Training Course
Syllabus:
Small and medium sized law firms are notoriously behind when it comes to implementing and utilizing technology to maximize profit. Why? Because most of us are so busy practicing law, trying to put out a good work product, and trying to get paid for that product, that we do not have the time or the staff or the dollars to spend on technology - even if we know that if we did focus on our technology that it would ultimately save us time and money and improve our practice. That's what this seminar is designed to address in a no-nonsense way. We understand that you are busy and that you do not want to go broke on the computer system. But if you want to compete you simply must keep abreast of technological developments in the legal field.
This seminar addresses how to work with the technology that probably already came with your computer to improve the way you practice, how to identify what new items you actually need and how to implement them quickly and cheaply, how to get your computer system supported in a way that doesn't allow your outside consultant or inside employees to hold you hostage, how to bill back costs of the technology to your clients in a way they will pay for, why you absolutely need to make your system secure and how to make it that way.
Seminar highlights:
- Costs
- Benefits
- Return on investment
- Support software
- Security responsibility
- Staffing
8:30 a.m. - 8:45 a.m.
I. Overview
8:45 a.m. - 9:45 a.m.
II. A Day In The Life Of An Automated Attorney
9:45 a.m. - 10:00 a.m.
III. The Dollars And Sense Of Automation
A. Saving $ – Reduction Of Overhead
B. Making $ – Return On Intellectual Property Investment
C. Keeping Your $ – Risk Management
10:00 a.m. - 10:15 a.m.
Break
10:15 a.m. - 11:30 a.m.
IV. Review Of Basic Hardware And Software
11:30 a.m. - 12:15 p.m.
V. Human Systems Which Support Technological Systems And Maximize Your Use Of Technology
12:15 p.m. - 1:15 p.m.
Lunch (On Your Own)
1:15 p.m. - 2:00 p.m.
VI. Computer System Risk Management
A. Physical Security First – 'Give Me Physical Access And It's My Data, Not Yours'
B. Backup/Recovery And Offsite Alternatives
C. Email Retention – The Best Thing Since Asbestos
D. Acceptable Use Policy – From Subpeona To Settlement
E. Metadata – And How It Can Hurt You!
2:00 p.m. - 2:15 p.m.
Break
2:15 p.m. - 3:00 p.m.
VII. Checklist For Secure Systems
A. Anti-Virus/Anti-Spam Defense In Depth – It Takes Two
B. Manage Patches And Fixes – Or They'll Manage You
C. Improving On Passwords – 12 Seconds On Average To Crack
D. Personal Firewalls – Stop That Worm
E. Encryption – Is It A Solution Or Just A Bigger Problem
3:00 p.m. - 3:30 p.m.
VIII. Conducting A Network Security Audit
A. Social Engineering – 'I Was Only Trying To Help!'
B. Guest/Visitor Accounts – Everyone Needs Access These Days
C. Logging Out – Think 'Blank, Signed Check'
D. Web Security – This Might Be An Oxymoron
E. Firewalls – 24/7/365 Automated Protection
3:30 p.m. - 4:15 p.m.
IX. How To Hire An IT Person
A. Job Description – What Do You Want Them To Do?
B. Certification – How They Prove They Have Some Ability
C. Training – Keeping Them Current
D. Advertising – What Should The Ad Say?
E. Consulting – Is Part-Time Expertise Enough?
4:15 p.m. - 4:30 p.m.
X. End Discussion
|