Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 419
Sort by

Vendor Privileged Access with SecureLink

Description Third-party remote access is a growing challenge amongst enterprise organizations. Historically they have relied on tools like VPN and desktop sharing, and while these tools may be great for internal employee remote access, they lack the ability to identify, control, and audit...

 01-17-2020 | 12:00 - 13:00 ET

Using Deception Technology to Close Your Detection Gaps

Description Independent law firms and legal departments all need to protect their intellectual property from theft and to know if critical files are accessed without authorization. In this session, we will share insights into why deception technology has become a legal sector preferred security...

 01-14-2020 | 11:00 - 12:00 ET

New York City: Cybersecurity Concerns and the Small Law Firm

Description Join us for an exploration of the challenges facing small law firms to meet the increasing demand for the firm to define cybersecurity controls. We will walk through the challenges small law firms face, define what are policies and how they are a requirement and how small law firms...

 01-09-2020 | 12:30 - 13:30 ET
 New York NY

Minimizing the Impact of a Data Breach

Description Register for this webinar to see a brand new integration with iManage and DocsCorp security solutions that can better protect your business from threats like email data breaches and accidental data loss. This webinar, DocsCorp show you how to: • Secure and manage your data, so it...

 01-24-2020 | 11:00 - 12:00 ET

Library Entry
Keep Your Windows 7 Desktops and 2008 Servers Secure and Supported After January 2020 with Citrix and Microsoft Azure

Learn how Citrix and Microsoft Azure can keep your Windows 7 desktops and Windows 2008 servers supported and secure after January 14, 2020. Included with your Azure subscriptions, Microsoft will provide free security updates for Windows 7 and server 2008 for 3 years. Citrix supplies the...

2 attachments

Library Entry
Trial Preparation - Process, Planning and Technology You Can Use

Trial Preparation begins the minute you file or are served with the complaint. By the time your trial date approaches, you have lived through discovery, all the court filings, witnesses and experts preparation, sometimes years of work involved – and you have been to mediation, you have filed...

3 attachments

Salt Lake City: Cyber Deception Technology

Description Experience and statistics have shown that traditional prevention-based security solutions are no longer seen as a reliable line of defense against today’s cyber attackers. Attackers are increasingly more sophisticated. We learn of new security breaches seemingly every week where...

 12-04-2019 | 12:00 - 13:00 MT
 Salt Lake City UT

Library Entry
Modern Management with Microsoft Intune

Today's workforce is all about mobility. From phones to tablets to laptops, end users want to be productive on the go. In this webinar, we will take a look at how Microsoft Intune provides a mobile-first, cloud-first solution for enabling secure access to corporate data. From implementing the...

2 attachments

Library Entry
Security and Compliance - Retention, Destruction and Disposal Finale

We hope you will join us for the fourth and final installment in our Compliance, Retention and Destruction series, as we discuss a variety of information governance (IG) topics, including: Compliance refers to being in accordance with established guidelines/specifications or the process of...

2 attachments

Security in Office 365

Description Following up on the ILTA Radio podcast on Office 365 security , learn how the Microsoft Intelligent Security Graph can be leveraged to assist your firm with the five pillars of the NIST Cybersecurity Framework; Identity, Protect, Detect, Respond and Recover. Not only across your...

 12-11-2019 | 13:00 - 14:00 ET