CLLA's 2022

WESTERN REGION CONFERENCE

September | 15-16

RegisterDownload Guide

CLLA's 2022

WESTERN REGION CONFERENCE
RegisterDownload Guide

Thursday, September 15

Smoke House • 4420 Lakeside Drive • Burbank, CA 91505

}

5:00 p.m. – 6:00 p.m.

Western Region Executive Council Meeting

(Open to all CLLA Members)

}

6:00 p.m. – 8:30 p.m.

Optional Group Dinner

(Additional charge of $65 per person which includes a 3 course meal and non-alcoholic beverages. Pre-registration is required.)

LOCATION
Smoke House • 4420 Lakeside Drive • Burbank, CA 91505

}

8:30 p.m.

Mix and Mingle (Cash Bar)

Thursday, September 15

Smoke House • 4420 Lakeside Drive • Burbank, CA 91505

5:00 P.M. – 6:00 P.M.

Western Region Executive Council Meeting

(Open to all CLLA Members)

6:00 P.M. – 8:30 P.M.

Optional Group Dinner

(Additional charge of $65 per person which includes a 3 course meal and non-alcoholic beverages. Pre-registration is required.)

LOCATION
Smoke House • 4420 Lakeside Drive • Burbank, CA 91505

8:30 P.M.

Mix and Mingle (Cash Bar)

Friday, September 16

Hilton Los Angeles/Universal City  •  555 Universal Hollywood Drive • Universal City, CA 91608 • (818) 506-2500

}

8:00 a.m. – 9:00 a.m.

Networking & Breakfast (Club Room)

}

9:00 a.m. – 10:00 a.m.

Who Bears Risk of Loss When Hacked

  

SPEAKERS
Ted Hamilton, Wetherington Hamilton, Tampa, FL
Lorna Walker, Law Offices of Sweet & Walker, PC, San Francisco, CA

Businesses are facing increased cybersecurity risks of having their business systems compromised, including their email systems.  Business email compromises can be one of the most financially damaging to businesses and is one of the fastest growing types of business fraud.  It costs business over $2 billion alone in 2020.  When this occurs, the businesses then have to work out who is responsible for the loss:   Is it the creditor who is due the payment or the debtor who remitted payment to a fraudster?

This program will review different types of business email compromise and discuss the legal liability for any resulting loss.  It will review applicable legal principles and examine the latest case law addressing the issue.  It also will present ways to minimize or avoid these types of losses.

}

10:00 a.m. – 10:15 a.m.

Networking Break

}

10:15 a.m. – 11:15 a.m.

Digital Integrity, Peace of Mind

   

SPEAKER:
Edward Baker, Buzz Cybersecurity, Costa Mesa, CA

Learn about the Cybersecurity industry and how business owners, executives and leaders should approach Cybersecurity in their job role. You will get advice on how to protect your business and sensitive data. Learn about modern cyber-attacks and become aware of the tactics that hackers use to steal valuable company information.

}

11:15 a.m. – 11:30 a.m.

Networking Break

}

11:30 a.m. – 12:30 p.m.

Money to Judgments – Recognition and Enforcement of Foreign Judgments

 

SPEAKERS
John Carter,
The Law Offices of Gary A. Bemis, Riverside, CA
Tim Grimes, BARR Credit Services, Tucson, AZ
Ben Kelly, The Law Offices of Benjamin E. Kelly, PS, Seattle, WA

Ever wondered what hurdles await when trying to enforce a foreign judgment?  This session is for you.  We will discuss enforcement of judgments between states and between countries, touching on the Uniform Enforcement of Foreign Judgments Act and related case law, as well as potential service and notice issues.  What do attorneys need and how can agencies help and create efficiencies?

}

12:45 p.m. – 1:45 p.m.

Lunch (Orchid Room)

}

1:45 p.m. – 2:45 p.m.

Asset Investigations in A Nutshell

  

SPEAKERS
Scott Herring,
S.W. Herring International Private Investigations, Rancho Santa Margarita, CA
Lynda Bergh Herring, S.W. Herring International Private Investigations, Rancho Santa Margarita, CA

The presentation will discuss the intricacies of asset investigations, including the location of real property, business entity affiliations, litigation history, and other useful information attorneys may use when determining if filing a lawsuit is worthwhile, or to collect judgments.

}

2:45 p.m. – 3:00 p.m.

Networking Break

}

3:00 p.m. – 4:00 p.m.

