Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 91
Sort by

Blog Entry
Open Source Cyber Tools for When You Are On a Tight Budget

Law firms, like all industries are at varying stages in their cyber security journey...Let’s face it, cyber security tools can be expensive


Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving: Part 4

Learn about retention for Teams - Microsoft 365 Compliance | Microsoft Docs #SecurityProfessionals #ServerOperationsandSecurity #Security #InformationGovernanceorCompliance

Chuck Barth's profile image

Blog Entry
Maintaining a Vulnerability Scan Remediation Report

Audit findings should have proximity to security objectives...Vulnerability response remediation, change management, and the auditor process are critical components to healthy security operations.


Blog Entry
Key Considerations for Assembling Your IG Committee

At a minimum, make sure that these roles are identified and represented in the committee structure: Information Security Chief Information Security Officer (CISO) Responsible for overall Cybersecurity measures and information security policies and privacy Compliance Chief Compliance Officer Responsible for ensuring compliance with regulatory and ethics requirements Risk Chief Risk Manager Officer Responsible for evaluating, understanding, and mitigating risk to the organization Records Management Records Management Manager or IT Manager Responsible for maintaining electronic and paper records and the systems used to manage them eDiscovery eDiscovery Practice Manager Responsible for managing systems and processes for eDiscovery In determining who should lead the IG Committee it is important to begin with the understand that that the work of this committee is not solely an Information Technology or Information Security responsibility


Blog Entry
Building an IG Committee from the Ground Up

Please enjoy this blog post authored by Megan Larkins, Information Security Consultant Manager, FRSecure . ...Many firms are frequently asked in client security assessments or questions if they use DLP


Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving

Good luck, Jim [7] [1] Overview of teams and channels - Office Support (microsoft.com) [2] Learn about retention for Teams - Microsoft 365 Compliance | Microsoft Docs [3] File storage in Teams - Office Support (microsoft.com) [4] Learn about retention for Teams - Microsoft 365 Compliance | Microsoft Docs [5] Create and configure retention policies to automatically retain or delete content - Microsoft 365 Compliance | Microsoft Docs [6] Learn about retention for Teams - Microsoft 365 Compliance | Microsoft Docs [7] For those that only, know about Mission Impossible from the Tom Cruise movies, check out Mission: Impossible (1966 TV series) - Wikipedia #SecurityProfessionals #Security #ServerOperationsandSecurity #InformationGovernanceorCompliance


Blog Entry
Pillars of a Solid Insider Threat Program

Be aware that there are a lot of resources to help you as you strive to defend your information, including information security frameworks such as ISO/IEC 27001 or NIST SP 800-53 , and other resources such as training and/or tools from entities such as Carnegie Mellon’s Software Engineering Institute or the National Insider Threat Task Force to name just a couple


Blog Entry
Vendor Governance to Integrate Teams and Document Management Systems

Due to the collaborative and Software as a Service (SaaS) nature of M365 and Teams, some policies that seemingly would not be affected by Teams will need to be reviewed to make sure they are in line with your Teams and DMS implementation strategy, including policies addressing areas such as information security, data privacy, and acceptable use


Blog Entry
Who Moved the Folder? Transforming Shared Drive Clean Up

We had already established share drives with a client/matter folder structure and tighter security two years prior.


Blog Entry
Kick-Off Introduction to Security and Compliance's "Taming Unstructured Data" Series

#Very Large (over 500) #Large (251 - 500) #Medium (151 - 250) #Small (under 151) #Firm #Security Professionals #ServerOperationsandSecurity #InformationGovernanceorCompliance #InformationGovernance #Data Analytics #DataScience #Security