At iManage ConnectLive 2022 in Chicago

On October 12th and 13th, iManage held their first in-person ConnectLive conference since 2019. It was at the Willis Tower in iManage’s home town of Chicago. Attendance was very good. Attendees reported that they were very pleased with the content of the sessions. The venue, Convene in the Willis Tower, was wonderful, adding to the friendly ambiance.

Meredith Williams-Range and Neil Araujo at iManage ConnectLive, Oct. 12, 2022

One of my favorite sessions was a fireside chat between Meredith Williams-Range, Chief Knowledge and Client Value Officer at Shearman & Sterling, and Neil Araujo, iManage’s CEO and co-founder. Ms. Williams-Range is a leader in the world of digital knowledge management. In 2018 Williams-Range arrived at Shearman and Sterling, a firm founded in 1873. The firm had one billion documents in locations across the globe, an aged document management system, and very little process around associating files with a Client-Matter and filing to DMS.

They studied the way forward and decided that they would migrate to a cloud-based document management system. This was not a minor decision for a Big Law firm in New York City. Risk averse clients, including those in financial services, have historically been opposed to cloud storage. However, the team worked with their clients to educate them about the change. Ultimately, there was no client resistance. Kudos!

Of course, then COVID hit. Their decision served them well. They were able to migrate to iManage’s Work 10 Cloud during the pandemic. The migration was a success.

For more background on Ms. Williams-Range’s pioneering career and her work at Shearman, I recommend this Profile Magazine spotlight, Meredith Williams-Range Builds the Law Firm of the Future.

To all of the attendees, heavens, it was wonderful to see you again and to show you the latest enhancements in our LINK app. I have to say that the most appreciated new feature in our LINK app was automated check-in after editing.

Here’s what I mean. In our LINK app, check a file out of iManage Work. Edit it in the Word app. Then there is an easy process for the lawyer to check the edited version back into iManage Work. But…if the lawyer does not check the edited version into iManage Work, LINK will automatically check it in. Voila! Lots of love for automatic check-in.

ConnectLive 2023 may be back in NYC. We’ll see you there!

-Maureen

Your Network Has Been Locked: What I Learned at ILTACON 2022

It was wonderful to meet with you all! Last week was the first fully in-person annual educational conference of the International Legal Technology Association (ILTA) since 2019. ILTACON is truly an event of peer-to-peer sharing. Many of the members have relationships dating back decades. Having an in-person event again was fantastic.

Security was one of the most in-demand topics. There were sessions on phishing, ransomware, breaches, and solutions. Here are three takeaways from sessions which I attended on what to do when a breach occurs. Note: I am not a cybersecurity expert. These are commonsense points which anyone can learn from.

Darkside Ransomware Email – Source: Acronis
  1. First Call

At 10 PM on Saturday night, Asher in Support gets a call from an attorney who says, “I’m looking at a screen which says, ‘Your network has been locked!'” Asher was educated to escalate any such messages immediately. Let’s assume that this message gets to the CIO within minutes.

Who does the CIO call first?

  • Is it a contracted or pre-vetted cybersecurity services provider?
  • Is it the cybersecurity insurance carrier?

In a session which included both a panelist from a top cybersecurity services provider and a panelist from a major cybersecurity insurance carrier, each argued that they should be the first call. Each may have distinct objectives.

The cybersecurity insurance carrier will immediately send in their SWAT team. This expertise may be quite welcome at the law firm. A good carrier will bring great expertise to bear. At the same time, law firms report that when the insurance carrier team arrives, they lose control of the process. The firm IT team may be sidelined, by contract. The insurance company may have as its top priority forensics. One of their objectives is to discover if the law firm were out of compliance with the policy.

The cybersecurity services company will also send in their SWAT team and bring great expertise and experience to bear. If the firm has vetted the services company their objectives should be aligned with the law firm’s.

Objectives include stopping exfiltration of firm data and business continuity. Law firms will want to safely get back to business-as-usual as quickly as possible.

