Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 215
Sort by

Event
Phoenix: Extranets and Secure File Sharing: Safely Transferring Documents and Enhancing Collaboratio

Description Discover the capabilities of extranets and secure file sharing to make your firm more secure when transferring documents as well as delivering value in a client-driven world. In today’s fast-moving “adopt and adapt or die” world, there are certain essential technologies needed to...

 09-25-2019 | 12:00 - 13:30 MT
 Phoenix AZ


Library Entry
Deep Dive into the Dark Web

Take a guided tour into the Internet underworld, follow a security expert into the dark side of the web and learn how and why your firm's client data has become a multi-million dollar business for the criminal. See how it's marketed and learn why it's so valuable. Also learn what you can do to...

2 attachments


Library Entry
Patching Strategies to Stay Secure Without Losing Your Sanity

Come hear from peer firms who have found the sweet spot in defining the best practices around patch management. What are the important considerations you need to deal with and how do you balance your firm's tolerance for downtime, change, and risk when patching servers, applications, and...

Patching Strategies to Stay Secure Without Losing Your Sanity.mp3


Library Entry
Cybersecurity and the Partner: Roles, Requirements and Reporting

Law firms are charged with managing the needs of their clients, meeting regulatory obligations and protecting the interconnected third-party vendor network. Threats and vulnerabilities need to be addressed as they are discovered and mitigated in near real-time. Boards and executives are tasked...

2 attachments

ILTA Video's profile image

Event
Secure Vendor Privileged Access with SecureLink

Description Third-party remote access is a growing challenge amongst enterprise organizations. Historically they have relied on tools like VPN and desktop sharing, and while these tools may be great for internal employee remote access, they lack the ability to identify, control, and audit third...

 09-06-2019 | 12:00 - 13:00 ET



Library Entry
Locking Down Vendor Privileged Access Within Your Network

The legal industry faces an array of unique professional challenges: improving efficiency, ensuring confidentiality and maintaining client satisfaction. These challenges drive the use of new technology, which in turn changes the way law firms handle client information. With 63% of data...

2 attachments

ILTA Video's profile image

Event
San Francisco: Data Breach Incident Response: The Adversary in Your Network

Description The personal client information held by legal professionals is extremely valuable to cyber criminals and must be protected at all costs. Technology alone cannot protect you from a cyber breach, so it is important that law firms understand the importance of establishing and...

 07-24-2019 | 12:00 - 13:30 PT
 San Francisco CA


Event
Securing and Streamlining Vendor Privileged Access with SecureLink

Description Third-party remote access is a growing challenge amongst enterprise organizations. Historically they have relied on tools like VPN and desktop sharing, and while these tools may be great for internal employee remote access, they lack the ability to identify, control, and audit...

 07-26-2019 | 12:00 - 13:00 ET


Event
Locking Down Vendor Privileged Access Within Your Network

Description The legal industry faces an array of unique professional challenges: improving efficiency, ensuring confidentiality and maintaining client satisfaction. These challenges drive the use of new technology, which in turn changes the way law firms handle client information. With 63% of...

 07-09-2019 | 12:00 - 13:00 ET