Whose Recording Me Now? The California Invasion of Privacy Act

 

SPEAKERS
June Coleman,
Messer Strickler, Ltd., Sacramento, CA

Do you record phone calls? Do you like the idea of having proof of what was said during a telephone call? This session will discuss California’s recording laws and how they impact you. Does the California recording laws apply to consumer, businesses, your mom? You will learn about one-party and two-party consent, as well as how consent can be obtained. You will also learn about whether consent is needed if one person is in California and the other person is outside of California. And you will learn about the exposure you face if you violate California’s recording laws.

}

4:30 p.m. – 5:30 p.m.

Post Conference Social (Club Patio)

}

6:00 p.m.

Dinner on your own

Friday, September 16

Hilton Los Angeles/Universal City  •  555 Universal Hollywood Drive • Universal City, CA 91608 • (818) 506-2500

8:00 A.M. – 9:00 A.M.

Networking & Breakfast (Club Room)

9:00 A.M. – 10:00 A.M.

Who Bears Risk of Loss When Hacked

  

SPEAKERS
Ted Hamilton, Wetherington Hamilton, Tampa, FL
Lorna Walker, Law Offices of Sweet & Walker, PC, San Francisco, CA

Businesses are facing increased cybersecurity risks of having their business systems compromised, including their email systems.  Business email compromises can be one of the most financially damaging to businesses and is one of the fastest growing types of business fraud.  It costs business over $2 billion alone in 2020.  When this occurs, the businesses then have to work out who is responsible for the loss:   Is it the creditor who is due the payment or the debtor who remitted payment to a fraudster?

This program will review different types of business email compromise and discuss the legal liability for any resulting loss.  It will review applicable legal principles and examine the latest case law addressing the issue.  It also will present ways to minimize or avoid these types of losses.

10:00 A.M. – 10:15 A.M.

Networking Break

10:15 A.M.– 11:15 A.M.

Digital Integrity, Peace of Mind

 

SPEAKER:
Edward Baker, Buzz Cybersecurity, Costa Mesa, CA

Learn about the Cybersecurity industry and how business owners, executives and leaders should approach Cybersecurity in their job role. You will get advice on how to protect your business and sensitive data. Learn about modern cyber-attacks and become aware of the tactics that hackers use to steal valuable company information.

11:15 A.M. – 11:30 A.M.

Networking Break

11:30 A.M. – 12:30 P.M.

Money to Judgments – Recognition and Enforcement of Foreign Judgments

 

SPEAKERS
John Carter,
The Law Offices of Gary A. Bemis, Riverside, CA
Tim Grimes, BARR Credit Services, Tucson, AZ
Ben Kelly, The Law Offices of Benjamin E. Kelly, PS, Seattle, WA

Ever wondered what hurdles await when trying to enforce a foreign judgment?  This session is for you.  We will discuss enforcement of judgments between states and between countries, touching on the Uniform Enforcement of Foreign Judgments Act and related case law, as well as potential service and notice issues.  What do attorneys need and how can agencies help and create efficiencies?

12:45 P.M. – 1:45 P.M.

Lunch (Orchid Room)

1:45 P.M. – 2:45 P.M.

Asset Investigations in A Nutshell

 

SPEAKERS
Scott Herring,
S.W. Herring International Private Investigations, Rancho Santa Margarita, CA
Lynda Bergh Herring, S.W. Herring International Private Investigations, Rancho Santa Margarita, CA

The presentation will discuss the intricacies of asset investigations, including the location of real property, business entity affiliations, litigation history, and other useful information attorneys may use when determining if filing a lawsuit is worthwhile, or to collect judgments.

2:45 P.M. – 3:00 P.M.

Networking Break

3:00 P.M. – 4:00 P.M.

Whose Recording Me Now? The California Invasion of Privacy Act

 

SPEAKERS
June Coleman,
Messer Strickler, Ltd., Sacramento, CA

Do you record phone calls? Do you like the idea of having proof of what was said during a telephone call? This session will discuss California’s recording laws and how they impact you. Does the California recording laws apply to consumer, businesses, your mom? You will learn about one-party and two-party consent, as well as how consent can be obtained. You will also learn about whether consent is needed if one person is in California and the other person is outside of California. And you will learn about the exposure you face if you violate California’s recording laws.

4:30 P.M. – 5:30 P.M.

Post Conference Social (Club Patio)

6:00 P.M.

Dinner on your own