10 Best Practices for Securing Your Client Data – and Your Practice Too!
This event is available for on-demand viewing. If you have previously registered click here to login using the email you registered with.
While securing client data is always a minimum requirement, the combination of recent events, maturing technology, and new best practices make it a good time to reevaluate whether you’re doing enough to keep your clients safe.
In this webcast, we reviewed 10 best practices that managing partners, firm administrators, operations managers, and IT directors should keep in mind across a range of different vulnerability points. Attendees will leave with a good understanding of what they’re doing well and where they need to focus to strengthen their security posture. Plus:
- Increase your understanding of best practices for securing client data.
- Understand best practices around securing client data with the increased number of vulnerability points as a result of recent events, maturing technology, etc.
- Identify areas of opportunity to strengthen your security posture.
REGISTER NOW! (Not able to attend? STILL REGISTER you will receive an email with how to access the recording of the event)
|Bill Sorenson, CCISO || Vice President of Product
Bill Sorenson, CCISO is a senior technology leader with 25 years of experience moving organizations to the cloud and leading businesses to secure environments. He is a national speaker on both cloud computing and cyber security to organizations working to align strategies to assist in growth and security. He has tremendous perspective on the role of IT Security in today’s complex compliance landscape and has participated in over 100 firms moving to the cloud.
|Steve Sobka || Director of Technology and Infrastructure
Steve Sobka is a seasoned technology professional with 20 years of experience in the engineering and development of IT infrastructures and solutions. His experience includes a deep knowledge of virtualization technologies with a specialization in Document Management Systems for law firms and other industries. He provides consulting and guidance to clients on working standards for highly specialized software and hardware systems. Steve holds certifications in AWS architecture as well as Document Management.