Archive for the 'Security' Category

You’ve received an alert that you have a critical vulnerability within your environment. Now what? Is relying on the alerted risk rating and score sufficient? In this podcast session, the speaker will discuss what needs to be done after the vulnerability has been identified to assist you in understanding the risk to your firm and ensuring the risks are dealt with appropriately and in accordance with your firms risk management strategy.

Moderator:
@David Whale - ​Director Information Security , Fasken Martineau Dumoulin LLP

Speaker:
Jon Rohrich - Cybersecurity Technical Architect, ‎Microsoft

Recorded on 5-17-2021

Read Full Post »

Without information, law firms wouldn’t exist. Information is front and center and critical to everything we do. As Law firms progress further down their digital road maps, it presents us with an opportunity to revisit our retention requirements and strategies to ensure they’re still relevant.

In this podcast session, the speaker will offer best practice recommendations for law firm data retention. Are we better to keep more or less? What must we keep and for how long? How do we get to a place where we’re only retain the minimal data footprint required?

Moderator:
@David Whale, Director Information Security , Fasken Martineau Dumoulin LLP

Speaker:
@John Churchill, Records Department Manager, Nelson Mullins

Recorded on 05-06-2021

Read Full Post »

In this podcast, Chuck Barth, who is a experienced senior leader of information governance in law firms, will speak about information governance in the legal industry. Join him to find out why security/compliance specialists will need information governance skills in the year to come and beyond!

Moderator: 
@Leigh Isaacs
CIGO, CIP, Director of Information Governance and Records Management, Proskauer

Speaker:
@Chuck Barth

Recorded on 2-15-2021​​

Read Full Post »

While law firms continue to push applications to the cloud, there are still a whole host of systems currently on-premise. With limited resources and staff, how can a firm ensure their on-premise applications are safe? In this podcast, experts will discuss the resources available to firms to ensure their external facing systems are secure, some common misconfigurations that can be easily corrected, and provide some best practices for continuous threat monitoring.

Moderator:
@David Whale, Information Security Manager, Fasken Martineau Dumoulin LLP

Speakers:
Brian Carey, Manager, Consulting Services, Rapid7
Jon David, Manager, Proactive Services, Mandiant Services

Recorded on 1-22-2021

Read Full Post »

Risk Assessments

Kenny, Brenda and Heath discuss risk and probability-based incident and business continuity roundtables. Topics range from the who, what and why of testing to scenario options, roundtable logistics and case study comparisons.

Speakers:
Brenda Ferraro - Senior Director of Networks, Prevalent
Kenny Leckie - Sr. Technology & Change Management Consultant
Heath Stanley - Director, Virtual Compliance

Read Full Post »

In 2018, the Sedona Conference released a commentary on Corporate Bring-Your-Own-Device (BYOD) for legal professionals, involving data management, ediscovery practices, policy development and employee protection considerations. The core components of this commentary are five principles that impact considerations for a BYOD program within a corporate organization.

As corporate organizations move into situations where BYOD is a business direction, it's important for legal professionals in these organizations to consider what a BYOD program consists of, how employee and organizational goals and protections are considered, and why ediscovery plays a role in the development of a BYOD program.

In this ILTA Radio installment, a panel of legal industry professionals discusses the Sedona Conference commentary's five principles, scenarios on how legal business dynamics are structured for a BYOD program, risks and what goes in to making a program work.

Panel:
Jack Thompson (Moderator) - Sr. Manager, eDiscovery & Legal Operations, Sanofi
Kemoy Foster - eDiscovery Manager, Swiss Re
Kim-An Hernandez - Senior Counsel for Information Technology + eDiscovery + Knowledge Management, International Paper
Bonnie Kennedy - eDiscovery Manager, Delta Air Lines

Recorded on 8-1-18

Read Full Post »

Introducing security awareness at a law firm can seem like an overwhelming task. In this ILTA Radio segment, we hold a conversation about practical steps for getting the job done.

Speakers:
Julia Montgomery is the architect of Traveling Coaches' award-winning OnGuard information security awareness program, which has helped over 85,000 law firm employees change their behavior to safeguard information. Julia leveraged her experience in law firms and as a Certified Change Management Professional to ensure the program's relevance for law firm audiences. Previously, she developed and led security awareness efforts in several law firms. Julia is a frequent speaker and author on topics including change management, effective communications and information security education programs.

Mark Olvey, the ISMS Manager at Taft Law, began his IT career as a trainer 18 years ago. During his legal career, he has also worked as a help-desk support technician and manager, DMS administrator, CRM administrator, docketing system administrator and printer manager. Mark was previously in the military, serving for 12 years overseas and stateside. He is ITIL and Microsoft certified, and is currently working on his ISO Fundamentals certification.

Read Full Post »

We discuss how physical security tends to be overlooked while we focus so much time and energy on the technology side of security. Keeping your firm’s people and assets safe can rely on good physical security planning and design.

Speakers:
Heath Stanley is the SVP of Information Security. He holds the CISA, CISSP and C|CISO certifications. Heath has managed technology governance consulting for Traveling Coaches Inc. since 2006. His previous experience includes residential lending and process improvement, and he is a subject matter expert in Information Security Governance and Vendor Management.

David Tremont.  With 32 years of experience in Networking and Security, Mr. Tremont started his career as a Cryptologist Technician in the U.S. Navy in 1974.  Responsible for intercepting and decrypting Chinese and Russian radio transmissions for Fleet Commanders. Mr. Tremont has consulted with many corporate entities as well as law firms in designing and testing networks on a global scale, ensuring security protocols and standards were key factors in their implementation.  He has also participated as a consultant in assisting public companies to ensure compliance in Sarbanes-Oxley, HIPPA and has been involved in achieving ISO 9000 and ISO 27000 certifications for Oil & Gas Service companies.
Currently Mr. Tremont serves on the Technology Committee and Security Committee for Bracewell LLP assisting Senior Management to ensure compliance in Cyber and Physical security initiatives and is responsible for the monitoring and incident response of day to day security and network operations for the firm. 

Recorded on 1-26-17

Read Full Post »

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with Jon Washburn, National Manager of Technical Operations at Stoel Rives LLP.

Read Full Post »

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with Butch Spencer, Network Engineer at Jackson Kelly PLLC.

Read Full Post »

Podbean App

Play this podcast on Podbean App