ILTA Voices
Episodes
Thursday Oct 21, 2021
Common Security Worst Practices
Thursday Oct 21, 2021
Thursday Oct 21, 2021
This topic was one of ILTACON 2021's most popular conference sessions, and as security is a concern to many the original panel has reunited for a follow-up podcast.
Security is complex and when left without robust resources of money, knowledge, and people we sometimes revert to the ostrich head in the sand approach. Even though we try to do our best, we sometimes fall into bad habits.This podcast session is the opposite of sharing best practices . . . we will call out the absolute worst mistakes. Without mentioning any entity or name, we will discuss the criticality of certain practices. Our goal is to give you the opportunity to walk away with a private GOLD STAR or perhaps the feeling of "oh no, I do that and better fix that" without having to admit it to your peers.Moderator:@Corey Reitz - Cyber Assurance Architect, Sandia National LaboratoriesSpeakers: @James McKenna - Chief Information Officer, Fenwick & West LLPMelodi (Mel) Gates - Senior Legal Editor, Privacy & Data Security, Thomson Reuters@Rebecca Sattin - Chief Information Officer, Worldox@Robinson Roca - Practice Lead, Infrastructure Services, Helient Systems LLC@Heather Morrow -Director, Project Management & Training, Loeb & Loeb LLP.Recorded on 10-21-2021
Friday Aug 06, 2021
Ensuring You Have Adequate Visibility As You Move Further Into The Cloud
Friday Aug 06, 2021
Friday Aug 06, 2021
During this podcast, a cyber security professional will discuss ways that you can ensure that you have adequate visibility to protect against unauthorized access into our data as you move additional pieces of your architecture into the cloud. The conversation will highlight cloud access security brokers, security incident and event management, and data loss prevention tools and strategies.Moderator:@Corey Reitz - E-Discovery Project Lead, Sandia National LaboratoriesSpeaker:Kevin Magee - Chief Security Officer, Microsoft Canada
Recorded on 08-06-2021
Monday May 17, 2021
Houston - We Have a Vulnerability! Now What?
Monday May 17, 2021
Monday May 17, 2021
You’ve received an alert that you have a critical vulnerability within your environment. Now what? Is relying on the alerted risk rating and score sufficient? In this podcast session, the speaker will discuss what needs to be done after the vulnerability has been identified to assist you in understanding the risk to your firm and ensuring the risks are dealt with appropriately and in accordance with your firms risk management strategy.Moderator:@David Whale - Director Information Security , Fasken Martineau Dumoulin LLPSpeaker:Jon Rohrich - Cybersecurity Technical Architect, Microsoft
Recorded on 5-17-2021
Thursday May 06, 2021
Data Retention – How Do Law Firms Get Away from Keeping Everything Forever
Thursday May 06, 2021
Thursday May 06, 2021
Without information, law firms wouldn’t exist. Information is front and center and critical to everything we do. As Law firms progress further down their digital road maps, it presents us with an opportunity to revisit our retention requirements and strategies to ensure they’re still relevant.In this podcast session, the speaker will offer best practice recommendations for law firm data retention. Are we better to keep more or less? What must we keep and for how long? How do we get to a place where we’re only retain the minimal data footprint required?Moderator:@David Whale, Director Information Security , Fasken Martineau Dumoulin LLPSpeaker:@John Churchill, Records Department Manager, Nelson MullinsRecorded on 05-06-2021
Monday Feb 15, 2021
New Skills Needed for 2021
Monday Feb 15, 2021
Monday Feb 15, 2021
In this podcast, Chuck Barth, who is a experienced senior leader of information governance in law firms, will speak about information governance in the legal industry. Join him to find out why security/compliance specialists will need information governance skills in the year to come and beyond!Moderator: @Leigh Isaacs, CIGO, CIP, Director of Information Governance and Records Management, ProskauerSpeaker:@Chuck Barth
Recorded on 2-15-2021
Friday Jan 22, 2021
Testing External Facing Systems Against Known Vulnerabilities
Friday Jan 22, 2021
Friday Jan 22, 2021
While law firms continue to push applications to the cloud, there are still a whole host of systems currently on-premise. With limited resources and staff, how can a firm ensure their on-premise applications are safe? In this podcast, experts will discuss the resources available to firms to ensure their external facing systems are secure, some common misconfigurations that can be easily corrected, and provide some best practices for continuous threat monitoring.Moderator:@David Whale, Information Security Manager, Fasken Martineau Dumoulin LLP
Speakers:Brian Carey, Manager, Consulting Services, Rapid7Jon David, Manager, Proactive Services, Mandiant Services
Recorded on 1-22-2021
Monday Oct 29, 2018
Risk Assessments
Monday Oct 29, 2018
Monday Oct 29, 2018
Kenny, Brenda and Heath discuss risk and probability-based incident and business continuity roundtables. Topics range from the who, what and why of testing to scenario options, roundtable logistics and case study comparisons.
