Archive for the 'Security' Category

This podcast interview session will take a look into our mobile devices (super computers in our pocket) and the built in (or lack there of) security around them.

Can we rely on our devices out of box as long as they’re managed or has the time come where we need to take mobile security to the next level?

Questions that David will ask speaker:

1. Mobile devices are essentially a smaller version of a computer that can fit in your pocket. They’re on us and in use almost all the time. Confidential information flows to, from and through them, yet we don’t seem to secure them to the same level as a computer. Is that because they’re just secure out of the box? Or are we missing something?
2. What types of threats and attacks should we be concerned about with our mobile devices?
3. A lot of organizations may say we use MDM (mobile device management) to secure our mobile fleet of devices. Is an MDM sufficient?
4. If out of the box security and usage of an MDM is not quite enough, what addition protections should we be looking at?
5. How should different usage patterns and user interfaces of mobile devices factor into an organization's model of the mobile security threat and mobile security solutions?
6.Obviously budgets and staff have an influence on just how much security you can deploy and manage. What would be the top 3 items that all businesses and mobile users should put into place to help protect their mobile devices?

@David Whale - 
Director Information Security, Fasken Martineau Dumoulin LLP

@Seth Hallem - CEO & Chief Architect, Mobile Helix 


Recorded on 06-17-2022


Read Full Post »

Information Governance…we hear this term all the time in legal, but what does it really mean? Is it referring to controlling the stream of information inside a law firm or law department, or outside one? And what methods are being utilized in today’s law firms and law departments to govern this often critical information?

In this interview session, we will discuss what the term actually means and what effects it can have on firm attorneys and staff. Finally, we’ll learn why having an IG policy is so vital to clients and firms alike.


@John Graves - Training Support Specialist, Winstead PC

@Jeffrey Sharer - President and CEO, LexShift 

Recorded on 04-01-2022

Read Full Post »

Microsoft’s M365 solution includes a growing and evolving number of security solutions. These include MFA, Exchange On-Line Protection, Advanced Threat Protection and others, some new, some improved.

This podcast will be an overview of the solutions in M365 today, solutions that are either baked in to our existing M365 licenses at no additional cost or available at a nominal cost, that offer the possibility to retire and displace more expensive 3rd party solutions.

@Mark Manoukian - IT Director, Kegler, Brown, Hill & Ritter

Paul Edlund - Chief Technologist - Midwest, Microsoft

Recorded on 03-04-2022

Read Full Post »

This podcast session will delve into the very real problem of trying to explain data governance to end users and the C-suite. Our experts will tackle the difference between data governance and information governance, the importance of a good data governance program, how to best distribute the responsibility of data governance, and how to keep data fresh, clean, and reliable as we continue to take in more and more.

Questions Chris will ask speaker(s):
1. Information Governance and Data Governance may often be used interchangeably, help our listeners understand what the key differences are and why it is important to differentiate them.
2. What should the objective of a data governance program be?
3. Data governance seems very intimidating if you look at it as one persons job. How can information governance and data governance professionals go about engaging the enterprise in good data governance practices?
4. How can IG professionals best make a business case for a data governance program in order to secure resources?
5. What are some real practical strategies for ensuring the cleanliness and reliability of data in an organization?

@Christopher Hockey, IGP - Director of Information Governance and Management,
Bond, Schoeneck and King, PLLC

Neil Burge - Founder, CEO of Cognopia Pte Ltd.
Steve Bradley - Director, HBR Consulting


Recorded on 01-27-2022

Read Full Post »

In this podcast interview session, the speaker will provide an overview of Microsoft Defender for Cloud Apps and why it is important. There will be a heavy focus on Microsoft Defender for Cloud Apps as this will be the most natural fit for firms.

Questions Chris will ask Idan: 
- What is Microsoft Defender for Cloud Apps ? (Begins at 00:36) 
- How do you best discover and control unsanctioned cloud apps? (Begins at 1:12)
- What are some policy-based controls (Begins at 4:09)
- Explain DLP management (Begins at 6:36) 
- How does Microsoft Defender for Cloud Apps help with compliance? (Begins at 9:27)
- Please provide us with a deeper dive into using Microsoft Defender for Cloud Apps to increase security posturing of Office 365 and other cloud applications (Begins at 11:26) 

@Christopher Hockey, IGP - Director of Records and Enterprise Content, Bond, Schoeneck and King, PLLC

​Idan Basre - Product Manager, Microsoft Cloud App Security 

Recorded on 11-10-2021

Read Full Post »

In this podcast session, the speakers will discuss changes, challenges, and approaches to supporting enterprise users at their homes.

