LegalSEC® - Cybersecurity

 View Only

2018 LegalSEC® Summit Audio Recordings and Session Materials are now available

By Online Services posted 06-14-2018 13:08


Session recordings now available!

If you were unable to attend the 2018 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the 2018 LegalSEC Summit folder.  Please note that due to the nature of the content - the access to the materials and recordings will be restricted to members only so members must be logged in when clicking on the links below.

The list of sessions (and materials as they become available) for this year are below:

   General Session »

   Automated Threat Intelligence »

   InfoSEC and Information Governance Perspectives on GDPR »

   New Methods in Security Awareness Training »

   Risky Business: Working Outside Your Office »

   Anatomy of a Data Breach »

   Fielding a Team with the Right Balance of Skills - IT/Security/IG »

   Ten High Impact Rules for Your SIEM »

   You Too May Have GDPR Issues: Things You Need to Know and Do »

   Big Law - Client Data in the Cloud »

   CyberInsurance: Are You Leveraging the Best Deal With your Firm's Policy? »

   Ethical Rules of Professional Conduct for Attorneys and Their Security and Technology Teams »

   Successful Threat Hunting Begins with Looking at Behaviors »

   Tried, True and Cutting Edge InfoSEC Policies »

   Data Loss Prevention: Putting Together Real World Solutions »

   Industry Metrics: Improving the Perception of Law Firms »

   Industry Publications: Sneak Preview of Upcoming Papers/Efforts »

   Top Things You Can Do Tomorrow to Enhance Your Security - Risk vs. Cost »

   Deep Dive into Incident Response »

   Malware: Find it Before it Finds You! »

   Risks for Incoming and Outgoing Data »

   Watch a 15-Year-Old Hack Your Firm's Users »

   Red Team Tools for the Blue Team »

   Use Threat Intelligence and Threat Analytics in Security Models »


session recordings sponsored by: