Time for a Better IT Services Company?

Call (347) 460_-2238

Data/Cyber Security for Lawyers – Safeguarding Your Clients’ Information & Protecting Your Firm

rajnew

Data/Cyber Security for Lawyers – Safeguarding Your Clients’ Information & Protecting Your Firm

Monday, May 9th at 6:00PM EST
Location: Holiday Inn, Plainview, NY

Complete this form to download the NYSTLA presentation immediately

NYSTLA-img

May 9, 2016 (6pm – 8pm)

2 Law Practice Management CLE CREDITS

This seminar has been approved for transitional and non-transitional credits.

  1. IDENTIFYING THE THREAT
    1. Electronically stored data
      1. Individual desktop, laptop or tablet computers
      2. Smartphones
      3. Onsite servers, offsite or “virtual” servers
      4. The Cloud
    2. Hard copy, paper-based data, stored onsite or offsite
    3. Data held outside of the firm’s control
      1. Partners’ & employees’ personal devices; the “family computer”
      2. Use of Wi-Fi networks; secure and unsecure
      3. 3rd-party vendors, including electronic discovery
  1. TYPES OF DATA HELD BY LAW FIRMS
    1. Attorney-client privilege; privileged documents and email communications
    2. Case/litigation strategy, including settlement parameters
    3. Intellectual property
    4. Information about non-clients
      1. Adversaries
      2. Witnesses; expert and otherwise
      3. Employees
      4. General business data, including financials and banking information
  1. ETHICAL AND LEGAL OBLIGATIONS FOR LAW FIRMS
    1. Legal requirements, state-by-state
    2. Ethical obligation to safeguard data
      1. What is a reasonable standard of care?
      2. Is failure to protect data subject to disciplinary action?
      3. Is failure to protect data considered legal malpractice?
    3. Governmental inquiries and investigations
    4. Does your firm have a written information security policy?
    5. When was it last reviewed?
  1. SOURCES OF A DATA BREACH
    1. Offshore cyber-criminals; hackers – “The Boogeyman”
    2. Internal, inadvertent
    3. Internal, malicious
    4. Lost devices; the smartphone in the back of that taxicab
    5. Wireless communications; coffee shop Wi-Fi
    6. AFTER A DATA BREACH; NOW WHAT?
    7. Reporting obligations; to whom and how quickly?
    8. Notifying the Courts; adversaries
    9. Reputational issues; crisis management
  1. I.T. SYSTEMS AND POLICIES; AN OUNCE OF PREVENTION
    1. Why your current I.T. staff/consultants may not have your back
    2. 3rd- party security audits; “White Hats”
    3. Firewalls, anti-spam, anti-malware; who can keep track of all of this?
    4. Data encryption; Pro’s & Con’s
    5. Passwords; the good, the bad & the ugly
    6. The Cloud; what is it, exactly? Is it the answer to all of your concerns?
  1. INSURANCE ISSUES TO CONSIDER
    1. Coverage triggers and exclusions
    2. Coverage available under commercial general liability?
    3. What about professional liability?
    4. Coverage gaps and overlaps
    5. 3rd-party coverage vs. 1st-party coverage

Faculty:

Annamarie Bondi-Stoddard, Esq. – Chair
Pegalis & Erickson, LLC

Raj Goel
CISSP, Co-Founder & CTO, Brainlink International, Inc.

Bruce R. Swicker
Vice President, Lawyers Program, Frenkel & Company

Location
New York, NY
NYSTLA
132 Nassau Street, 2nd Floor
New York City, New York 10038
212-349-5890

Travel/Accommodations

Subway information:
2 or 3 to Park Place or Fulton Street
4,5 or 6 to Brooklyn Bridge
A or C to Broadway Nassau
R to City Hall

Visit Here for additional details

Have Questions About Your IT Or Cyber Security?

Brainlink Improves Client Business Using SOPs and RUNBOOKS

A key principle at Brainlink is that we are NOT the owners of our clients’ information – we are the custodian.

As a result, we have invested extensive resources in building Client Runbooks.

Find Out More Reach Out to Brainlink Below

Side Corner
Web Analytics