2. Breach Counsel

One of the first things that the cybersecurity insurance carrier will do is to get their breach counsel engaged in the process so that communications are privileged. Law firms are uniquely positioned to get their own attorneys involved. Whether it is the insurance carrier’s attorney or a firm attorney, involve an attorney on all communications immediately. There will be public communications following the breach and perhaps legal action. Need I say more?

3. CIO Fiat to Shut Down Systems

When there is a breach, time is of the essence. Data may still be exfiltrating. While no law firm wants to do so, the best action may be to shut down all systems immediately. The moment when the firm’s data is flowing out to the hackers is not a good time to educate and negotiate with the firm’s executive team regarding shutting down systems. The CIO should have clear authority in advance to shut down systems.

Bonus: Have a Plan

Your firm is a target. Services, like Dark Utilities, make it easy for hackers to to set up a command center (C2) for malicious operations. Prices for C2-as-a-Service start at EUR 9.99. Easy, inexpensive tools mean that firms of any size are a target for “drive-by” attacks.

Even while your full incident recovery program is in development, it’s time well-spent to have a plan for the three points above in order to respond quickly.

One of the benefits of ILTACON is that we learn what has worked for other law firms in real world settings. Each firm should assess their own response plan.

See you in Orlando at #ILTACON23!

-Maureen

IRM Master Class at ILTA>ON

Learn about Information Rights Management – what it is and how it is implemented – on Wednesday, 8/26/2020, at ILTA>ON.

Our CEO and Chief Architect, Seth Hallem, will be presenting an educational Master Class on using Information Rights Management to prevent data leakage at ILTA>ON. Note: this is an educational session, not a promotion of our LINK app.

What You Will Learn

What is Rights Management? This class will dive into what rights management is, how it works, and who the major providers are. The introduction to the class will discuss the goals of Information Rights Management, what specific security problems IRM solves, and some of the major challenges IRM presents, particularly focused on how to navigate the trade-off between protection and practicality with IRM technologies.

Microsoft (Azure) Information Management: We will then spend the second portion of the class diving into Microsoft’s Information Protection (formerly known as Azure Information Protection) technologies, how those are implemented both on-premise and with Azure, and how they work for documents and emails. In this section we will dive into the architecture of Microsoft’s Information Protection, the benefits/disadvantages of this architecture, and how this particular implementation fulfills the security promises of IRM outlined in part 1.

Challenges with IRM: We will also dig into the challenges with IRM, and why IRM has not yet become a standard requirement for a secure enterprise.The class will conclude with a step-by-step outline for how to get started with Microsoft Information Protection. The goal of this section is to provide enough hands-on details to allow the attendees to get started down the IRM path with a clear vision of how it works, how to get started, and how to manage the trade-offs between security and flexibility based on the protection requirements for a particular client or matter.

When: Weds., August 26, 2020 at 11:30 AM – 12:30 PM CT / 5:30 – 6:30 PM BST

Where: ILTA>ON Registrants will join via Zoom

Bonus: All attendees will be entered in our drawing for a $200 Amazon Gift Card.

Recording: If you would like a link to the recording after Aug. 26th, email me at [email protected] or request it via the ILTA>ON platform.

-Maureen

Mobile Helix Sponsors iManage ConnectLive Virtual 2020

We are very happy to be a sponsor of iManage’s first virtual ConnectLive. Join us from the comfort of your own home. 🙂

ConnectLive Virtual is free to iManage customers, unlimited people from your company. But you must register in advance here.

ConnectLive Social image

Our LINK encrypted app includes full access to iManage Work®. With LINK, attorneys and professional staff can easily work with document-centric workflows on smartphones and tablets.

At ConnectLive we will be showing our new custom workflows, including paperless pre-bills. Talk to us to see how you can use features like LINK’s in-app annotation and integration of Work and email to automate tasks.

Here is an example of what can be done in the LINK secure container app:
– Receive an email with an attachment.
– Compare the attachment to a file in iManage Work.
– Annotate the redlined version.
– Email the annotated document.
– If desired, also check the annotated document into DMS

LINK provides:
– In-app annotation
– In-app comparison
– High fidelity document viewer
– Email (Exchange Web Services)
– Integration with the Office apps for editing

With in-app email:
– Open NRLs.
– Use predictive filing to Work or Outlook folders.
– Import attachments to Work.
– Email files as original format, NRLs, or PDF.

