This course covers the law of fraud, crime, policy, contracts, liability, IT security and active
defense—all with a focus on electronically stored and transmitted records. It also teaches
investigators how to prepare credible, defensible reports, whether for cyber crimes, forensics,
incident response, human resource issues or other investigations.
Each successive day of this five-day course builds upon lessons from the earlier days in order to
comprehensively strengthen your ability to help your enterprise (public or private sector) cope
with illegal hackers, botnets, malware, phishing, unruly vendors, data leakage, industrial spies,
rogue or uncooperative employees, or bad publicity connected with IT security.
Recent updates to the course address hot topics such as legal tips on confiscating and
interrogating mobile devices, the retention of business records connected with cloud computing
and social networks like Facebook and Twitter, and analysis and response to the risks and
opportunities surrounding open-source intelligence gathering
Syllabus
SECTION 1: Fundamentals of Data Security Law and Policy
SECTION 2: E-Records, E-Discovery and Business Law
SECTION 3: Contracting for Data Security and Other Technology
SECTION 4: The Law of Data Compliance: How to Conduct Investigations
SECTION 5: Applying Law to Emerging Dangers: Cyber Defense