Skip to main content (Press Enter).
Sign In / Register
Skip auxiliary navigation (Press Enter).
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Get Involved
Become a Member
Volunteer
Business Partners
ILTA's Distinguished Peer Awards
Volunteer Awards
Influential Women in Legal Tech List
2023 Editorial Calendar
Post a Blog
Live Events
Events Calendar
Mastering Microsoft Teams
ILTACON 2023
ILTACON Europe
LegalSEC Summit
Resources
ILTA On-Demand
myMentor
Publications & Surveys
Communities
Women Who Lead
Corporate Legal
Diversity, Equity & Inclusion
ILTA Europe
Small/Mid-Size Firms
LegalSEC Initiative
Member Directory
Sponsor Directory
Career Center
Get Law Firm 101
About ILTA
About ILTA
Contact Us
News
Meet ILTA Leadership
ILTA Brand Hub
Have a Great Idea?
Browse
Blogs
Blog Viewer
LegalSEC® - Cybersecurity
View Only
Community Home
Discussion
4.3K
Library
197
Blogs
52
Events
2
Volunteer
0
2019 LegalSEC® Summit Audio Recordings and Session Materials are now available
By
Online Services
posted
06-07-2019 16:14
1
Like
Session recordings now available!
If you were unable to attend the 2019 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the
2019 LegalSEC Summit folder
. Please note that due to the nature of the content - the access to the materials and recordings will be restricted to
members only
so members must be logged in when clicking on the links below.
THE LIST OF SESSIONS (AND MATERIALS AS THEY BECOME AVAILABLE) FOR THIS YEAR ARE BELOW:
Welcome and Introduction to Incident Response
Incident Response Table-Top Exercise
Building an Incident Response Plan
Incident Handling Tips
Post-Incident Review
Q & A and Wrap-up (not recorded)
Keynote: William Evanina Discusses Cybersecurity, followed by Q&A
Growing Your Security Team
Leverage These Free Resources to Up Your Security and Governance Game
Mock a Hack by Using Social Engineering or the "Touchless Hack" (not recorded)
Tips & Tools in Malware Reverse Engineering
Developing a Culture of Security (not recorded)
DLP: What Is Everyone Doing?
Incident Response With Modest Resources
Microsoft Security Overview and Update
DevSecOps Deconstructed
Phishing and Beyond: Educating your Users with Impact
You Haven’t [yet] Implemented Need to Know Access? (not recorded)
Email Risks and Remedies in the Stack 2.0
Ethical Hacker Gives a Demo (not recorded)
Secure your Vendor: Must-Have Vendor Controls presented by the LS-ISAO (not recorded)
The Role and Importance MSSP's and Security Partnerships Play in Security Operations
Information Governance Roundtable
Take Away the Hackers' Advantage in Realtime!
The Micro-Perimeter / Micro-Segmentation
Threat Intelligence - Mining the Dark Web
Automating and Standardizing Client Audit Requests and RFP Responses on Information Security
How to Sell the Importance of Information Security and Governance to Your Organization
Strategies and Importance for Developing the Proper Data Classifications for Your Organization
Supporting Incident Response and Responding to Suspected Compromised Systems on your Network
Crawling Your Network to Auto-Classify Sensitive Data Subject to Regulatory Control
Implementing the First Five CIS Controls
Protecting Your Firm from Insider Threats
Security Audits: Lots of Pain. Any Gain?
Ethical Hacking Tools (Not recorded)
IT Leaders with Modest Resources Roundtable (not recorded)
Managing, Securing and Retaining Emails Was Hard Enough...
SOAR and Other Emerging Technologies
Wrap-Up
#LegalSEC
#LegalSECSummit
#Security
#ITLeaderswithModestResources
#LargeFirmSeniorManagement
#SecurityProfessionals
0 comments
349 views
Permalink
© International Legal Technology Association. All rights reserved.
Account Settings
My Profile
Terms & Conditions
© International Legal Technology Association. All rights reserved.
Account Settings
My Profile
Terms & Conditions
Powered by Higher Logic