Defining “Reasonable Security” Standards: Understanding Current Cybersecurity Threats, Data Transfers Rules, and AI Compliance with Data Privacy Laws

John D. Flory III
Maeve Malik
Dhara Shah
Julia B. Jacobson
John D. Flory III | Harbor Networks & HarborShield Cybersecurity
Maeve Malik | Hunton Andrews Kurth LLP
Dhara Shah | InfoLawGroup LLP
Julia B. Jacobson | Squire Patton Boggs

Live Video-Broadcast: August 28, 2025

4 hour CLE

Tuition: $195.00
Subscribe to Federal Bar Association CLE Pass...
Co-Sponsored by myLawCLE
Get this course, plus over 1,000+ of live webinars.
Learn More
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

Session I - Managing Risks in Today’s Cybersecurity Landscape – Maeve Malik

Cyber-attacks are ubiquitous, and they have become increasingly destructive to companies that experience them. Join us for a session on the latest developments in cybersecurity. This session will address the latest cyber exploits and threat actors, and will cover the threat landscape, current U.S. cybersecurity legal landscape and emerging trends. We will also share recommendations on incident preparation and remediation.

Key topics to be discussed:

  • Examine the current cybersecurity threat environment
  • Trends in the cybersecurity landscape
  • Learn best practices for data breaches
  • Notification obligations and regulatory reporting timelines
  • Prepare for the inevitable by taking proactive steps to minimize risks

Session II - Cybersecurity Expert: What Reasonable Security Looks Like and Why Breaches Still Happen – John Flory

As data breaches continue to escalate in frequency and complexity, the legal concept of “reasonable security” has become a central issue in litigation, regulatory enforcement, and professional responsibility. Attorneys are increasingly expected to understand not only the legal definitions of cybersecurity standards, but also the real-world practices that determine whether those standards are met. This session will provide a comprehensive analysis of what constitutes reasonable security in today’s digital landscape, and why even organizations with established security programs often fall short. The discussion will explore how courts and regulators assess adequacy, the common procedural and technical pitfalls that lead to breaches, and the legal risks that follow. Attendees will also learn how to evaluate cybersecurity protocols in transactions, vendor agreements, and client advisory contexts. By understanding both the failures and the evolving legal expectations, attorneys will be better equipped to mitigate exposure, advise clients, and respond effectively when incidents occur.

Key topics to be discussed:

  • Defining “reasonable security” standards
  • Common causes of data breaches despite security programs
  • Cyber risk assessment in transactions and vendor management

Session III - The Sensitive Bulk Data Transfer Rules – Julia Jacobson

On January 8, 2025, the U.S. Department of Justice released a rule tiled “Preventing Access to U.S. Sensitive Personal Data and Government Related Data by Countries or Concern or Covered Persons” (the DOJ Rule) as directed under President Biden’s Executive Order 14117 (EO 14117) dated February 28, 2024. EO 14117 and the DOJ Rule are intended to restrict access by so-called countries of concern to certain sensitive personal data about U.S. persons and U.S. government-related data when access is deemed to poses an unacceptable risk to the national security of the United States, such as data that could be used to surveil, scam, blackmail and support counterintelligence efforts or exploited by artificial intelligence (AI).

Most of the DOJ Rule went into effect on April 8, 2025, but, on April 11, 2025, the DOJ granted a grace period for compliance with the parts of the DOJ Rule that ended on July 8, 2025. U.S. businesses have until October 6, 2025, to develop and implement a data compliance program and procedures for audits and reporting. Meanwhile, the U.S. state privacy law landscape continues to develop, presenting additional and sometimes related compliance challenges.

Key topics to be discussed:

  • Determining when data and a data transaction are in scope for the DOJ Rule
  • Evaluating covered data transactions as prohibited or restricted
  • Assessing vendors and vendor contracts for covered data transactions
  • How the DOJ Rule relates to state consumer privacy laws and data broker laws as well as the Protecting Americans’ Data from Foreign Adversaries Act
  • Assessing and uplifting current compliance policies and procedures to meet the October 6th deadline

Session IV – Legal Compliance and Enforcement Trends at the Intersection of AI & Data Privacy – Dhara Shah

This session demystifies how today’s AI laws collide with data privacy laws, and what that means for compliance teams on the front line. We’ll scan the key AI and privacy laws and spotlight the “gotchas” regulators keep citing. Including discussing real-world enforcement actions, illustrating how privacy and consumer protection doctrines are being repurposed for AI.

