Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 19
Sort by

Library Entry
2018 LegalSEC Summit Audio Recordings and Session Materials

If you were unable to attend the 2018 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the 2018 LegalSEC Summit folder. Please note...


Blog Entry
2018 LegalSEC® Summit Audio Recordings and Session Materials are now available

Session recordings now available! If you were unable to attend the 2018 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the 2018...


Blog Entry
GDPR is Here - ILTA Resources

GDPR: What is it? Who should know and why? Let a group of your peers who are leaders in their fields help you navigate this new and confusing roadmap. We promise we won't ask you to fold it back up when you're done! ( I mean who remembers how to do that anyway?) Time is running out to get your...


Library Entry
ILTA GDPR Resources 2018

The General Data Protection Regulation (GDPR) will be fully in force beginning May 25, 2018. GDPR compliance is essential and challenging, but you don't have to go it alone. ILTA has a wealth of programming on this topic that will benefit law firms and corporate legal departments. This document...

GDPR Resources 2018.pdf



Library Entry
Patching and Imaging Windows Using MDT and USMT

Imaging Windows 10 machines is easier than most people know. Microsoft has created a set of free tools to help you deploy Windows 10, and the Microsoft Deployment Toolkit (MDT) is one of the most important resources available to your IT department. It can be used to create reference images or...

MDT USMT Webinar (Final Draft) (1).pdf

ILTA Video's profile image

Library Entry
Critical Security Controls - A Practical Actionable Approach to Reduce the Attack Surface

Description Have you ever tried to boil the ocean? We haven't either, but it seems rather impossible. Well, unlike trying to boil the ocean, identifying and securing your information assets is a more practical and achievable endeavor. It's not easy, but it can be done. How you ask ? By...

3 attachments

ILTA Video's profile image

Library Entry
Ransomware - One of the Greatest Cybersecurity Threats

Description Ransomware has quickly and effectively become one of the greatest cybersecurity threats facing businesses and general users alike. According to the FBI, ransomware threat made $209M in the first quarter of 2016 and they predict that it will exceed $1B for the year. This year,...

2 attachments

ILTA Video's profile image

Library Entry
Anti-Spymail and Anti-Spoofing

In this webinar, we will discuss two specific threats to enterprise email security: spymails and spoofed emails. About Spymail: You already know email attachments contain sensitive metadata that need to be scrubbed. But did you know that emails themselves also have metadata? Fifteen percent...

2 attachments

ILTA Video's profile image

Library Entry
ILTA GDPR Resources 2017

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). ILTA has...

GDPR Resources.pdf