Brian Focht - Law Firms in a BYOD World

25
Clio Cloud Conference 2014 SEPTEMBER 22 23, 2014 · CHICAGO, ILLINOIS

Transcript of Brian Focht - Law Firms in a BYOD World

Clio Cloud Conference 2014

SEPTEMBER 22 – 23, 2014 · CHICAGO, ILLINOIS

Clio Cloud Conference 2014 #ClioCloud9

Law Firms in a BYOD World

by Brian Focht

@NCCyberAdvocate

Clio Cloud Conference 2014 #ClioCloud9

Law Firms in a BYOD World

by Brian Focht

@NCCyberAdvocate

Imagine…

Imagine…

#ClioCloud9Clio Cloud Conference 2014

We’re Living in a BYOD World

Businesses Like It

Employers Like It

Employees Like It

#ClioCloud9Clio Cloud Conference 2014

… and it’s a Dangerous World…

Hackers Like It…

#ClioCloud9Clio Cloud Conference 2014

… and it’s a Dangerous World…

Incidents of Hacking on the Rise

1. Obvious targets for obvious reasons:

Target & Home Depot - $$$

2. New targets for more insidious reasons:

Personally Identifiable Information (PII)

#ClioCloud9Clio Cloud Conference 2014

… and it’s a Dangerous World…

Increase Convenience =

Decreased Security

Law Firms are Vulnerable!

#ClioCloud9Clio Cloud Conference 2014

… and it’s a Dangerous World…

Law Firms are a one-stop-shop for hackers

• Patent applications & intellectual property

• Confidential business information

• Negotiating strategies & future business

goals

• Personally Identifiable Information

#ClioCloud9Clio Cloud Conference 2014

… and it’s a Dangerous World…

No practice area is immune

#ClioCloud9Clio Cloud Conference 2014

… with Serious Consequences.

Consequences of being hacked are on the rise!

1. Financial Responsibility

2. Ethical Responsibility

3. Your Professional Reputation

#ClioCloud9Clio Cloud Conference 2014

… with Serious Consequences.

Consequences of being hacked are on the rise!

The Wrong Security Breach Could Ruin Your Firm!

Airplane! Paramount Pictures © 1980

#ClioCloud9Clio Cloud Conference 2014

Four Key Steps

1. Breathe

2. Assess

3. Plan

4. Implement

#ClioCloud9Clio Cloud Conference 2014

Step 1: Breathe

#ClioCloud9Clio Cloud Conference 2014

Step 2: Assess

There is no one-size-fits-all solution

1. What are you trying to protect?

2. What resources do you have?

#ClioCloud9Clio Cloud Conference 2014

Step 2: Assess

There is no one-size-fits-all solution

3. Other factors

#ClioCloud9Clio Cloud Conference 2014

Step 3: Plan

1. NOT a Fire-And-Forget Issue

2. REQUIRES Universal Buy-In

3. Involve Everyone

4. Respect Concerns about Privacy

The Negotiator New Regency Pictures © 1998

#ClioCloud9Clio Cloud Conference 2014

Step 3: Plan

1. BYOD Manager

2. Implementation

3. General Requirements

4. Permissible Devices

Essential Components

5. Business vs. Personal

6. Apps

7. Mobile Device

Management

8. Updates

#ClioCloud9Clio Cloud Conference 2014

Step 3: Plan

1. BYOD Manager

2. Implementation

3. General Requirements

4. Permissible Devices

Essential Components

5. Business vs. Personal

6. Apps

7. Mobile Device

Management

8. Updates

#ClioCloud9Clio Cloud Conference 2014

Step 3: Plan

Employment Contract

Is BYOD Optional?

Privacy Bill of Rights

Who Watches the Watchers?

Other Considerations

#ClioCloud9Clio Cloud Conference 2014

Step 4: Implement

Remember:

Only Effective if Applies to Everyone

No Waivers, No Exceptions

Not a Fire-And-Forget Policy!

Constant Vigilance

Clio Cloud Conference 2014 #ClioCloud9

Thank you for listening!