Archive for the 'IT Operations' Category

Technology is vital to the practice of law in any modern law firm, but it can also be challenging to implement and keep updated. In this podcast, we’ll explore some of the greatest challenges to the modern law firm, explore why technology is so vital for the continued success of firms, and explore how they’re coping with technology challenges today. Listen for tips to lead your law firm through today’s legal technology challenges!

Question John asked Jeff:
1. What do you see as the greatest technology challenges facing law firms today?
2. Why is technology so important to law firms and are they overall keeping up with technology or falling behind the curve?
3. How can they improve?
4. What are three key components to successfully navigating today’s legal technology challenges
5. Are there non-technology challenges for technology impacting firms today, and can you give us some examples (e.g., senior management support, culture change, adoption, etc.) of the impact these challenges may be having?

Moderator:
@John Graves - Training Support Specialist, Winstead PC

​Speaker:
@Jeffrey Brandt - Chief Information Officer, Jackson Kelly PLLC

Recorded on 09-30-2022​


Read Full Post »


Read Full Post »

The majority of breaches today no longer come through delivered malware as our systems have become very strong with detecting and blocking these resulting in more effort than value for the attacker. Instead, it’s easier, faster and more economical to just try and steal your password, or better yet have you provide it yourself. This podcast takes a look at the security risks that are actually derived from one of our more important security controls… passwords; and look at what we can do to minimize those risks moving forward.

Questions Dave will ask the speakers:

  1. A recent study by Verizon found that more than 80 percent of breaches through hacking involve brute force or the use of lost or stolen credentials. Microsoft estimates that there are 921 password attacks per second. We’ve been educated for years by the security industry and our awareness programs that passwords are the most crucial component to protecting our environments and our information. How is it that this sacred key to our kingdom is actually resulting in opening so many doors for attackers?
  2. NIST has taken steps to try and reduce the bleeding with their new Password guidelines and best practices which encourage passphrases of more characters, less complexity and less changes. Are these steps in the right direction to actually keeping us secure?
  3. Many security tools are now providing artificial intelligence around login requests that look to see if the member is coming from a known device and location prior to providing access. Would implementing these types of risk based controls with MFA and a passphrase by the answer to our problems?
  4. Biometrics for authentication always seemed to be the next logical step for passwords. We have our basic biometrics on devices however, those are all back supported by a password or PIN. Will we ever get to a place where we’re truly only using biometrics for all authentication?
  5. I understand that Apple, Google and Microsoft are working on a solution together that will get rid of passwords. Instead, they will just leverage the biometrics on your phone as your access code to everything. With this in mind do we just need to sit tight and all our troubles will soon be fixed?

Moderator:
@David Whale - Director Information Security, Fasken Martineau Dumoulin LLP

Speakers:
Sohail Iqbal -
 CISO, Veracode
Eldon Sprickerhoff - Founder and Chief Innovation Officer, eSentire
Phillip Solakov - Director, Client Solutions, Optiv, Inc.

Recorded on 09-09-2022​


Read Full Post »

Outside counsel guidelines (OCG) are becoming more sophisticated and, at times, cumbersome. What are the provision pitfalls to avoid? What tools are available to manage the volume of OCGs across the firm and to help ensure compliance? Is there room for negotiation with clients? Join us for an open discussion with the GC community regarding the risks associated with not properly vetting and monitoring OCGs.

Questions Daniel will ask speaker:
· What difficulties are you seeing firms have in dealing with Outside Counsel Guidelines?
· What tools are available to assist with management of the guidelines?
· Do you see the need for changes in workflows related to the guidelines?

Moderator:
@Daniel Wood - Director of Counsel Assistance, Womble Bond Dickinson

Speaker:
@Brynmor Bowen  - Practice Group Leader, Legal Risk, IntApp

 

Recorded on 07-25-2022

​​


Read Full Post »

In the previous parts of this series, we discussed the what's and why's of eSignatures and some of the practical uses. In part three of this series, we will discuss the technical requirements, security, hidden costs, and other concerns that should be explored when looking to acquire and implement an eSignature solution.

Questions that Jack/Alisher will ask Patrick and Aaron:
1. Why should an organization adopt an eSignature provider?
2. What are the differences between most eSignature solutions?
3. What are the most important requirements an organization should consider when choosing an eSignature Solution?
4. Can we be specific on what security requirements should be considered and addressed?
5. Are there any hidden costs that may be missed when preparing to deploy or post deployment that can arise?

Co-Moderators:
@Jack Recinto - Senior Applications Director, Vedder Price P.C.
@Alisher Yuldashev - Business Technology Advisory Manager, Borden Ladner Gervais

Speakers:
P​​atrick Albert - Senior Business Architect, OneSpan
Aaron Davis - Director of Product Marketing, OneSpan


Read Full Post »

New technology, changing client expectations, regulatory changes, and more are transforming the legal industry, creating opportunities for individuals to develop new skillsets and for firms and legal departments to rethink how they deliver legal services.

