Skip to content

[Webinar] Cybersecurity: How to Protect Your Law Firm Data

webinar - law practice management design and workflows

Data security, privacy protection, and information governance are inextricably linked to the attorney-client relationship. Lawyers must overcome their aversion to technology and understand that protecting data is not just the IT department’s responsibility, but theirs as well, as lawyers are stewards of their own, their clients’, and their firms’ data.

When: Wed, May 27, 2015 12:00 PM – 1:00 PM EDT
Speaker: Jenn Topper

Click here to register!

In this FREE presentation, learn insights and tips on how to better understand the data security environment from a lawyers’ perspective and how you can best communicate to clients the need for secure information governance. You’ll be prepared to answer the following questions that are being asked by corporate counsel and other prospective clients:

  • Is your firm positioned to handle my data securely?
  • What are your firm’s protocols?

About the Speaker:
Jenn Topper advises clients and works closely with law firms on the operational and organizational elements of privacy and data security. She provides guidance on enterprise risk management with respect to cybersecurity best practices and the implementation of privacy and data security programs and compliance.

Jenn has spent the majority of her career in professional services helping lawyers establish and execute innovative and sustainable business planning and business development, legal project management, marketplace analysis, and communications. She is a frequent speaker and author on issues relating to the execution of privacy programs, and the effect of regulatory and legislative changes on data security and privacy. She is a member of the International Legal Technology Association and International Association of Privacy Professionals. Among the many articles authored by Jenn, are: Data Security to Differentiate Your Practice and A Data Security Checklist for In-House Counsel.

Tags: