beyond the fortress fortify your content before it travels beyond the firm walls

19
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Upload: maximillian-riley

Post on 03-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Beyond the Fortress

Fortify Your Content Before it Travels Beyond the Firm Walls

Page 2: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• Paul Domnick, Board of Directors, Litéra Corporation

• Michael Fick, Consultant, Enlitened Technologies

• Joy Heath Rush, Vice President, Client Development (Law Firms), Litéra Corporation

Our Panel

Page 3: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Clients demand

protection of material under law

firm control

Lawyers have a duty to protect client data

Law Firms are

perceived as easy

targets for bad guys

Firms share sensitive

information across

security boundaries

Framing the Issue

Page 4: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Law Firms as Cyber Targets

• Aggregate highly confidential information

• Most firms’ DM security is public by default

• Organized into client/matter folder structures

• Contain data from multiple organizations pertaining to one transaction/matter

• Perceived as less secure

Page 5: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• ABA Model Rule 1.6 - Confidentiality of Information. Require lawyers to keep confidential ANY information relating to the representation of a client.

• ABA Model Rule 1.1 Comment 8 - Competency. To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology

Ethical Responsibilities

Page 6: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• Lawyers are communicators• Lawyers access the most confidential information• Lawyers work as part of a team – need to collaborate• Lawyers work everywhere – sometimes in unsecured

environments• Lawyers are under severe client pressure• Lawyers communicate with third parties creating

content in motion• Lawyers’ duty to protect and manage client information

extends beyond the firm’s firewall

Why Does the Practice of Law Create Business Situations that Could

Compromise the Confidentiality of Client Information?

Page 7: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

What are Firms Doing to Protect their Client Information and Electronic Communications?

Source: A Study of the Legal Industry’s Information Security Assessment Practices, Sponsored by ILTA’s LegalSEC Team, August, 2013

Page 8: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• General security of the firm’s IT• Security of their data• At rest/in motion

• Comingling • Auditable defense • Adherence to regulatory requirements

Client Audits – Spotlighting Concerns

“If you don’t understand what your clients expect of you, then you cannot invest in the appropriate level of protection and make informed decisions about risk.”Law Technology News – April 7, 2014

Page 9: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

What Clients Expect Law Firms To Do

Page 10: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Protecting the infrastructure and the edge is critical, but what about the actual data …

The General Approach Taken by the Industry – Protect The Infrastructure

Page 11: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• EmailHow can the firm protect the future of the email message beyond the initial transmission?

• Deal RoomsHow can the firm control the file after it has been downloaded onto foreign network?

• Drop Box/iCloudHow can the firm protect the client when content proliferates beyond the firm’s control?

• Mobile DevicesHow can the firm protect content on mobile devices, removable media and home PCs/Macs?

• Human FactorHow can the firm protect against the busy lawyer that does not abide by firm security policies?

Some Other Things to Consider When Protecting Client Data

Page 12: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

•  Why Digital Rights Management (DRM) • Protect what is ‘yours’ from misuse• Misuse is accessing confidential information

without authorization• Enables proactive control over content• Extends content custody beyond the perimeter

Digital Rights Management – The Next Level of Threat Protection

Page 13: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

What is the Security-Convenience Equation when Dealing with Content in Motion?

Page 14: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Secure File Transfer• Integrated into email• No file size limits• Available on mobile• Send and receive files• Full audit trail

Secure Collaboration• Full content control• Simultaneous edits on a single document• Side by side view of all changes• Custody retained• Full audit trail

The Collaboration Landscape – One Size Does Not Fit All

Email and Attachments• Professional

attachment management

• Reply all and BCC protection

Secure File Synchronization• 2-way exchange of shared

folders• No file size limits• Granular security• Full audit trailFrequency of interaction

Confidenti

alit

y

Page 15: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

• Make it easy for lawyers to do the right thing.... Convenience breeds compliance

• Prioritize defenses based on the balance of risk involved

• Protect the content as well as the perimeter• Booby-trap the data – Snapchat for

documents• Think of outbound risk as well as perimeter

defense

How Can Firms Begin to Fill the Gaps?

Page 16: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Share only what they want to share

Share only with whom they want

Share only when they

want

Share only how they want to share

Imagine A World Where Lawyers...

Page 17: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

From Michael:Despite continuous monitoring, robust defense and awareness of network activities the bad guys will get in. 1. Security is a team sport … educate users on how to

play defense and support them with the right tools 2. Focus on controls to manage content and risk of

data exfiltration3. Know what is leaving the firm, protect it in motion

and manage it when it lands outside the firm

Three Take Aways...

Page 18: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

From Paul

1. Habitual protection of content that is easy, mitigates risk

2. One size does not fit all 3. Building a fortress from infrastructure up is

essential but not enough. You must also build from the people and the content down

Three Take Aways...

Page 19: Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls

Thank You!