It was once a poorly kept secret that hackers routinely target law firms. This fact is rather difficult to miss nowadays. Moreover, the threats to the confidential data kept and used by attorneys and law firms are always evolving. These include sophisticated – and sometimes not so sophisticated – electronic attacks, lost and stolen devices, an endless variety of tricks and scams, and even simple attorney (and employee) errors. Any of these can lead to serious consequences for attorneys and firms alike.
In 2012 the American Bar Association amended a number of the Model Rules of Professional Conduct to address the increasing use of technology in legal practice and the ongoing need to safeguard client and firm data. Attorney and information security consultant Scott Aurnou discusses the amended Rules, subsequent ABA Formal Opinions clarifying the Rules’ application in practice, as well as the basic steps needed to comply with the Rules. This will include measures to secure the confidential client and firm data on your firm’s computer network, individual computers, and mobile devices.
Scott Aurnou, Esq., CISSP is an attorney and founder of The Security Advocate, which helps organizations with information security and data privacy issues. This includes privacy and security awareness training, security consulting, compliance with cyber security and privacy laws and related legal concerns.
Scott spent over a decade as a litigation attorney in the NYC area, and served as lead counsel for a private client services group at Smith Barney. He uses his legal, security, and business background to make complex information security concepts easy to understand (and even entertaining on occasion) for non-technical audiences. He has published security related articles in national publications ranging from the New York Law Journal to SC Magazine. In addition, he has created and delivered numerous presentations on information security and data privacy issues for executives, managers, and professionals.
Scott is a Certified Information Systems Security Professional (CISSP), Certified Information Privacy Technologist (CIPT), Certified Information Privacy Professional (CIPP/US) and a Fellow of Information Privacy (FIP). He is admitted to practice law in New York, Colorado, the U.S. District Courts for the Eastern and Southern Districts of New York; as well as the U.S. Court of Appeals for the Second Circuit. He is also the author of the Introduction to Information Security LiveLessons video training series for Pearson Publishing.
Very engaging and knowledgeable instructor. This is a vast subject, and it was masterfully edited and presented.
Taught in very understandable terms. Very informative, thanks!
I think a lot of us lawyers don't know that much about technology and the teacher did a very good job of making everything understandable.
Excellent course. Very informative.
Great overview course!
He is an excellent presenter, knowledge base is so deep and he covers both a vast breadth and depth of subject matter. I wish he would instruct all CLE courses. He's the best on this site.
Good job. Organized and easy to follow.
Really enjoyed the course - very informative!
This is the best CLE program I have ever viewed. The speaker was informative and very familiar with the material. His speaking style and delivery were excellent despite a tight time constaint given the volume and specifics of the course material. Great presentation!
LOVED this course!!
Great explanations and analogies
This was truly a very good course, great overview of the subject matter. Very helpful recommendations.
Fantastic! Great information!
Obviously, an expert!
The course and the presenter were both excellent.
very good speaker
An impressive amount of useful information.