Law Firm Risk Roundtable

Engage. Exchange. Evolve.

Programs connecting the legal risk community

Webinars

  1. Building a Business Case for Enhancing Business Acceptance at Your Firm

    intake

    Improving business acceptance can deliver significant value to law firms – including better financial performance, improved client service, reduced risk, and increased lawyer satisfaction. But, while the benefits are substantial, getting key stakeholders to agree to investing in change is not always easy. In this session, speakers from three Intapp Open clients discuss how they successfully made the case within their firms, covering topics including:
    • Why their firms decided to make the investment in enhancing New Business Acceptance
    • Why treating intake and conflicts in an integrated manner made sense for them
    • Strategies and approaches they took to make the business case internally and secure buy-in
    • The impact on lawyer efficiency and return on their investment in Intapp Open
    [Access Webinar]
  2. Who’s on First: Conflicts Management for IP Practices

    ip

    At a recent Risk Roundtable, we asked participants which conflicts were most challenging to manage. The response was unanimous: subject matter conflicts associated with IP prosecution and litigation matters. IP matters bring with them unique, complex challenges and questions, such as: • Who is the client, an individual inventor or the corporation where he or she works? • When can a firm file similar patents for two different clients and when is the subject matter too close for comfort? • Can a firm litigate against a patent that it previously achieved for a former client? In this webinar, an expert panel will explore strategies and approaches firms are taking to address these issues and provide insights relevant to lawyers, general counsels, conflicts analysts, practice managers and IT leaders. [Access Webinar]
  3. Anomalies, Hacks, Lateral Moves: Monitor and Address Information Risks

    lateral

    New technologies and regulations are forcing law firms to take a serious look at activity monitoring and data loss prevention software. Client guidelines and security audits mandate that firms have visibility into who does what with their data, new regulations like HIPAA require activity monitoring on personally identifiable information, lawyers increasingly use unsanctioned cloud tools without notifying IT and, with lateral movement on the rise, firm management needs a means to identify unauthorized activity to avert potential problems. In this session, we will explore how firms can leverage technology to monitor and address information risks. Hear from panelists who will present diverse perspectives, ranging from cyber insurance and regulatory trends to process and technical best practices. [Access Webinar]
  4. Complying with the “Minimum Necessary” Standard of the HIPAA Privacy Rule

    hipaa2

    The minimum necessary standard, a key protection of the HIPAA Privacy Rule, mandates that protected health information should be used or disclosed only to satisfy a particular purpose or carry out a particular function. Complying with the minimum necessary standard poses particular challenges to law firms, often forcing them to modify practices for collecting client information and securing it throughout the matter life cycle. This presentation explains why the minimum necessary standard is important and how it impacts common law firm operations. Suggested processes, procedures and technologies to satisfy compliance obligations will be provided. [Access Webinar]
  5. Client Information Security Audits

    audit This webinar presents key client priorities and strategies for effective response, featuring a panel of speakers from Liberty Mutual, Security GRC2 , Bradley Arant and Intapp. Topics will include:
    • Analysis of how the changing regulatory landscape is impacting client expectations
    • Overview of top client information security priorities
    • Explanation of client audit questionnaires, reviews and processes
    • Criticism of common mistakes
    • Best practices and reference information security frameworks
    • Demonstration of technologies available to remediate compliance gaps
    [Access Webinar]
Copyright 2008-2012