Skip to main content (Press Enter).
Sign in / Register
Skip auxiliary navigation (Press Enter).
Skip main navigation (Press Enter).
Toggle navigation
Get Involved
Become a Member
Volunteer
Business Partners
Awards
Volunteer Awards
Editorial Calendar
Innovation
Live Events
All Upcoming Events
Conferences
Featured Events
Virtual Events
ILTACON 2021
ILTA>ON
ILTACON South America
LegalSEC Summit
Resources
Publications & Surveys
Recordings & Presentations
Communities
Women Who Lead
Corporate Legal
Law School Community
ILTA Europe
Small/Mid-Size Firms
LegalSEC
Areas of Knowledge
COVID-19
Innovation
Blogs
Member Directory
Sponsor Directory
Career Center
Get Law Firm 101
About ILTA
About ILTA
Contact Us
News
Meet ILTA Leadership
Have a Great Idea?
Browse
Blogs
Blog Viewer
LegalSEC® - Cybersecurity
View Only
Community Home
Discussion
3.7K
Library
179
Blogs
51
Events
0
Volunteer
0
Back to Blog List
2015 LegalSEC™ Summit - Audio Recordings and Session Materials are now available
By
Online Services
posted
06-11-2015 11:43
Options Dropdown
1
Like
Christopher Hunt
Sugarman, Rogers, Barshak & Cohen, P.C.
Director of Technology & Operations
If you were unable to attend LegalSEC Summit 2015 in Baltimore this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the
LegalSEC Resource Library
under the 2015 LegalSEC Summit folder. Please note that due to the nature of the content - the access to the materials and recordings will be restricted to
members only
so members must be logged in when clicking on the links below.
The list of sessions (and materials as they become available) for this year are below:
KEYNOTE -
The Anatomy of Successful Cyberattacks (and How To Defend Against Them)
LSS01 -
Preparing For Fast-Moving Vulnerabilities
LSS02 -
Security Architecture 101
LSS03 -
Using Vulnerability Assessments To Optimize Your Security Spending
LSS04 -
Putting Principles into Practice: Cross Jurisdictional Data Privacy Challenges
LSS05 -
Membership Has Its Privileges: Password and Privileged Access Management
LSS06 -
Keeping It Secure: Provide the Internet in a Bubble
LSS07 -
The Rosetta Stone: Engaging InfoSec and Legal Professionals
LSS08 -
Anatomy of Audits, Engagements and Compliance
LSS09 -
Mobile Communications Security Threats
LSS10 -
The World of Advanced Endpoint Security
LSS11 -
LegalSEC Toolshed
LSS12 -
Building Security Into All Technology Projects
LSS13 - FS-ISAC Overview and FS-ISAC for Legal (CLOSED SESSION)
LSS14 -
Incident Response Planning for Legal
LSS15 -
LegalSEC Lightning Round!
LSS16 -
Avoiding the Vendor Assessment Pyramid Scheme: Madoff Ain't Got Nothin' on Us
LSS17 -
When A Breach Occurs
LSS18 -
Security and IG: Living Together in Perfect Harmony?
LSS19 -
Get Smart: Self-Assessment Security Tools
LSS20 -
Unified Theory of Security Frameworks, Standards, and Organizations
LSS21 -
Something Old, Something New: Energize Your Security Awareness Program!
#LegalSEC
0 comments
512 views
Permalink
© International Legal Technology Association. All rights reserved.
Account Settings
My Profile
Terms & Conditions
© International Legal Technology Association. All rights reserved.
Account Settings
My Profile
Terms & Conditions
Powered by Higher Logic