
Sign up to save your podcasts
Or
View the livestream here on YouTube.
many think that IT staff or outsourced computer companies should determine your firm’s security policies.
This is far from what should be. IT should have input and be the mechanism that implements the technology aspects of policies but the firm principals should make the final decisions.
It takes a specialized consultant (potentially a cyber/tech lawyer) to guide your firm through the process to reach your end policies.
That consultant should then continually work with your much like a CPA would to regularly evaluate changes and compliances.
The days of set it and forget it are gone.
#NoLawFirmLeftBehind
#cybersecurity
No Law Firm Left Behind is made possible by our friends at SpliceNet Consulting
Connect with Jim Gast: https://www.linkedin.com/in/jamesgast
Find our past shows: https://www.splice.net/nolawfirmleftbehind
5
66 ratings
View the livestream here on YouTube.
many think that IT staff or outsourced computer companies should determine your firm’s security policies.
This is far from what should be. IT should have input and be the mechanism that implements the technology aspects of policies but the firm principals should make the final decisions.
It takes a specialized consultant (potentially a cyber/tech lawyer) to guide your firm through the process to reach your end policies.
That consultant should then continually work with your much like a CPA would to regularly evaluate changes and compliances.
The days of set it and forget it are gone.
#NoLawFirmLeftBehind
#cybersecurity
No Law Firm Left Behind is made possible by our friends at SpliceNet Consulting
Connect with Jim Gast: https://www.linkedin.com/in/jamesgast
Find our past shows: https://www.splice.net/nolawfirmleftbehind