Home

Your solution to legal security business challenges

15-17 JUNE 2020

The NEW LegalSEC Summit Virtual Experience 2020 offers dynamic keynotes, 9 professional education sessions, ask the expert chats, and a virtual exhibit hall with business partners to focus on the information security challenges faced daily by the legal industry, and now more so than ever!

REGISTRANT ACCESS TO RECORDINGS

Registrants may visit the LegalSEC 2020 Online Community to find the session recordings and materials. More information coming soon about purchasing session recordings!

Who Should Attend

LegalSEC Summit is designed for technology professionals at every level who manage security, governance, risk, and compliance in support of the practice of law.

IT Leaders with Modest Resources
Dedicated Security Professionals
Law Firm Senior Management
Key topics covered:
  • Client Questionnaires and Audits

  • Endpoint Security Controls

  • Business Continuity and Vendor Contingency Planning

  • Cloud Authentication and Identity

  • Retrofitting Security into Your Remote Environment

  • Data Loss Prevention and Detection Solutions

  • The New Normal After A Global Pandemic

Virtual Summit Agenda

All agenda times are listed in Central Daylight Time (CDT).
Daily start times are: 10:00AM ET, 7:00AM PT, 14:00 GMT, 12:00AM AEST

CHECK YOUR LOCAL TIMEZONE

9:00 AM Virtual Conference Opens

Welcome Message and Exhibit Hall

10:00 AM  Keynote: Preparing for the Long-Term Work From Home (WFH)

Be a part of the mission to drive the industry forward and make your firm a more secure place! We are excited to announce David J. Kennedy, Founder, TrustedSec and Binary Defense as the 2020 Virtual LegalSEC keynote speaker. David’s forward-thinking vision and expert advice during the LegalSEC Summit will assist the legal security community to activate and excel the future of cybersecurity.

learn more »

11:00 AM Break
11:30 AM Virtual Roundtable: The New Normal After A Global Pandemic

Join us for this virtual roundtable discussing the information security lessons learned, and cyber resilience strategies your organization should consider next before pivoting to a focus of what is beyond the COVID-19 situation.

12:30 PM Ask the Expert Chat, iManage: Aaron Rangel, Director, Product Management

Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with iManage’s expert.

1:30 PM Session: Retrofitting Security into Your Remote Environment

In response to the COVID-19 crisis, many of us have spun up new collaboration systems, expanded remote access, and/or deployed remote access to staff not accustomed to the security implications of remote working. This session will explore what organizations did ahead of time to mitigate associated risks or what has to be done now to “close the barn door” once the security horses have escaped.

2:30 PM Break

3:00 PM Session: Business Continuity Planning

So you've implemented a plan to collect comprehensive backups. You've given lawyers laptops so they can work from home. And suddenly POW you now have a global pandemic. Were you ready? Could it have worked better? Are you a hero that just earned at least a couple years of (near) automatic budget approval?

This hour will focus on Business Continuity Planning (BCP), and how you incorporate your vendors into those plans. We'll cover Business Impact Assessments and how they form the foundation of your BCPs, as well as supporting plans such as Disaster Recovery, Incident Response and Emergency Communication plans. We'll spend some time on testing plans - both your testing, and how to verify your vendors are testing too - and how you can use those tests to inform the selection of infrastructure, backup service providers (if necessary) and the possible modification of policies for the duration of the event - or maybe even permanently. Finally, we'll provide some pointers on effective plan maintenance (hint: tabletop exercises and risk assessment will be a part of it ...)

4:00 PM Exhibit Hall / Networking Break

9:00 AM Women Who Lead Present “The Daredevil Prescription”

Join us in the ILTA Lounge as Kaveri Subbarao Nauhaus, Senior Counsel & Director, Litigation at Clark Hill PLC, speaks about breaking down the real barriers to focus on what you truly want…and position yourself to go get it!

We’ll explore leveraging meaningful risks to your advantage and the truths that are revealed by doing so – the obstacles you think are in your way of those big aspirations may not be the ones you think they are. Isn’t it time you channeled your inner Evil Knievel and redefined risk for yourself? Your empire is waiting.

10:00 AM  Keynote: Beyond Prevention — How to Keep Sensitive Information Safe with Active Monitoring

Mary Singh is a Senior Detection & Response Engineer at Expel. In this role she develops rules and strategies to detect and respond to security events on network, endpoint, and cloud.

She's a recovering consultant-turned-engineer with 17 years of experience in information operations, intrusion detection and incident response. Prior to Expel, Mary worked at Mandiant, investigating over 100 security incidents involving the federal government, defense industrial base, and Fortune 500 companies. Prior to Mandiant, Mary conducted attack prevention, detection, and vulnerability assessments in the U.S. Air Force and as a consultant with Booz Allen.

11:00 AM Break
11:30 AM Session: Best Practices for Cloud Authentication and Identity

Are you ready to move some of your applications to the cloud? How will you manage your identity and access and extend your authentication and access from on-prem to cloud applications?

