|
Joshua G"The speakers kept the material as interesting as Cyber Security can be. " |
|
Amy M"Need slides for all segments; 30 minutes of narrative without any visual reference is not reasonable. Also would like a less casual reference to age as the determinant of pw management; all panelists seem to echo that and it's wholly inappropriate and anyway inaccurate. Besides, the best practice standard is to frequently change all passwords and to lengthen and vary them to include caps, numbers and characters, which I did not capture from any of the presenters, making memory immaterial." |
|
Nicole S"Hoped there was more focus on the law instead of best practices in cybersecurity, which I already know from my own IT department." |
|
Michael L"What a waste of time. I learned nothing from this CLE. The panel did a lot of banter and story telling. The listed items were not covered in a logical way that was useful for anyone's practice. The listed items from the CLE: Privacy obligations as it applies to legal practice New developments in the U.S. and Europe Key compliance elements for data protection Standard cybersecurity elements you must have in place Privacy policy (notice) teardown " |
|
John S"Very well versed in the subject matter and used interesting slide to add to the presentation" |
|
Mark H"speakers very knowledgeable and kept it moving " |
|
Karen D"Really fantastic faculty panel " |
|
John J"Knowledgeable panel. Entertaining. Learned a lot." |
|
Jeffrey S"There was some good information about data security and privacy issues to be aware of and recommended practices. Some of the material was fairly basic and not all the stories tied closely to the topic. All the presenters were very knowledgeable." |
|
Stephen M"Seemed most fitting, all things considered." |