Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security A Consultants Perspective August 25, 2004 Potomac Consulting Group Don Philmlee, CISSP.
Advertisements

Chapter 1 Business Driven Technology
Child Safeguarding Standards
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
The Internet of Riedwaan Bassadien Platform Strategy Manager Microsoft Everything Your things.
Operational Risk RJ Hodkinson – IT & Operations Director.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Responding to the Threats: How training can help protect financial services businesses Martyn Oughton.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
 DB&A, Knowledge Management Within and Across Projects June 15, 2012 INNOVATION for a better world.
Boost your network security with NETASQ Vulnerability Manager.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Name.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Helping people work more effectively. confidential SMB SaaS Applications - that Create Long-Term Revenue Thomas Furr CSO, Smart Online, Inc.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Transport Development and Solutions Alliance (TDSA) Technology Evolving Business Functions Scott Lawton – Chief Executive Officer 7 th of August 2015.
The Road to Transaction
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
©2015 EarthLink. All rights reserved. EarthLink overview.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
INSTANT PEOPLE INSIGHTS Injazat partners with Qlearsite to bring ‘People Analytics’ to Leaders across the UAE. The art of leadership is getting a boost.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
Gaining Unprecedented Visibility into Microsoft Dynamics CRM with Halo’s Pipeline Advisor, Powered by the Microsoft Azure Cloud Platform MICROSOFT AZURE.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
What you will learn “How to go online and be successful” The Landscape The Website Getting Found Managing Your Customers Automation.
Secure Services Shared Hosted MS Exchange 2010.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
#SummitNow Using Alfresco and Cloud Apps in Harmony 5 th November 2013 Santiago Rodríguez Antonio D. Pérez.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Law Firm Data Security: What In-house Counsel Need to Know
Deployment Planning Services
Using Alfresco and Cloud Apps in Harmony
Healthcare Cybersecurity: State of Industry
Responding to Intrusions
Originating the role of Information Governance Officer
General Data Protection Regulations: what you really need to know
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Chapter 3: IRS and FTC Data Security Rules
Office 365 Security Assessment Workshop
All data occupies physical space, even if we don't think of it as such.
SMB practice development: Security play
Security Essentials for Small Businesses
SMB practice development: Security play
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Neil Kirton and Zoë Newman
Agenda Macro-Industry Trends Industry Technology Trends
The Secure Contingency Plan
The CPA Firm Of NOW! June 8, 2017.
Microsoft Data Insights Summit
Protect data in core business applications
Business Case Template
Presentation transcript:

Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton, Inpractice UK Management Solutions Blog

What I mean by “the Cloud” Moved on? Where is the risk? Today’s “Cloud” is not fluffy. Talking “Hosted applications” NOT about your IT Infrastructure

Overview Technology has come a long way. Cloud is good, but only if lawyers protect against risks. We want clients to use Cloud applications to access “ready to use” technology to fill gaps, but spend time in quickly putting them to work. But … many law firms have not equipped themselves effectively yet. Need to change to be able to harness new tools to support and develop your business more effectively. Your own people are the biggest risk – so not just about cloud. Negligence and malpractice. What should you do about it?

What IT do Lawyers need?

Why adopt Cloud applications? You are already there … to some extent Cloud services help us make more happen, more quickly Frees up time to focus on what really matters – Work, process – Clients, relationships, value Potential to do more But need to do it with confidence Harness its full potential

LinkedIn & Twitter

What do employees know?

How would you characterise the following challenges in relation to your organisation’s use of cloud services?

Moving to the Cloud?

KPI Dashboards – Data Warehouse Go here for more informationGo here for more information >>

Microsoft Dynamics CRM Go here to explore making it work for you Go here to explore making it work for you >>

Automated time capture Use this to improve productivity and process – not just bill more Use this to improve productivity and process – not just bill more >>

Aligning Goals, Managing performance, projects … Go here to arrange a demonstration Go here to arrange a demonstration >>

Market Intelligence

BI 24 – Business Intelligence More information on BI24 here More information on BI24 here >>

What the suppliers say … “For law firms, the challenge is that they are trying to weigh up the costs of implementing solutions against the perceived threat and the value the firm will receive. This can be difficult for partners to understand. However one breach could bring down the whole firm. One of the big areas of concern in my opinion is the education of staff and their understanding of security not only in terms of IT but PII security – it is a long road but the journey really does need to start.”

2015 Data Breach Industry Forecast “We expect … an increase in breaches involving the loss of usernames, passwords and other information stored in the cloud … as more information gets stored in the cloud and consumers rely on online services for everything from mobile payments and banking to photo editing and commerce, they become a more attractive target for attackers. … an increase in hackers targeting online credentials such as consumer passwords and usernames to gain keys to the castle; with the likelihood that compromising one record can often give access to all sorts of other information stored online.”

“Despite all signs pointing to employees as the largest threat to a company’s security, business leaders will continue to neglect the issue in favour of more appealing security technologies in As a result, many companies will miss the mark on fighting the root cause of the majority of breaches. Organizations that implement regular security training with employees and a culture of security committed to safeguarding data will be better positioned for success.” 2015 Data Breach Industry Forecast

All Business

Tools to support the business All potentially hosted (SAAS) somewhere … NOW! – Business Intelligence and KPI reporting (BI24, Exen) – Conveyancing Searches e.g. Search Acumen – Case management e.g. Ochresoft – CRM – e.g. Microsoft Dynamics CRM, Salesforce – VoIP – HR, performance management – Online Training – Microsoft Office 365 – DropBox – Document management – Practice management systems – …

Conclusions Don’t let this stop you using the technologies Catch up on making their use safe Engage your people Make these tools work for you

Do more to catch up now Invest in data security e.g. ISO Know what’s in the Cloud, identify sensitivity (personal data, price sensitive etc..) and evaluate risks. Assess impact of breaches - confidentiality, integrity, or availability (but apply to on-premise too) “Appropriate” pressure on your Cloud service suppliers – Rights of audit, provision on insolvency/termination, their data security provisions Penetration and vulnerability testing Define user policies, educate people and enforce Protect passwords HTTPS, encrypt data, s and attachments Passwords by SMS or letter

If you would like us to discuss this further with your team, please contact … Allan Carton Inpractice UK blog.inpractice.co.uk blog.inpractice.co.uk