demonstration of a website vulnerability test

45 Minute – Part 2

  • How to really understand your risk factors
  • Artificial Intelligences vs. Your entire IT Department

15 Minute – Q&A

  • Question and Answers