Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 369
Sort by

Library Entry
Blockchain and Ediscovery Series, Part 2: Forensics - Getting in the Weeds From an Expert Perspective

Join us for part two of the blockchain and ediscovery series. This webinar will be a deeper dive into actual integration of blockchain in today’s (and tomorrow's) legal technology and workflow. More than just crypto talk and theories, our experts touch on blockchain’s significance and...

2 attachments

ILTA Video's profile image

Event
San Francisco: Securing Your Firm’s Reputation: IT Resiliency Workshop

Description Balancing the growing demand for technology availability with the need to keep workloads secure from increasing threats is perhaps the biggest challenge facing legal IT teams today. In this workshop, you will learn how to protect your firm’s operations and reputation with a...

 09-18-2019 | 12:00 - 13:30 PT
 San Francisco CA


Event
Los Angeles: Securing Your Firm’s Reputation: IT Resiliency Workshop

Description Balancing the growing demand for technology availability with the need to keep workloads secure from increasing threats is perhaps the biggest challenge facing legal IT teams today. In this workshop, you will learn how to protect your firm’s operations and reputation with a...

 09-19-2019 | 12:00 - 13:30 PT
 Los Angeles CA


Event
How to Survive Security Audits

Description A virtual roundtable discussion on how to efficiently manage security assessment questionnaires and onsite security audits. We will discuss how to prepare with outside counsel guidelines, ways to optimize your response process, when to engage stakeholders, which requirements are...

 09-05-2019 | 15:00 - 16:00 ET


Library Entry
DMS - IS a Requirement

In this webinar, we will learn about the challenges that attorneys are faced with today managing the ever-growing volume of matter related data. The unavoidable challenges of securing, tagging, governing and ultimately being able to “find the file” now more than ever require rules and matter...

2 attachments

ILTA Video's profile image

Event
Chicago: Data Breach Incident Response: The Adversary in Your Network

Description The personal client information held by legal professionals is extremely valuable to cyber criminals and must be protected at all costs. Technology alone cannot protect you from a cyber breach, so it is important that law firms understand the importance of establishing and...

 09-12-2019 | 12:00 - 13:30 CT
 Chicago IL


Library Entry
That Information Leak is Coming from Inside the Organization. What are you Doing About it?

Law firms are often considered a soft target when it comes to data security. One in five law firms was hacked last year and six major law firms were hacked in recent history. Law firms are high value targets because they hold troves of clients’ most sensitive information, including: Trade...

2 attachments

ILTA Video's profile image


Volunteer Opportunity
Security & Compliance Content Coordinating Team (2020)

PURPOSE : Content Coordinating Teams fall under the direction of the Program Planning Council liaisons who provide direction to the teams in creating programming deliverables. ROLE : The Content Coordinating Team will review the specific areas of focus, target audiences, deliverable numbers...

 10-01-2019  |  Larger Project (anywhere from 40 - 100 hours total)


Event
GDPR Roundtable

Description In May 2018, two years after it was officially published (in every language of each of the EU countries) the European Union General Data Protection Regulation (GDPR) came into effect. Its goal was to harmonize the protection of personal data across each of the various jurisdictions....

 08-08-2019 | 11:00 - 12:00 ET