Help with Search (Search Syntax and Search Operators)
Please enjoy this blog post authored by David Whale, Director Information Security, Fasken Martineau Dumoulin LLP The world of cybersecurity maturity models is on par with going to your favorite buffet (pre-Covid of course) for your birthday dinner. So many options. Government based...
Please enjoy this blog post authored by Ken Fishkin, CISSP, CCSP, CIPT, CIPM, CIPP/US, CISM, CEH, and many others. https://www.linkedin.com/in/kfishkin/ Since 1996, I have been pursuing industry certifications. I have always found them to be an essential part of my career growth,...
The increased adoption of virtual collaboration systems – like Microsoft Teams – due to the pandemic has created a new, hybrid workforce. While this massive switch has allowed organizations to operate during these unprecedented times, new threats have arisen. Cyberattacks – including ransomware ...
Please enjoy this blog post co-authored by David Forrestall , CISSP CISA, Managing Partner, SecurIT360 and David Oxley , CLM, CISM, Director of Information Technology, Messerli & Kramer. Introduction Everyone agrees that cybersecurity is absolutely essential. However, many firms...
1 Comment - no search term matches found in comments.
Follow Us
© International Legal Technology Association. All Rights Reserved.
Accessibility | Terms & Conditions | Support Center