ILTA

ILTA Audio Podcasts

    ILTA
    Loading Downloads
    286Episodes

    Following

    Followers

Archive for the 'Security' Category

Risk Assessments

Posted by ilta on 29th October 2018

Kenny, Brenda and Heath discuss risk and probability-based incident and business continuity roundtables. Topics range from the who, what and why of testing to scenario options, roundtable logistics and case study comparisons.

Speakers:
Brenda Ferraro - Senior Director of Networks, Prevalent
Kenny Leckie - Sr. Technology & Change Management Consultant
Heath Stanley - Director, Virtual Compliance

Posted in Security | Comments

Corporate BYOD - Sedona Conference Recap

Posted by ilta on 8th August 2018

In 2018, the Sedona Conference released a commentary on Corporate Bring-Your-Own-Device (BYOD) for legal professionals, involving data management, ediscovery practices, policy development and employee protection considerations. The core components of this commentary are five principles that impact considerations for a BYOD program within a corporate organization.

As corporate organizations move into situations where BYOD is a business direction, it's important for legal professionals in these organizations to consider what a BYOD program consists of, how employee and organizational goals and protections are considered, and why ediscovery plays a role in the development of a BYOD program.

In this ILTA Radio installment, a panel of legal industry professionals discusses the Sedona Conference commentary's five principles, scenarios on how legal business dynamics are structured for a BYOD program, risks and what goes in to making a program work.

Panel:
Jack Thompson (Moderator) - Sr. Manager, eDiscovery & Legal Operations, Sanofi
Kemoy Foster - eDiscovery Manager, Swiss Re
Kim-An Hernandez - Senior Counsel for Information Technology + eDiscovery + Knowledge Management, International Paper
Bonnie Kennedy - eDiscovery Manager, Delta Air Lines

Recorded on 8-1-18

Posted in law department, corporate, Information Governance, Security | Comments

Promoting Security for the Non-Techie

Posted by ilta on 9th June 2017

Introducing security awareness at a law firm can seem like an overwhelming task. In this ILTA Radio segment, we hold a conversation about practical steps for getting the job done.

Speakers:
Julia Montgomery is the architect of Traveling Coaches' award-winning OnGuard information security awareness program, which has helped over 85,000 law firm employees change their behavior to safeguard information. Julia leveraged her experience in law firms and as a Certified Change Management Professional to ensure the program's relevance for law firm audiences. Previously, she developed and led security awareness efforts in several law firms. Julia is a frequent speaker and author on topics including change management, effective communications and information security education programs.

Mark Olvey, the ISMS Manager at Taft Law, began his IT career as a trainer 18 years ago. During his legal career, he has also worked as a help-desk support technician and manager, DMS administrator, CRM administrator, docketing system administrator and printer manager. Mark was previously in the military, serving for 12 years overseas and stateside. He is ITIL and Microsoft certified, and is currently working on his ISO Fundamentals certification.

Posted in desktop applications, Server Operations, Security, Training | Comments

Physical Security: Is It an Afterthought?

Posted by ilta on 20th March 2017

We discuss how physical security tends to be overlooked while we focus so much time and energy on the technology side of security. Keeping your firm’s people and assets safe can rely on good physical security planning and design.

Speakers:
Heath Stanley is the SVP of Information Security. He holds the CISA, CISSP and C|CISO certifications. Heath has managed technology governance consulting for Traveling Coaches Inc. since 2006. His previous experience includes residential lending and process improvement, and he is a subject matter expert in Information Security Governance and Vendor Management.

David Tremont.  With 32 years of experience in Networking and Security, Mr. Tremont started his career as a Cryptologist Technician in the U.S. Navy in 1974.  Responsible for intercepting and decrypting Chinese and Russian radio transmissions for Fleet Commanders. Mr. Tremont has consulted with many corporate entities as well as law firms in designing and testing networks on a global scale, ensuring security protocols and standards were key factors in their implementation.  He has also participated as a consultant in assisting public companies to ensure compliance in Sarbanes-Oxley, HIPPA and has been involved in achieving ISO 9000 and ISO 27000 certifications for Oil & Gas Service companies.
Currently Mr. Tremont serves on the Technology Committee and Security Committee for Bracewell LLP assisting Senior Management to ensure compliance in Cyber and Physical security initiatives and is responsible for the monitoring and incident response of day to day security and network operations for the firm. 

Recorded on 1-26-17

Posted in Risk, Security | Comments

What Keeps Security Experts Awake at Night? Interview with Jon Washburn

Posted by ilta on 20th January 2016

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with Jon Washburn, National Manager of Technical Operations at Stoel Rives LLP.

Posted in Computer Security, Security, LegalSEC | Comments

What Keeps Security Experts Awake at Night? Interview with Butch Spencer

Posted by ilta on 20th January 2016

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with Butch Spencer, Network Engineer at Jackson Kelly PLLC.

Posted in Computer Security, Security, LegalSEC | Comments

What Keeps Security Experts Awake at Night? Interview with David Ries

Posted by ilta on 20th January 2016

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with David Ries, Member at Clark Hill P.L.C.

Posted in Computer Security, Security, LegalSEC | Comments

What Keeps Security Experts Awake at Night? Interview with Peter Mills

Posted by ilta on 20th January 2016

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with Peter Mills, Director Information Technology at Fasken Martineau Dumoulin LLP:

Posted in Computer Security, Security, LegalSEC | Comments

What Keeps Security Experts Awake at Night? Interview with David Bustle

Posted by ilta on 20th January 2016

The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. 

Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.

Here is our interview with David Bustle, Director of Technology at Buchalter Nemer.

Posted in Computer Security, Security, LegalSEC | Comments

LegalSEC Report: A Study of the Legal Industry’s Infromation Security Assessment Practices

Posted by ilta on 21st October 2013

Law Firms around the country are anxious to determine the overall effectiveness of their information security programs and to understand if their practices are aligned with industry peers.

Please listen in as Meg Grant, Vice President, Marketing at Digital Defense and a LegalSec Vendor Advisory Team member reviews the results of the LegalSec Report, A Study of the Legal Industry's Information Security Assessment Practices. The report, published in August and released at the ILTA Annual conference, provides un-biased and relevant knowledge surrounding information security programs and practices within North American law firms.

Grant will highlight key findings and provide context surrounding all the results.

A copy of the report may be downloaded HERE

Posted in Legal Technology, Technology, Computer Security, Risk, Security, LegalSEC | Comments