In this podcast interview, learn about new and evolving roles in the legal industry, such as process engineer, project manager, legal operations, data scientist, and document automation specialist.

Questions Sam will ask Speakers:

  1. What are some of the key roles you see emerging in legal technology?
  2. How can individuals skill up to transition into new opportunities?
  3. How can firms and legal departments start shifting to new roles, and what should they be doing to ensure that these new functions are successful?
  4. Where would you suggest people go to learn more information?

Moderator:
@Samantha Sendrowski - Technology Innovation Manager, Bowditch & Dewey LLP

Speakers:
@Gabe Teninbaum -  Assistant Dean of Innovation, Strategic Initiatives, & Distance Education and Professor of Legal Writing, Suffolk University
@Sean Monahan -  Director, HBR Consulting

Recorded on 06-29-2022


Read Full Post »

This podcast interview session will take a look into our mobile devices (super computers in our pocket) and the built in (or lack there of) security around them.

Can we rely on our devices out of box as long as they’re managed or has the time come where we need to take mobile security to the next level?

Questions that David will ask speaker:

1. Mobile devices are essentially a smaller version of a computer that can fit in your pocket. They’re on us and in use almost all the time. Confidential information flows to, from and through them, yet we don’t seem to secure them to the same level as a computer. Is that because they’re just secure out of the box? Or are we missing something?
2. What types of threats and attacks should we be concerned about with our mobile devices?
3. A lot of organizations may say we use MDM (mobile device management) to secure our mobile fleet of devices. Is an MDM sufficient?
4. If out of the box security and usage of an MDM is not quite enough, what addition protections should we be looking at?
5. How should different usage patterns and user interfaces of mobile devices factor into an organization's model of the mobile security threat and mobile security solutions?
6.Obviously budgets and staff have an influence on just how much security you can deploy and manage. What would be the top 3 items that all businesses and mobile users should put into place to help protect their mobile devices?

Moderator: 
@David Whale - 
Director Information Security, Fasken Martineau Dumoulin LLP

Speaker:
@Seth Hallem - CEO & Chief Architect, Mobile Helix 

 

Recorded on 06-17-2022

​​


Read Full Post »

Now that Sentiment Analysis has gone live within RelativityOne, Relativity has gotten feedback of how clients are using this form of analytics. This podcast session will detail real world examples of how sentiment analysis has added to successful review.

The AI-powered Sentiment Analysis feature is now in Advanced Access and will be available to RelativityOne users later this year. Sentiment Analysis will allow users to identify positive and negative sentiment in their data. The analysis is conducted on a sentence-by-sentence basis so that even if negative sentiment is buried within a longer conversation, users will not miss that key information.

Moderator:
@Andrea Shirey - IT Consultant, Bayer Corporation Legal Department 

Speaker:
Dilan Dubey - Product Manager, Relativity

Recorded on 06-16-2022

Read Full Post »

If we have learned one thing from the pandemic, it’s the fact that we can’t always meet in person but we can continue business.

In this podcast, the speakers will discuss ways that eSignatures, remote online notaries and virtual rooms can eliminate the need to travel to an in person Notary.

Questions the Co-Moderators will ask Speakers:
○ Could you please tell our listeners a little about yourselves? Aaron, let's start with you.
○ If you both could briefly chime in as to what e-signatures are and what you can accomplish with them, that would be a great place to start.
○ Can you explain for our listeners, how Notaries worked pre-pandemic?
○ With the ongoing digital transformation, eSignatures became very popular in the last 2 years. More eSignature vendors offer unique features to digitize traditional workflows in different industries. We know you are familiar with online notarization and Virtual Rooms. Can you tell us more about Remote Online Notarization and Virtual Rooms? What are those and how can they help busy attorneys?

Co-Moderators:
@Jack Recinto - Senior Applications Director, Vedder Price P.C.
@Alisher Yuldashev - ​ Business Technology Advisory Manager, Borden Ladner Gervais

​Speakers:
-Aaron Davis - Director, Product Marketing, OneSpan
-​Raquel Lima - Product Manager, OneSpan 

Recorded on 04-17-2022

Read Full Post »

This session will review the different opportunities to make data-driven decisions in law firms and the challenges that go with them. Ideally the session, will differentiate between organizational/enterprise applications and client facing/legal advice applications.

The goal is to map when data-driven decision-making is a good idea and when it is not. Further the session, will explore what to look for in terms of actions taken from data alone (bias, available data) and give tips how to get started and where to find structured data within your organization/firm to get started for a quick win.

Moderator:
@Christiane Matuch - Manager, Axiom Consulting Partners

Speaker:
Maggie Miller - ​Chief Client Officer, Orgaimi

Recorded on 03-29-2022


Read Full Post »

Podbean App

Play this podcast on Podbean App