On-Demand: October 14, 2024
Select Your State Below to View CLE Credit Information
Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs
When it comes to IT at firms of all sizes, the security of data should be the No. 1 concern.
For smaller firms, setting security measures that are as seamless as possible can be a challenge, and often talent, technical, or cost prohibitive. With the dawn of artificial intelligence platforms, increasing business climate challenges within the legal profession, and relentless security adversaries, understanding the risks and how to mitigate them become paramount.
This is true if they manage their own system either on-premises or manage a cloud or hybrid infrastructure. There is much to do, and much to be on top of each day, as every firm’s practice is built on technology that must be effective.
A new study by iManage and Above the Law, depicting the high stakes balance between security, productivity, and collaboration, provides new data on the specific challenges firms of all sizes are facing.
Join us for this CLE-eligible webinar, where a panel of tech experts will detail these findings – to include where to begin in the process, how to build and control a budget that makes business sense, and how your firm can be ahead of business impacting risks.
Key topics to be discussed:
This course is co-sponsored with myLawCLE.
Closed-captioning available
Joe Ficocello, CISSP | Founder @ Cynaxus
Joe has 24 years of experience in the technology field, specializing in law firm IT within positions of senior management & executive leadership.
Joe currently provides technology and security consulting services to clients across 14 practice areas, with a focus on strategic planning, organizational alignment, innovation, team development, and cloud solutions. Joe has over 30 certifications, to include three cloud environments and in Microsoft’s Artificial Intelligence (AI) platform. Joe completed his undergraduate degree at The College of the Holy Cross, his Master’s degree in Management from The Catholic University of America, a graduate certificate from Villanova University in ITIL, Information Security, and Project Management, and his Six Sigma certification from the University of Notre Dame.
John Verry | CBIZ Pivot Point Security
As CBIZ Pivot Point Security’s Managing Director, John Verry guides organizations on the path to becoming provably secure and compliant. Over the past 21 years, he has led hundreds of security engagements across diverse industries, including government, legal, telecommunications, critical infrastructure, finance, and transportation. A popular speaker and recognized thought leader, John offers insight for both business and technical audiences.
He is an ISO 27001 Certified Lead Auditor, Certified Third Party Risk Management Professional, and Certified Information Systems Auditor. John holds a Bachelor’s Degree in Engineering from Stevens Institute of Technology and is the host of The Virtual CISO Podcast, Pivot Point’s Security Awareness Education platform. A family man and foodie with a penchant for pop culture references, John deftly mixes wit and wisdom while sharing his deep knowledge of cyber security.
Joe Patrice | Above the Law
Joe Patrice joined Above the Law in 2013. Joe received a degree in Economics and Political Science from the University of Oregon and a J.D. from the NYU School of Law. From 2001, he worked as a litigator for both Cleary, Gottlieb, Steen & Hamilton and Lankler Siffert & Wohl, representing a variety of individuals, institutions, and foreign sovereigns in criminal and civil matters. Joe left legal practice in 2012 to pursue writing, contributing to numerous publications, including ATL, before joining the full-time staff.
I. The current threat landscape, and the challenge of hybrid and remote working | 1:00pm – 1:20pm
II. Securing innovation and the client experience | 1:20pm – 1:40pm
III. Managing the three pillars of risk – the external, insider, and unknown security threats | 1:40pm – 2:00pm
Break | 2:00pm – 2:10pm
IV. Transitioning to a more secure technology infrastructure | 2:10pm – 2:50pm
V. Alignment of people, process, and technology, within budget boundaries | 2:50pm – 3:10pm