Of course, we love going to Chicago, but we are looking forward this new experience.

-Maureen

Protect Your Data in a Remote Work Environment – ILTA Educational Webinar

Working remotely became a neccessity almost overnight. But were firm architectures ready? Two common entry points to system hacks, social engineering and network vulnerabilities, threaten the security of remote working. In this session, Mobile Helix CEO and Chief Architect, Seth Hallem, will describe these vulnerabilities and propose practical and actionable ways to address these weaknesses using safe browsing, network proxies, authentication, authorization, and DLP. These mitigations apply to both desktop and mobile devices.

This is an ILTA Educational Webinar. It is free to members as well as to non-members as part of ILTA’s COVID-19 content. Non-members may register for a free login-in.

WATCH THE RECORDED WEBINAR HERE

Outline:

I. Social engineering: Phishing, “Water Hole,” SIM card swaps

   Mitigations including:

    A. Safe browsing

    B. No SMS

    C. Web filtering via proxying

    D. Data Loss Prevention (DLP): printing, recipient checking, metadata filtering

II. Network vulnerabilities

    Mitigations including:

    A. Layered security

    B. Filter – proxy

    C. Authenticate the source – certificates, IP fencing, DoS defense

    D. Authenticate the user – AD credentials, complex passwords, SSO

    E. Authorize – manage email attachments

III. Example of a secure architecture

We welcome you and your questions on June 10th.

Write to us at: contact@mobilehelix dot com.

-Maureen

ILTACON ended one week ago, are you caught up yet? 🙃

LOL. I am by no means caught up. I’ve got to-do lists and piles of sorted business cards. Plenty of follow-up yet to go. How about you?

If you were there, wasn’t ILTACON fantastic this year?

A View from a Booth

ILTACON 2019 was the first year of Joy. Not only do I mean the first year of ILTA’s vibrant new CEO, Joy Heath Rush, but the first year that ILTA felt truly back on-track.

ILTACON 2019 broke all attendance records, at over 3,500 legal techies comprised of over 1,800 members and 1,700 business partners. Over 800 members were first-timers, which is fantastic. I can imagine that some of the booth locations were poor at the Dolphin. We were fortunate to have good traffic and terrific interest in our LINK app.

Continue reading

ILTA LegalSEC Summit 2019 Redux

We are back from a busier than ever ILTA LegalSEC Summit. People attend LegalSEC to genuinely learn how they can keep their law firms protected. This is no easy feat because cybersecurity is a moving target. While Big Law firms participate, there is great value for small and medium sized firms where there might not be a CISO. The Director of IT or network engineer might be the security department. The two or three days at LegalSEC are packed with information.

This year the well-received keynote by William R. Evanina, Director of the National Counterintelligence and Security Center, was recorded. Another popular session was “Leverage These Free Resources to Up Your Security and Governance Game.” Both of these and several other LegalSEC 2019 sessions can be heard at no cost by ILTA members, here.

Heads up, save the date. Next year’s LegalSEC Summit 2020 will be June 1-3 and the location…San Antonio at the Marriott Riverwalk. If you have visited the Riverwalk you know that this is a fantastic location. Hope to see you there.

Mobile Helix LINK at ILTA LegalSEC Summit 2019, June 3-5

We love LegalSEC!

and we are a sponsor again this year. We will be at Table number one showing LINK’s latest mobile DLP features.

Stop by to say hi and to see a LINK demo. Our LINK app’s encryption, containerization, and authentication provide strong security for your documents and data. Now LINK offers key word and metadata filtering, recipient checking, and restriction on emailing files from classified workspaces.

This year’s keynote speaker is William R. Evanina, Director of the National Counterintelligence and Security Center.

Register here

ILTA LegalSEC Summit 2019 Keynote Speaker William R. Evanina

LegalSEC Summit 2019 is designed for technology professionals at every level who manage security, information governance and data privacy tech projects and initiatives in support of the practice of law. This exciting two-day Summit offers premier learning and a connected networking environment to focus on information security challenges faced by the legal industry.