Robert Brownstone recently launched his own law firm, tech consulting company, and law/technology education provider. An attorney for over 30 years (and a techie for 20 of them), he advises and trains clients on all things “e”, including eDiscovery, information-security, data-privacy and retention/destruction policies. He collaborates with clients as to tech solutions enabling their regulatory compliance and legal operations. Robert is a long-term nationwide advisor, conference chair, speaker, writer, and press resource on electronic information topics. He has taught Electronic Discovery Law and Process courses at four law schools around the country since 2009.
Recently launched a law firm, tech consulting company, and law/technology education provider
Attorney for over 30 years (and a techie for 20 of them)
Advises and trains clients on eDiscovery, information-security, data-privacy and retention/destruction policies
Nationwide advisor, conference-chair, speaker, writer, and press resource on many electronic information topics
Taught more than ten electronic discovery law and process courses at four law schools around the country
Nationally recognized lawyer and technologist Robert Brownstone will share step-by-step action items to improve your organization's cybersecurity practices. You will learn how to protect valuable proprietary and confidential data.
What You'll Learn
How should you establish and deploy data-security tools and practices?
What are the critical privacy/security legal principles?
Where are the scariest leakage locations?
Why is participant consent needed for recording an online meeting?
When should your organization develop a data-breach incident-response plan?
Renowned lawyer and technologist Robert Brownstone will demystify the sharp rise in data security risks in the present digital landscape and expose the latest tactics employed by hackers. Attendees will gain insights on safeguarding their valuable proprietary and confidential data.
Sessions Included:
Working Remotely/Working From Home (WFH)
Phishing, Spoofing, Ransomware, And Other Netiquette Issues
Nationally recognized lawyer and technologist Robert Brownstone will explain how hackers use phishing, spoofing, and ransomware to attack your organization. You will learn how to anticipate and stop the human errors that lead to security risks.
What You'll Learn
What are phishing, spoofing, and ransomware?
How can you prevent these types of attacks?
Why are HR and organization leaders more able than technology to stop threats?
How should employees verify communications asking for information are valid?
How do employees misuse social media, auto-complete, reply-all, and bcc?
What policies should you implement to mitigate risk?
Nationally recognized lawyer and technologist Robert Brownstone will provide a step-by-step guide to prevent and respond to data breaches. You will learn how to guide your team and communicate with internal and external stakeholders to protect your organization.
What You'll Learn
How do data breaches occur?
What are hackers trying to obtain? Why?
How can you prevent data breaches in your organization?
Who should be involved in the prevention effort?
What ten steps should you take to address a data incident?
Nationally recognized lawyer and technologist Robert Brownstone will reveal the many risks of storing data in the cloud. You will learn how to maintain the security of your organization’s information while benefiting from online services.
What You'll Learn
What security risks does storing data in the cloud present?
How can you improve the security of online data?
What areas are most hazardous?
Should you allow individuals to select applications and services outside IT?
What steps should you take to keep personnel files safe?
Nationally recognized lawyer and technologist Robert Brownstone will share real-time demos to demonstrate the confidential information lurking in many files and show you how to remove it. You will learn how to retain the security of the documents you share.
What You'll Learn
What metadata is stored in electronic files?
What applications generate and retain concerning details?
Why does the automatically stored data represent a security risk?
How can you avoid sharing confidential information?
What steps should you take to confirm the files you are sharing are clean?