Key topics to be discussed:

  • Intersection of data privacy and AI governance
  • Enforcement hotspots
  • Key compliance steps

This course is co-sponsored with myLawCLE.

Date / Time: August 28, 2025

  • 12:00 pm – 4:30 pm Eastern
  • 11:00 am – 3:30 pm Central
  • 10:00 am – 2:30 pm Mountain
  • 9:00 am – 1:30 pm Pacific

Closed-captioning available

Speakers

John D. Flory_FedBarJohn D. Flory III | Harbor Networks & HarborShield Cybersecurity

John D. Flory III is a recognized Cybersecurity expert with over 25 years in the security field. His hands on experience dealing with real time cybersecurity attacks and remediation offers a valuable resource to organizations’ cyber preparation. John’s leading-edge approach has allowed him to combat cybercrime. His dedication to this cause has led to numerous successful operations, including assisting in the apprehension and extradition of cybercriminals and criminal gangs involved in a wide range of illegal activities, including identity theft, cyber fraud, and ransomware attacks. John’s ability to work collaboratively with law enforcement agencies around the globe has been instrumental in bringing these criminals to justice and ensuring that they are held accountable for their actions. Collaborative efforts have not only resulted in the arrest of these criminals but also in the payment of restitution, which has helped to provide some relief to the victims of these illegal activities.

John has been highlighted in multiple publications as a knowledge leader and cybersecurity expert, including Cybersecurity Magazine, Cyber Protection Magazine, and many other industry leading outlets. Featured as a keynote, John has spoken at numerous conferences including, The Symantec Global Conference, NY Bankers Conference, The Department of Homeland Security Forum, NY State Bar Association, The Emergency Preparedness Conference, and many other diverse venues.

John is a proven business leader with an unprecedented history of building effective and overachieving teams. John is a former Partner at TAG Solutions as well as the Co-Founder of Cyberstone Security. He currently serves as the Chief Information Security Officer at Harbor Networks and is the creator of HarborShield Cybersecurity.

 

Maeve Malik | Hunton Andrews Kurth LLP

Maeve’s practice focuses on privacy and cybersecurity law. Maeve regularly advises clients across various industry sectors on developing or enhancing existing global privacy compliance and records management programs to help manage privacy risks. She also has extensive experience advising clients on cybersecurity incident response, including for several large-scale, high-profile cybersecurity incidents. In addition, Maeve regularly assists clients with proactive cyber incident readiness activities, such as tabletop exercises and incident response procedures.

Maeve is a co-chair of the firm’s veteran’s pro bono program and serves on the pro bono committee of Hunton Andrews Kurth’s New York office. Her active pro bono practice includes providing legal services to veterans, focusing on recovering disability benefits for physical and mental conditions incurred in military service. In addition, Maeve has represented undocumented children in immigration court matters, and has volunteered with the New York City Bar Justice Center’s Legal Clinic for the Homeless, advocating for clients facing denials and reductions of public benefits.

 

Dhara Shah_FedBarDhara Shah | InfoLawGroup LLP

Dhara joined InfoLawGroup in 2022 from Sheppard Mullin LLP’s data privacy team. Dhara focuses her practice on data privacy and emerging technology law, with an emphasis on comprehensive data privacy laws and AI, including state-specific laws and international laws including the EU AI Act and the GDPR. Dhara’s proficiency with a wide range of programming languages allows her to engage with clients’ in-house legal and operational teams to identify and handle the legal aspects of highly technical issues – while simultaneously meeting business objectives and protecting consumer privacy interests. She is the lead of the International Association of Privacy Professionals (“IAPP”) AI Governance Affinity Group, a working group member of the EU AI Act Code of Practice, and is a certified Artificial Intelligence Governance Professional (AIGP). She also publishes a daily column, AI Governance, which you can find here: https://www.linkedin.com/newsletters/7293773682009640960/.

