Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 79
Sort by

Event
Adlumin: What to Expect with a Next-Generation SIEM

Description Cyber Attacks continue to escalate in all industries including legal practices. Most breached customers have updated cybersecurity tools in place while attackers invade networks for weeks without discovery. In this product briefing, we will discuss what’s missing. Adlumin was...

 09-29-2021 | 12:00 - 13:00 ET


Blog Entry
Open Source Cyber Tools for When You Are On a Tight Budget

Please enjoy this blog post authored by Dr. Georg Thomas, CCISO, CDPSE, CISM, CISSP, GRCP Cyber-attacks are on the rise across the globe with 2021 identified as the highest average cost of data breaches over the past 17 years (IBM, 2021). Law firms are under increased pressure from...


Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving: Part 4

In our 2021 Information Governance blog series regarding Microsoft Teams, we will take a look at the chat features and considerations around the retention and disposition of these messages. The information presented here is not intended to be considered legal advice nor instruction. The blog...

Chuck Barth's profile image

Blog Entry
Maintaining a Vulnerability Scan Remediation Report

Please enjoy this blog post that was co-authored and posted on behalf of Marc Ohmann - President, CEO - Digital Solutions, Inc and Jamison Masters, Co-Founder, Verus Corporation . A vulnerability is a weakness in a covered device that can be exploited by attackers to gain unauthorized...


Blog Entry
Key Considerations for Assembling Your IG Committee

Please enjoy this blog post which was authored and posted on behalf of Randy Anderson, Loffler, CISSP and Manager of the Cybersecurity and IT Consulting teams, Loffler Companies. Introduction Establishing an Information Governance (IG) Committee is an important first step on a journey...


Blog Entry
Building an IG Committee from the Ground Up

Please enjoy this blog post authored by Megan Larkins, Information Security Consultant Manager, FRSecure . Description: Managing an Information Governance (IG) committee can be difficult enough, but the process is elevated to another level if you’re tasked with assembling one from the...


Volunteer Opportunity
Security & Compliance Content Coordinating Team (2022)

PURPOSE : Content Coordinating Teams fall under the direction of the Program Planning Council liaisons and Content Coordinating Teams’ Team Coordinator who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas...

 09-01-2021  |  Larger Project (anywhere from 40 - 100 hours total)



Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving

As many organizations move to MS Teams in a constantly evolving M365 ecosystem, there are many IG concerns that need to be considered. You need to make sure the guardrails are in place before, and after, opening the doors. This entry in our blog series, specifically explores MS Teams chat...


Blog Entry
Pillars of a Solid Insider Threat Program

According to a report released in 2020 by the Poneman Institute, “the number of insider-caused cybersecurity incidents increased by a whopping 47% since 2018” . Insiders are trusted individuals that work for an entity and as a result are privy to systems and information that is not available to...