Speakers:Brenda Ferraro - Senior Director of Networks, PrevalentKenny Leckie - Sr. Technology & Change Management Consultant Heath Stanley - Director, Virtual Compliance
Wednesday Aug 08, 2018
Corporate BYOD - Sedona Conference Recap
Wednesday Aug 08, 2018
Wednesday Aug 08, 2018
In 2018, the Sedona Conference released a commentary on Corporate Bring-Your-Own-Device (BYOD) for legal professionals, involving data management, ediscovery practices, policy development and employee protection considerations. The core components of this commentary are five principles that impact considerations for a BYOD program within a corporate organization.
As corporate organizations move into situations where BYOD is a business direction, it's important for legal professionals in these organizations to consider what a BYOD program consists of, how employee and organizational goals and protections are considered, and why ediscovery plays a role in the development of a BYOD program.
In this ILTA Radio installment, a panel of legal industry professionals discusses the Sedona Conference commentary's five principles, scenarios on how legal business dynamics are structured for a BYOD program, risks and what goes in to making a program work.
Panel:Jack Thompson (Moderator) - Sr. Manager, eDiscovery & Legal Operations, SanofiKemoy Foster - eDiscovery Manager, Swiss ReKim-An Hernandez - Senior Counsel for Information Technology + eDiscovery + Knowledge Management, International PaperBonnie Kennedy - eDiscovery Manager, Delta Air Lines
Recorded on 8-1-18
Monday Mar 20, 2017
Physical Security: Is It an Afterthought?
Monday Mar 20, 2017
Monday Mar 20, 2017
We discuss how physical security tends to be overlooked while we focus so much time and energy on the technology side of security. Keeping your firm’s people and assets safe can rely on good physical security planning and design.Speakers:Heath Stanley is the SVP of Information Security. He holds the CISA, CISSP and C|CISO certifications. Heath has managed technology governance consulting for Traveling Coaches Inc. since 2006. His previous experience includes residential lending and process improvement, and he is a subject matter expert in Information Security Governance and Vendor Management.David Tremont. With 32 years of experience in Networking and Security, Mr. Tremont started his career as a Cryptologist Technician in the U.S. Navy in 1974. Responsible for intercepting and decrypting Chinese and Russian radio transmissions for Fleet Commanders. Mr. Tremont has consulted with many corporate entities as well as law firms in designing and testing networks on a global scale, ensuring security protocols and standards were key factors in their implementation. He has also participated as a consultant in assisting public companies to ensure compliance in Sarbanes-Oxley, HIPPA and has been involved in achieving ISO 9000 and ISO 27000 certifications for Oil & Gas Service companies.Currently Mr. Tremont serves on the Technology Committee and Security Committee for Bracewell LLP assisting Senior Management to ensure compliance in Cyber and Physical security initiatives and is responsible for the monitoring and incident response of day to day security and network operations for the firm. Recorded on 1-26-17
Wednesday Jan 20, 2016
What Keeps Security Experts Awake at Night? Interview with Jon Washburn
Wednesday Jan 20, 2016
Wednesday Jan 20, 2016
The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.Here is our interview with Jon Washburn, National Manager of Technical Operations at Stoel Rives LLP.
Wednesday Jan 20, 2016
What Keeps Security Experts Awake at Night? Interview with Butch Spencer
Wednesday Jan 20, 2016
Wednesday Jan 20, 2016
The world of security is vast, and concerns are great. For some, the thoughts of what to protect and how to protect it are enough to keep them awake at night. What opportunities and concerns are up high and down low? To help shine a light, five ILTA members from the LegalSEC Council and ILTACON conference committee have shared some of their security concerns. Read the article that summarizes all five perspectives in the Winter 2015 Peer to Peer.Here is our interview with Butch Spencer, Network Engineer at Jackson Kelly PLLC.