 

Julia B. Jacobson_Squire Patton Boggs_FedBarJulia B. Jacobson | Squire Patton Boggs

Julia B. Jacobson is a partner in the Data Privacy, Cybersecurity & Digital Assets Practice. Julia offers practical and tactical counsel on privacy and cybersecurity compliance strategies, data breach response, technology transactions and marketing initiatives for national and multinational organizations.

A significant portion of Julia’s practice is devoted to advising clients on an array of privacy, cybersecurity, data breach and data governance matters. She assists clients with the design and development of privacy-sensitive policies for the collection and use of personal data. Julia regularly advises businesses on the privacy and cybersecurity aspects of environmental, social and governance (ESG) programs, ethical data use, machine learning and artificial intelligence, vendor contracting and management and business sales, combinations and acquisitions. She has helped her clients design, develop and implement compliance programs to meet the challenges of the evolving privacy and cybersecurity law landscape, including the California Consumer Privacy Act and other US state privacy and cybersecurity laws, the EU’s General Data Protection Regulation, the UK Data Protection Act 2018, cross-border personal data transfers and New York Department of Financial Services Cybersecurity Regulations, as well as to align with industry standards, including the National Institute of Standards and Technology (NIST) cybersecurity and privacy frameworks, and ESG standards and frameworks. Julia also serves as the data breach coach for several national and international clients.

Julia helps clients maximize the value of their strategic relationships by drafting and negotiating a wide range of commercial contracts, particularly technology-centric agreements and the deployment of machine learning and artificial intelligence. For both product and service providers and users, she structures and negotiates contracts and develops customized template agreements and tools for vendor screening and assessments.

Julia’s practice spans a wide array of issues associated with consumer marketing and promotional campaigns. She is skilled at establishing effective compliance programs and regularly counsels clients on the risks surrounding mobile marketing and text messaging, email marketing and telemarketing, social media, and sweepstakes and contests. Her work also includes helping clients navigate the digital advertising ecosystem and deploy emerging technologies. Increasingly, her practice focuses on supporting clients in designing data practices that consider stakeholder expectations and data ethics. On behalf of brands, agencies and marketing technology providers, she routinely structures and negotiates co-branding, sponsorships, and commercial co-venture and other agreements associated with the marketing and promotion of products and services.

Agenda

Session I – Managing Risks in Today’s Cybersecurity Landscape | 12:00pm – 1:00pm

  • Examine the current cybersecurity threat environment
  • Trends in the cybersecurity landscape
  • Learn best practices for data breaches
  • Notification obligations and regulatory reporting timelines
  • Prepare for the inevitable by taking proactive steps to minimize risks

Break | 1:00pm – 1:10pm

Session II – Cybersecurity Expert: What Reasonable Security Looks Like and Why Breaches Still Happen | 1:10pm – 2:10pm

  • Defining “reasonable security” standards
  • Common causes of data breaches despite security programs
  • Cyber risk assessment in transactions and vendor management

Break | 2:10pm – 2:20pm

Session III – The Sensitive Bulk Data Transfer Rules | 2:20pm – 3:20pm

  • Determining when data and a data transaction are in scope for the DOJ Rule
  • Evaluating covered data transactions as prohibited or restricted
  • Assessing vendors and vendor contracts for covered data transactions
  • Assessing and uplifting current compliance policies and procedures to meet the October 6th deadline

Break | 3:20pm – 3:30pm

Session IV – Legal Compliance and Enforcement Trends at the Intersection of AI & Data Privacy | 3:30pm – 4:30pm

  • Intersection of data privacy and AI governance
  • Enforcement hotspots
  • Key compliance steps

Credits

Alaska

Approved for CLE Credits
4 General

Our programs are CLE-eligible through Alaska’s recognition of multi-jurisdictional reciprocity.
Alabama

Pending CLE Approval
4 General

Arkansas

Approved for CLE Credits
4 General

Arizona

Approved for CLE Credits
4 General

California

Approved for CLE Credits
4 General

Colorado

Pending CLE Approval
4 General

Connecticut

Approved for CLE Credits
4 General

District of Columbia

No MCLE Required
4 CLE Hour(s)

