Print Page   |   Report Abuse
Practical Cybersecurity for Lawyers and Law Firms
Tell a Friend About This EventTell a Friend
Practical Cybersecurity for Lawyers and Law Firms

3 hrs. CLE/1 hr. Ethics

12/9/2015
When: 12/9/2015
8:30 AM - 12:00 PM
Where: Barnes & Thornburg
11 S. Meridian St.
Indianapolis, Indiana  46204
United States
Contact: Amy Starzynski Coddens
812-856-4458

« Go to Upcoming Event List  

Sponsored by Indiana University Center for Applied Cybersecurity Research

 

Practical Cybersecurity for Lawyers and Law Firms

3 hrs. CLE/1 hr. Ethics

 

Click here to register for this event. Registration is required and closes after December 2.

 

Lawyers of all fields of practice have a pressing practical need and ethical duty to effectively maintain confidences, communicate with reasonable security, and maintain efficient, responsive business operations. While those duties remain the same, information technology and a growing array of threats have made the lawyer’s life more challenging. The purpose of this CLE event is to inform individual lawyers, law firm management, and law firm IT management of critical, doable best practices and available resources for establishing cybersecurity programs (including governance and risk management structures), securing client information, and ensuring the integrity, availability, and practical usability of the firm’s information systems. Each module will address the Rules of Professional Responsibility that dovetail with the topics covered. Experts from Indiana University’s Center for Applied Cybersecurity Research will provide detailed input on practical steps lawyers and firms can take today to improve their security and meet their obligations. The event is presented at no charge by Indiana University's Center for Applied Cybersecurity Research (CACR) and graciously hosted by Barnes & Thornburg in Indianapolis.

 

Agenda

 

8:30 - 8:45 

   

Barnes & Thornburg Welcome and Introductions

     

8:45 - 9:15

 

 

 

 

 

 

 

   

A Brief History of Relevant, Contemporary Cybersecurity


     Topics include:

     - How and why lawyers and law firms are a target
     - Relevant Rules of Professional Responsibility
     - Core principles and truths of contemporary cybersecurity
     - The move to risk-oriented approaches

     

9:15 - 10:15

 

 

 

 

 

 

 

   

Twelve Things Every Lawyer Should and Can (Really) Do

 

     Topics include:

     - Alleviating password woes
     - Identifying phishing attacks
     - Sending email securely, and services to use
     - Storing confidential data

     
10:15 - 10:30      Break - Coffee, Soda, and Water Provided by Barnes & Thornburg
     

10:30 - 11:30

 

 

 

 

 

 

 

 

   

Things Every Firm Should Consider

 

     Topics include:

     - Risk management governance roles and process
     - Key internal policies
     - Two-factor authentication
     - When and what security to outsource
     - Educating the firm’s personnel

     

11:30 - 12:00

 

 

 

 

 

 

 

   

Think Like a Lawyer Techie: Bridging the Literacy Gap

 

     Topics include:

     - Describing a problem in a way that will get it solved.
     - Communicating risks and risk decisions.
     - Avoiding shadow IT
     - Resources and supporting organizations

 

Speaker Biographies

 

Craig Jackson (scjackso@iu.edu) is Senior Policy Analyst at Indiana University's Center for Applied Cybersecurity Research (CACR), where his research interests include risk management, information security program development and governance, legal and regulatory regimes’ impact on information security, and identity management. He leads engagements and authors guidance for the Center for Trustworthy Scientific Cyberinfrastructure (CTSC); he is policy lead of the security team for the DHS-funded Software Assurance Marketplace (SWAMP); and he is part of the DOE-funded XSIM (Extreme Scale Identity Management) project. He is a graduate of the IU Maurer School of Law (J.D.’10) and IU School of Education (M.S.’04). As a member of the Indiana bar, Mr. Jackson has represented government and corporate clients in constitutional and tort claims. His research, design, and project management background includes work at IU School of Education’s Center for Research on Learning and Technology and Washington University in St. Louis School of Medicine. He is a member of Phi Beta Kappa, and was a Lien Honorary Scholar at Washington University in St. Louis.

Susan Sons serves as a Senior Systems Analyst at Indiana University's Center for Applied Cybersecurity Research, where she provides leadership and technical expertise to a number of scientific projects engaged with the Center for Trustworthy Scientific Cyberinfrastructure (CTSC), leads the software security effort for operations of the HDS-funded Software Assurance Marketplace (SWAMP) project, and runs several series of training programs on topics such as software security, cybersecurity program development, developer security hygiene, and implementing cryptographic controls on software distribution channels. Susan keeps firmly grounded in operational software development and information security practice in her roles as Director of the Internet Civil Engineering Institute (ICEI), team lead on the Information Security for Shared Infrastructure (ISSI) project, and Information Security Officer for the Core Infrastructure Initiative funded NTP Security project.

 

This event will be presented at no charge.

 

Click here for more information.

Membership Software Powered by YourMembership.com®  ::  Legal