In this session, you will learn some of the best practice and architecture to design a cloud identity, through a product similar to Azure AD. We will also discuss some of the common cloud misconfiguration that would lead to unauthorized access.

12:30 PM Ask the Expert Chat, NetDocuments: Alvin Tedjamulia, CTO and Co-Founder

Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with NetDocument’s expert.

1:30 PM Session: Endpoint Security Controls

With phishing attacks on the rise, and with AI and bots attacking endpoints with no signs of slowing, developing and continuously improving your endpoint security strategy should be a significant component of your overall cyber security strategy. Studies have shown that a majority of breaches originate at endpoints. How do you protect yours?

2:30 PM Break

3:00 PM Session: The Other Guys – Locking Down Your Peripherals

A look at how to lock down various devices on your networks and what typical vulnerabilities you see in them. Incorporate vulnerability scans, typical devices that need attention, and best practices (changing default usernames, removing SSL/TLS1, SNMP, etc.). Spend some time on videoconferencing and how to secure that traffic, deal with outside spam callers. Granting access to service vendors. A look at some traditional security holes and resolutions with these devices, including scanning devices, plug ins, copiers, printers, phones, audio listening devices, and other IoT devices.

4:00 PM Ask the Expert Chat, Arctic Wolf Networks: Brian Van Den Heuvel, Principal, Presales Systems Engineer

Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with Arctic Wolf Networks’s expert.

9:00 AM Ask the Expert Chat, NetDocuments: Alvin Tedjamulia, CTO and Co-Founder

Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with NetDocument’s expert.

10:00 AM  Keynote: Top Security Myths, Busted

Alvin Tedjamulia is the Chief Technology Officer at NetDocuments. As an original co-founder and industry thought leader, Alvin sets the technology vision for the company and frequently speaks on topics of security, innovation and technology adoption.

11:00 AM Break
11:30 AM Session: Optimizing Your Data Loss Prevention and Detection Solutions

This session will take a look at all the parts of a DLP/D solution, and what firms are doing with least privilege access, e-mail control/monitoring, DMS export control/monitoring, file transfer services, removable drives, and information asset inventorying. Hear how organizations are building a DLP program and addressing the people, process, and technology components to have an effective and efficient program.

12:30 PM Ask the Expert Chat, Attivo Networks, Helena Belem Kuly, Director, Technology, Industry and Partner Programs and Joseph Salazar, Technical Marketing Manager

Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with Attivo Networks’s expert.

1:30 PM Session: Streamlining Client Questionnaires and Audits

This session will take a comprehensive look at how small and large firms address client questionnaires, audits, and Outside Counsel Guidelines. Examine how to mature the process to be consistent, automated, and repeatable

2:30 PM Break

3:00 PM Session: The Poor Man’s Security Operation Center (SOC) – Tools and Resources for Analysis

Security is hard. Analysis is hard. Environments with a mature security posture or a team of dedicated security employees can spend thousands if not millions of dollars every year on the tools necessary to gain visibility and insight into the bombardment of threats seen on a daily basis. All law firms may not have the budget to buy shiny new tool, however the need exists to perform basic threat intelligence tasks. For those who need quick and actionable results, there are a plethora of open source and free tools available to security people for threat hunting, sandboxing, static analysis or reputation checks.

4:00 PM Exhibit Hall / Networking Break


CLE, CISSP and PMP Accreditations


We are actively seeking CLE, CISSP and PMP accreditation for our expert content. Most, if not all, of this content should be eligible for self-reporting to meet any certification requirements for many certifications you may hold.

Online Registration is Closed

Online registration closed as of June 6. Please contact events@iltanet.org if you have registration questions or are still interested in attending.

Non-Member Pass

  • open to non-members and consultants
$ 250USD

 

Member Pass

  • 3-day pass discounted rate for ILTA members
$ 185USD

 

Team Pass

  • up to 10 connections from the same firm
$ 999USD

 

All cancellations are non-refundable. If you need to cancel, please contact events@iltanet.org, or fax 312.533.4110 or via USPS to ILTA Event Cancellation 159 N. Sangamon, Suite 200 Chicago, IL 60607.

2020 Summit Chairs


All of the educational content is inspired and developed by a volunteer planning committee of your peers.

SEE THE FULL COMMITTEE



EXECUTIVE CHAIR
Adrian White 
Chief Information Officer 
WilmerHale
 


EDUCATIONAL CO-CHAIR
Eric Anderson
Director of IT
Seyfarth Shaw LLP



EDUCATIONAL CO-CHAIR
Gary Berger
Director, Information Security
Ogletree, Deakins, Nash, Smoak & Stewart, P.C.


EDUCATIONAL CO-CHAIR
Karen Campbell
Director, Global IT Operations
Simpson Thacher & Bartlett

Check out what happened at #LegalSEC20


View the 2020 Wrap Up