Delaware

Pending CLE Approval
4 General

Florida

Approved via Attorney Submission
5 General Hours

Receive CLE credit in Florida via attorney submission.
Georgia

Pending CLE Approval
4 General

Hawaii

Approved for CLE Credits
4.8 General

Iowa

Pending CLE Approval
4 General

Idaho

Pending CLE Approval
4 General

Illinois

Pending CLE Approval
4 General

Indiana

Pending CLE Approval
4 General

Kansas

Pending CLE Approval
4 Substantive

Kentucky

Pending CLE Approval
4 General

Louisiana

Pending CLE Approval
4 General

Massachusetts

No MCLE Required
4 CLE Hour(s)

Maryland

No MCLE Required
4 CLE Hour(s)

Maine

Pending CLE Approval
4 General

Michigan

No MCLE Required
4 CLE Hour(s)

Minnesota

Pending CLE Approval
4 General

Missouri

Approved for CLE Credits
4.8 General

Mississippi

Pending CLE Approval
4 General

Montana

Pending CLE Approval
4 General

North Carolina

Pending CLE Approval
4 General

North Dakota

Approved for CLE Credits
4 General

Our programs are CLE-eligible through North Dakota’s recognition of multi-jurisdictional reciprocity. Section 1, Policy 1.14
Nebraska

Pending CLE Approval
4 General

myLawCLE reports attendance to Nebraska on each attorney’s behalf for all programs. Please do not self-report.
New Hampshire

Approved for CLE Credits
240 General minutes

As of July 1, 2014, the NHMCLE Board no longer provides pre- or post-approval of courses. Attendees must self-determine whether a program is eligible for credit, and self-report their attendance online at www.nhbar.org, based on qualification provisions of Rule 53.
New Jersey

Approved for CLE Credits
4.8 General

Our programs are CLE-eligible through New Jersey’s recognition of multi-jurisdictional reciprocity, except for the courses required under BCLE Reg. 201:2
New Mexico

Approved for CLE Credits
4 General

Nevada

Pending CLE Approval
4 General

New York

Approved for CLE Credits
4.8 General

Our programs are CLE-eligible through New York’s Approved Jurisdiction Group “B”.
Ohio

Pending CLE Approval
4 General

Oklahoma

Pending CLE Approval
5 General

Oregon

Pending CLE Approval
4 General

Pennsylvania

Approved for CLE Credits
4 General

Rhode Island

Pending CLE Approval
5 General

South Carolina

Pending CLE Approval
4 General

South Dakota

No MCLE Required
4 CLE Hour(s)

Tennessee

Pending CLE Approval
4 General

Texas

Approved for CLE Credits
4 General

Utah

Pending CLE Approval
4 General

Virginia

Not Eligible
4 General Hours

Vermont

Approved for CLE Credits
4 General

Washington

Approved via Attorney Submission
4 Law & Legal Hours

Receive CLE credit in Washington via attorney submission.
Wisconsin

Pending CLE Approval
4.8 General

West Virginia

Pending CLE Approval
4.8 General

Wyoming

Pending CLE Approval
4 General

More CLE Webinars
Upcoming CLE Webinars
Sketching Legacies: A guide to drafting wills and trusts
Sketching Legacies: A guide to drafting wills and trusts Thu, July 17, 2025
On-Demand
Live Replay
Single Member LLCs: Avoiding Risks and Seizing Opportunities
Single Member LLCs: Avoiding Risks and Seizing Opportunities Thu, July 17, 2025
On-Demand
Live Replay
PTSD 101: What attorneys should know (2024 Edition)
PTSD 101: What attorneys should know (2024 Edition) Fri, July 18, 2025
On-Demand
Live Replay
Microsoft Excel for Lawyers (2024 Edition)
Microsoft Excel for Lawyers (2024 Edition) Tue, July 22, 2025
On-Demand
Live Replay
Obtaining and Using Social Media Evidence (2025 Edition)
Obtaining and Using Social Media Evidence (2025 Edition) Mon, July 28, 2025
On-Demand
Live Replay