CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◐ Insider Threat & DLP Mar 29, 2026

The Modern Insider Threat: Shadow IT, BYOD, and Trade Secrets - Seyfarth Shaw

Seyfarth Shaw Archived Mar 29, 2026 ✓ Full text saved

The Modern Insider Threat: Shadow IT, BYOD, and Trade Secrets Seyfarth Shaw

Full text archived locally
✦ AI Summary · Claude Sonnet


    WEBINAR RECORDING Feb 19, 2026 The Modern Insider Threat: Shadow IT, BYOD, and Trade Secrets Click to share this page Click for PDF Click to print this page Thursday, February 19, 2026 1:00 p.m. to 2:00 p.m. Eastern 12:00 p.m. to 1:00 p.m. Central 11:00 a.m. to 12:00 p.m. Mountain 10:00 a.m. to 11:00 a.m. Pacific About the Program Shadow IT and BYOD practices are not new - but the risks they pose to trade secrets have fundamentally changed. Remote and hybrid work, the explosion of collaboration tools, and the rapid adoption of generative AI have created an environment where employees routinely use personal devices, unsanctioned applications, and third-party platforms to get work done, often faster than policy can keep up. This webinar will explore how these realities create trade secret exposure, discovery blind spots, and privacy and compliance conflicts. The panel will address the intersection of shadow IT, BYOD, and AI tools; the discovery challenges that arise when business data lives outside corporate-controlled systems; and practical strategies for aligning Legal, HR, IT, and Security around a defensible governance framework. Key Topics: How shadow IT and BYOD create trade secret pressure points, including in light of advances in AI Discovery challenges: preservation, control, and access over data on personal devices and unsanctioned platforms Privacy, security, and information governance implications Technical controls and organizational strategies that work A practical roadmap for identifying high-risk roles and establishing approved tool frameworks This program is intended for general counsel, employment counsel, IP counsel, and HR professionals responsible for protecting trade secrets and confidential information in a modern work environment. Speakers Matthew Catalano, Partner, Seyfarth Shaw LLP Peter Tsai, Counsel, Seyfarth Shaw LLP Danny Riley, Associate, Seyfarth Shaw LLP If you have any questions, please contact Sela Sofferman at ssofferman@seyfarth.com and reference this event. Learn more about our Trade Secrets, Computer Fraud & Non-Competes practice.  To comply with State CLE Requirements, CLE forms requesting credit in IL or CA must be received before the end of the month in which the program took place. Credit will not be issued for forms received after such date. For all other jurisdictions forms must be submitted within 10 business days of the program taking place or we will not be able to process the request. Our live programming is accredited for CLE in CA, IL, and NY (for both newly admitted and experienced).  Credit will be applied as requested, but cannot be guaranteed for TX, NJ, GA, NC and WA. The following jurisdictions may accept reciprocal credit with our accredited states, and individuals can use the certificate they receive to gain CLE credit therein: AZ, AR, CT, HI and ME. For all other jurisdictions, a general certificate of attendance and the necessary materials will be issued that can be used for self-application. CLE decisions are made by each local board, and can take up to 12 weeks to process. If you have questions about jurisdictions, please email CLE@seyfarth.com. Please note that programming under 60 minutes of CLE content is not eligible for credit in GA. programs that are not open to the public are not eligible for credit in NC.
    💬 Team Notes
    Article Info
    Source
    Seyfarth Shaw
    Category
    ◐ Insider Threat & DLP
    Published
    Mar 29, 2026
    Archived
    Mar 29, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