Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 84
Sort by

Blog Entry
Vendor Governance to Integrate Teams and Document Management Systems

Due to the collaborative and Software as a Service (SaaS) nature of M365 and Teams, some policies that seemingly would not be affected by Teams will need to be reviewed to make sure they are in line with your Teams and DMS implementation strategy, including policies addressing areas such as information security, data privacy, and acceptable use

Blog Entry
Who Moved the Folder? Transforming Shared Drive Clean Up

We had already established share drives with a client/matter folder structure and tighter security two years prior.

Blog Entry
Kick-Off Introduction to Security and Compliance's "Taming Unstructured Data" Series

#Very Large (over 500) #Large (251 - 500) #Medium (151 - 250) #Small (under 151) #Firm #Security Professionals #ServerOperationsandSecurity #InformationGovernanceorCompliance #InformationGovernance #Data Analytics #DataScience #Security

Blog Entry
A Deep Dive into Provisioning in Teams, With 3rd Parties, Powershells and When Should IG/Sec Be Involved

Given the access rights, security and overall information management consequences of implementing Teams in the law firm environment, thoughtful evaluation and planning by the Information Governance, compliance and IT Security groups in consultation with the legal practices should be done to ensure proper implementation and adoption

Blog Entry
Making Lemonade Out of Lemons – How to Leverage a Global Crisis to Evolve your IG Skillset

#Security #InformationGovernanceorCompliance #Very Large (over 500) #Large (251 - 500) #Medium (151 - 250) #Small (under 151) #Firm

Blog Entry
What is Teams and What Should Information Governance and Security Be Concerned With the Initial Setup

Between governance and security requirements, your policies should include, at minimum, your firm’s stance on data loss prevention, electronic data sharing, what constitutes a client record, management of ethical walls and any secured inclusionary walls, and clear retention schedules.

Blog Entry
Data Loss Prevention: Survey Results and Peer Discussion BRIEF SUMMARY

Speakers: @Marcos Marcal (Information Security & Risk Manager at Nutter McClennen & Fish LLP) & @Abraham Miller-Barbarow (Information Governance Risk Manager at Ropes & Gray LLP)

Marcos Marcal's profile image

Blog Entry
It Takes a Village: An all-new Security blog series

ILTA is pleased to announce the creation of an all-new security series: It takes a Village . Please find below five individual posts aimed at improving security for the entire industry

Blog Entry
Blood from a Turnip: Cyber Security for the Resource Challenged

However, many firms still do not have dedicated security resources. ...Security for the new WFH environment has made it even more challenging. To be clear, not all small firms face tight resource allocation for security.