ILTA Publications

2018 (Spring) Peer to Peer - Security, Information Governance and Data Privacy 

05-22-2018 11:04

We begin the year by focusing on processes, tools, and a multitude of administered organizational services, and their relationship to Security, Information Governance, and Data Privacy. 

To access the full Peer to Peer, please click on the image or link at the bottom of the page.

Table of Contents


Information Rights Management: The Missing Piece of the Puzzle? #Security
by Jeff Brandt

Connected Devices and the Increasing Regulatory Focus on Cybersecurity #Security
by John Tomaszewski

IG and Ediscovery: A Symbiotic Relationship #Security
by Ricky Brooman

AI Brings Technological Maturity to Email #Security
by Peter Darling

Will Need-to-Know Security Destroy KM? #Security #KnowledgeManagementandSearch
by Ben Weinberger

Best Practices

Meaningful IG: How to Implement Practical Solutions that Achieve Policy Goals #Security #PracticeManagementandPracticeSupport
by Darrell Mervau

Reconciling Need-to-Know Security with Successful Knowledge Management #Security #KnowledgeManagementandSearch
by Ian Raine

Your Recipe for a Delectable Security Awareness Program #Security
by Carolyn Humphreys and Eileen Whitaker

Case Studies

Why I Am a Big Security Ninja in a Small Security Pond #Security
by Betsy Horn

Why I Read Outside Counsel Guidelines #Security
by Jon Washburn

Building an Effective Defense on a Limited Budget #Security
by Frank Schipani

Ask the Expert

Protecting Your Law Firm: Two Experts (Michael Kolb and Zachary Peer) Discuss Website and Data Security #Security

Ask the Business Partner

What are your top three priorities around tools or processes to implement in 2018 regarding your organization’s data privacy policies?

Click to Access Full Publication

0 Favorited
0 Files

Related Entries and Links

No Related Resource entered.