Helpful timeframe of questions asked/responses in the respective podcast:
(00.39 - 2:37) "What are the Challenges of Supporting Enterprise Users Remotely?"
(2:38 - 4:38) "Did everyone use Citrix and apply to everyone?"
(4:40 - 6:18) "Talk about the scope of working remotely."
(6:22 - 9:23) "Tell us what tools have you used to support the enterprise users at home when working remotely?" 
(9:23 - 10:38) "How about support on mobile devices and other devices like speed test, do either of you use these tools?"
(10:39 - 13:24) "How do you support practices changed from moving from a enterprise office to home."
(13:25-15:36) "What new knowledge or certifications have helped you cope with the changing environment?"
(15:37 - 16:29) "What challenges remain?"
(16:30 - 19:07) "What challenges remain on hardware?"
(19:07 - 20:06) "Do either of you support remote printing?"
(20:07 - 21:32) "Does time of day make a difference?"


@Mark Manoukian - IT Director, Kegler, Brown, Hill & Ritter

@David Michel - Chief Information Officer - Becker & Poliakoff, PA
@Frank Ziller - CIO, Frontline Managed Services 

​Recorded on 11-2-2021

Read Full Post »

In this brief podcast, we hope to bring continued awareness to current cybersecurity vulnerabilities and how cybercriminals are evolving to target individuals/businesses using legitimate-looking emails and social media messages.

@Carolyn Bragiel - 
Advisor, Legal E-discovery, Cardinal Health​

​Marissa McDermid - Program Manager, Security Awareness, Resilience

Recorded on 10-28-2021



Read Full Post »

This topic was one of ILTACON 2021's most popular conference sessions, and as security is a concern to many the original panel has reunited for a follow-up podcast.

Security is complex and when left without robust resources of money, knowledge, and people we sometimes revert to the ostrich head in the sand approach. Even though we try to do our best, we sometimes fall into bad habits.

This podcast session is the opposite of sharing best practices . . . we will call out the absolute worst mistakes. Without mentioning any entity or name, we will discuss the criticality of certain practices. Our goal is to give you the opportunity to walk away with a private GOLD STAR or perhaps the feeling of "oh no, I do that and better fix that" without having to admit it to your peers.

@Corey Reitz - Cyber Assurance Architect, Sandia National Laboratories

@James McKenna
 - Chief Information Officer, Fenwick & West LLP
Melodi (Mel) Gates - 
Senior Legal Editor, Privacy & Data Security, Thomson Reuters
@Rebecca Sattin - 
Chief Information Officer, Worldox
@Robinson Roca - 
Practice Lead, Infrastructure Services, Helient Systems LLC
@Heather Morrow -
Director, Project Management & Training, Loeb & Loeb LLP.

​Recorded on 10-21-2021

Read Full Post »

During this podcast, a cyber security professional will discuss ways that you can ensure that you have adequate visibility to protect against unauthorized access into our data as you move additional pieces of your architecture into the cloud. The conversation will highlight cloud access security brokers, security incident and event management, and data loss prevention tools and strategies.

@Corey Reitz - E-Discovery Project Lead, Sandia National Laboratories

Kevin Magee - Chief Security Officer, Microsoft Canada

Recorded on 08-06-2021​

Read Full Post »

You’ve received an alert that you have a critical vulnerability within your environment. Now what? Is relying on the alerted risk rating and score sufficient? In this podcast session, the speaker will discuss what needs to be done after the vulnerability has been identified to assist you in understanding the risk to your firm and ensuring the risks are dealt with appropriately and in accordance with your firms risk management strategy.

@David Whale - ​Director Information Security , Fasken Martineau Dumoulin LLP

Jon Rohrich - Cybersecurity Technical Architect, ‎Microsoft

Recorded on 5-17-2021

Read Full Post »

Podbean App

Play this podcast on Podbean App