Help with Search (Search Syntax and Search Operators)
Description ILTA's affiliate (LS-ISAO) is hosting its sixth annual Summit on Security and Third-Party Risk in Austin TX Oct 11-12. Networking and Education on Critical Third-Party and Cybersecurity Issues, for Mutual Resilience . The conference features more than 40 speakers on third...
10-11-2023 09:00 - 10-12-2023 14:00 CT Austin TX
Please enjoy this blog posted by the author, Kevin J. Foster, Sr., Cybersecurity Operations Coordinator, White and Williams LLP. Introduction: For an era where technology plays a pivotal role in every industry, law firms are increasingly becoming targets of sophisticated cyber-attacks...
PURPOSE : Content Coordinating Teams fall under the direction of the Content Coordinating Teams’ Team Coordinator and Programming Committee who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas of focus,...
09-01-2023 | Larger Project (anywhere from 40 - 100 hours total)
Please enjoy this blog post authored by Rabiya Hirji, Solution Advisory Director, Risk Products, Intapp. When I started my career in law firm risk management over 25 years ago, the conflicts assistant/analyst/administrator was expected to fulfill a wide range of responsibilities including...
PURPOSE : Content Coordinating Teams fall under the direction of the Content Coordinating Teams’ Team Coordinator and Program Planning Council who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas of focus,...
09-01-2022 | Larger Project (anywhere from 40 - 100 hours total)
Thanks to our moderators and the LegalSEC Steering Committee for this roundtable. Click here for the slides with contact information . Roundtable Description: The vulnerability risk profile of your technology stack is constantly changing. Bugs and vulnerabilities are discovered every day and...
Please enjoy this blog post that was co-authored and posted on behalf of Marc Ohmann - President, CEO - Digital Solutions, Inc and Jamison Masters, Co-Founder, Verus Corporation . A vulnerability is a weakness in a covered device that can be exploited by attackers to gain unauthorized...
PURPOSE : Content Coordinating Teams fall under the direction of the Program Planning Council liaisons and Content Coordinating Teams’ Team Coordinator who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas...
09-01-2021 | Larger Project (anywhere from 40 - 100 hours total)
PURPOSE : Content Coordinating Teams fall under the direction of the Program Planning Council liaisons who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas of focus, target audiences, deliverable numbers...
09-01-2020 | Larger Project (anywhere from 40 - 100 hours total)
Biometric Information Privacy Laws By Alan S. Wernick, Esq. ( Bio of Alan S. Wernick ) As biometric data use in society becomes more ubiquitous, so have the statutory and judicial responses concerning their use and the related privacy and contract law issues. To minimize...
Follow Us
© International Legal Technology Association. All Rights Reserved.
Accessibility | Terms & Conditions | Support Center