One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees.
This is very important training
Deepfakes can impact our relationship to information and the tools we use to work with it. How will this new horizon impact the trustworthiness of evidence and will the legal profession have the tools needed to test what they see or hear? What are the implications for the Rule of Law and our democracy?
Topics our presenters will cover include:
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
Reusing old documents with find and replace has a high margin for error and is slower than better, alternative methods.
Discover how to leverage the best of your intellectual capital to increase speed, accuracy and efficiency. Improved drafting methods directly impact the bottom line and improve client satisfaction.
Most attorneys in private practice are employed by law firms with fewer than 20 lawyers and, in fact, half of all U.S lawyers in private practice are solos. When e-discovery came on the scene, these attorneys viewed it as the exclusive domain of large firms with large cases in Federal court. But with the increase in digital activity by people in all areas of their lives, e-discovery has become an
Learn the ins-and-outs of collecting, analyzing, and recovering evidence from mobile devices. Discover how digital forensic capabilities have grown by reviewing real-world situations. What seems hidden may be revealed after all. Game on!
Participants can expect to learn the following during this session:
• Explore forensic process from preservation to reporting.
• Identify the latest types...
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...