Peer to Peer: Security SEPTEMBER 2012
contents 48
18 10 BEST PRACTICES
Information Security on the Social Media Frontier
Fumble and Protect Your Data Tune Security for SharePoint BYOD Work for Legal
28
Avoid an Information Fine-
Making
ASK THE VENDOR What recommendations would you give your clients on how best to develop an information security awareness program?
32 34
SMART MOVES A Secure Position in Information Security
CASE STUDIES Hack the Company To Protect Information
60 66
FEATURES 48
54 120
LegalSEC™: Delivering Collaborative Information Security by Carlos Rodriguez
Train to Strengthen Security's "Weakest Link"
by Adam Carlson and Matt Wolf
ISO for Everyone: Upgrading (Intelligently) to the New Normal by Renee Murphy
Information Is the New Oil: Protect Your Investment by Odette van Ommen and James Edwards
72 76 Information Security
and Information Management: A Mutually Beneficial Partnership Limit Workstation Rights — The Need for Privilege Elevation
82 86
The App That Knew Too Much: A Tale of Loss, Love and Protection by Christopher M. Zegers
Cross-Border Data Security by George Tsounis and Dan Charboneau
Mobile Device Management: The Missing Piece of the Puzzle by David Beck
Stop, Thief! Protecting Legal Documents in a Mobile World by Paula Skokowski
108 116 120
92 94 98
MOVIE REVIEW "Sneakers"
BOOK REVIEW "America the Vulnerable"
MEMBER RESOURCES Overheard on E-Groups
Member
Announcements Welcome New Members On the Move Product Announcements
Event Calendar
ASK THE EXPERT Information Security: A Universal Concern
INSIDE ILTA Get Plugged In to ac2dc Play on Words
Play It Again
LESSONS LEARNED ISO 27001 … Certification Received
Peer to Peer
7