Peer to Peer Magazine

Summer 2016

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/696855

Contents of this Issue

Navigation

Page 25 of 83

27 WWW.ILTANET.ORG What future technologies should firms expect to incorporate into business operations? ASK THE VENDOR Cybersecurity Specialists The greatest technology spend for law firms and corporate legal departments over the next three years will be around cybersecurity. However, the real spend won't be on soware and hardware, but rather on services and talent to support technology. The staffing demand for cybersecurity professionals is extreme and sophisticated supply is low. Law firms and corporate legal departments would be best served by asking what kinds of specialists they need to incorporate into their human capital portfolio and allowing the technology, specifically around cybersecurity, to flow from their expertise and evaluation of existing process, technologies and protocols. Jared Coseglia TRU Staffing Partners www.trustaffingpartners.com Integrated Matter Intake Aorneys oen complain that there are too many systems or checks and balances required to open a new client or maer. New technologies should be implemented to allow firms to integrate the best soware tools for an efficient and streamlined process, geing maers opened for billing quickly. When a new maer request is submied by a billing aorney, it will be routed to budgeting soware for fee arrangement modeling and project management. The new maer intake system should also be integrated directly with the conflicts system. The system should alert the firm immediately if politically exposed or other high-risk individuals are searched. Aer being routed through an automated approval workflow, intake soware should directly integrate with your firm's billing, time entry and document management systems. Maer open! Katelan Steele and Haidee Rodriguez InOutsource www.inoutsource.com Data Security and Information Governance To quell escalating security concerns instigated by recently publicized cyberaacks, organizations must beer understand, implement and optimize different technologies to help mitigate risk more efficiently and effectively. Technologies and processes must integrate seamlessly to find, store and back up sensitive data identified as "hot" or "priveleged" on their networks. Law firms and corporate legal departments should focus on three primary facets: » What data they have on their networks » How long they should hold the data » What policies they need to follow to delete data as maers become dormant or complete More advanced soware technologies and processes will help minimize security and governance concerns in organizations. Nick Reizen Xact Data Discovery www.xactdatadiscovery.com Segregated Data The aention the legal market is geing from technologists spans the full spectrum for support in operations, client engagements and e-discovery. In the future, the landscape of legal technology will likely not have awe-striking improvements in respective platforms, but rather hardening code, processes and data centers that store sensitive business and client data. SaaS offerings are now geing utilized in many operations; it makes it easy to reduce your IT footprint, and, in doing so, security is improved while cuing down hardware and soware maintenance costs. And while client data are (or should be) completely segregated from business data infrastructure, SaaS providers create a shortcut that ensures all client data are hard-partitioned from firm data breaches. Honing in on e-discovery operations, we will continue to see SaaS providers racing to sophistication, simplicity and heightened security measures to provide the SMB market with the proper tools to manage the investigation of client data. Rick Clark CVFox at TCDI www.tcdi.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Summer 2016