Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 423
Sort by

Event
Back to Basics, Security Hygiene Best Practices

Description You can help your firm build a stronger information security program by promoting basic security hygiene. Seemingly small changes can result in big improvements in your security and governance program. Our panelists will discuss which best practices they have implemented to promote...

 02-05-2020 | 15:00 - 16:00 ET


Event
New York City: How Does the New NYS Cybersecurity and Privacy Law (SHIELD Act) Impact Your Business?

Description During this interactive presentation, you will learn the state legal and regulatory framework for privacy and cybersecurity upon which clients are increasingly basing their requirements of outside counsel. Meeting these requirements can mean increases in business. Join us as we will...

 02-11-2020 | 17:30 - 19:30 ET
 New York NY


Event
Los Angeles: That Leak Is Coming From Inside the Organization. What Are You Doing About It?

Description Moving core infrastructure systems to the cloud has always had obstacles. While systems like Exchange and Law firms are often considered a soft target when it comes to data security. One in five law firms was hacked last year and six major law firms were hacked in recent history....

 02-11-2020 | 12:00 - 13:30 PT
 Los Angeles CA


Event
Cleveland: Cyber Threat — An FBI Perspective

Description Please join us for lunch as a Supervisory Special Agent from the local FBI office provides an overview of cyber trends and recent cybersecurity directives, describes the threat landscape and discusses the government response to cyber-intrusions. * A limited number of parking...

 01-28-2020 | 12:00 - 13:00 ET
 Cleveland OH


Event
Vendor Privileged Access with SecureLink

Description Third-party remote access is a growing challenge amongst enterprise organizations. Historically they have relied on tools like VPN and desktop sharing, and while these tools may be great for internal employee remote access, they lack the ability to identify, control, and audit...

 01-17-2020 | 12:00 - 13:00 ET


Event
Using Deception Technology to Close Your Detection Gaps

Description Independent law firms and legal departments all need to protect their intellectual property from theft and to know if critical files are accessed without authorization. In this session, we will share insights into why deception technology has become a legal sector preferred security...

 01-14-2020 | 11:00 - 12:00 ET


Event
New York City: Cybersecurity Concerns and the Small Law Firm

Description Join us for an exploration of the challenges facing small law firms to meet the increasing demand for the firm to define cybersecurity controls. We will walk through the challenges small law firms face, define what are policies and how they are a requirement and how small law firms...

 01-09-2020 | 12:30 - 13:30 ET
 New York NY


Event
Minimizing the Impact of a Data Breach

Description Register for this webinar to see a brand new integration with iManage and DocsCorp security solutions that can better protect your business from threats like email data breaches and accidental data loss. This webinar, DocsCorp show you how to: • Secure and manage your data, so it...

 01-24-2020 | 11:00 - 12:00 ET


Library Entry
Keep Your Windows 7 Desktops and 2008 Servers Secure and Supported After January 2020 with Citrix and Microsoft Azure

Learn how Citrix and Microsoft Azure can keep your Windows 7 desktops and Windows 2008 servers supported and secure after January 14, 2020. Included with your Azure subscriptions, Microsoft will provide free security updates for Windows 7 and server 2008 for 3 years. Citrix supplies the...

2 attachments


Library Entry
Trial Preparation - Process, Planning and Technology You Can Use

Trial Preparation begins the minute you file or are served with the complaint. By the time your trial date approaches, you have lived through discovery, all the court filings, witnesses and experts preparation, sometimes years of work involved – and you have been to mediation, you have filed...

3 attachments