Blogs

But Wait... There's More - Pre-Valentine's Editions

By Joanne Kiley posted 02-10-2016 23:26

  

This past week members sought advice on change management policies and balancing knowledge management with security. Explore curated sources on these topics including some from ILTA’s treasure chest.

Match Made in Heaven Reality

In the spirit of Valentine’s Day, let’s analyze a date between knowledge management and security. Knowledge Management wants an easy and accessible date night. He seeks a new casual spot with shared plates to better understand the entire scope of the cuisine. Who needs reservations when you can discover a new cocktail or great shop around the corner while waiting for a table? Security wants to meet at a set time and safe place. She wants a reservation and she does not want to share her food. Viruses could be spread, food and drink could be spilled and she could say something she regrets. Despite having way too much fun with this dating analogy, security and knowledge management can work together. Members recently asked about managing matters under one client with different security clearances. Is this destined to be difficult and time consuming? Todd Haley hopes to make it easier for these lovebirds in “Nine Steps to Good Data Management” from the Winter 2015, Peer to Peer. Mark Brophy and Gillian Glass wrote helpful ILTA blog pieces to help these opposites attract, “Business Continuity/Disaster Recover, What You Need to Know” and “Considerations When Securing Your Document Management System.” Presented at ILTACON 2015, “Using Enterprise Data Classification Schemas to Avoid Risk and Manage Content” will also help make successful match of security and knowledge management. Last but not least, to ensure the Paul McCartney/Stevie Wonder duet, “Ebony and Ivory” gets stuck in your head too, listen to “Security and IG: Living Together in Perfect Harmony?” from the LegalSEC Summit 2015.

Change Management, Be Mine

TechTarget defines change management as “a systematic approach to dealing with change both from the perspective of an organization and the individual.” Explaining further that change management has three aspects: “adapting to change, controlling change and effecting change.” Before implementing a change management plan or policy in your organization consider some helpful plans, suggestions and models from ILTA members including the webinars, “Map It Out! Seven Smart Ideas for Business/Systems Analysis” and “Change Management: Persuading Lawyers to Adopt LPM,” and sessions from the LegalTech NY ILTA tracks in 2015, “Managing the People Side of Change,” and “Transformers: Lawyers as Agents of Change? In Disguise!”

SOMETHING EXTRA – Your Box of Chocolates: LegalTech NY Reviews Compiled

Many wrote great summaries of their experiences at LegalTech New York last week. If you could not attend or could not be everywhere at once, here are reviews and lighthearted pieces to make it seem like you were there.

“The Best of LegalTech 2016: Our Favorite Quotes from the Speakers” compiled by David Horrigan

“The Intangible Benefits of Going to LegalTech” by Chris Dale

“LegalTech New York: More (and Less) of the Same” by Nicole Black

“Disrupting the Legalsphere: 9 Startups Pitch at LegalTech New York” by Mike Susong

“Hackers, Leakers and Careless Employees: 7 IG and Cybersecurity Sessions at LegalTech New York” by Ian Lopez

“LTNY Wrap-Up Part 1: Trends Coming Out of LegalTech 2016” by Jim Duffy

“9 Technologies That Could Cut Demand for Lawyers, Lower Legal Fees” by Tim Greene

“LegalTech NY 2016: Is the Legal Industry Getting the Most from Its Technology?” by Alex Cook

“Report from LegalTech NY 2016 - Part 1” from Virtual Intelligence

And to do the rest of the work for me, “LegalTech: 40+ Articles and Blog Posts Summarizing #LTNY16” from the Business of Law Blog. If the 40+ list overwhelms, with this week’s news, “Apple Employees: Hackers Have Offered us $23,000 for Our Login Info,” at least consider reviewing the “Bring Your Geek to Court” and the “Former FBI Operative Tells His ‘Spy Stories’ and the Biggest Issues in Security” pieces and scroll to the bottom for some compelling statistics and quotes.

As ILTA’s content curator, I’m always monitoring the discussion forums to discover what topics are top-of-mind among the members. Each week, I focus on a few areas that spark your interest, and I provide some curated resources to assist your own information-gathering on the topics. If there are specific topics you would like assistance exploring, please contact me at joanne@iltanet.org

0 comments
478 views

Permalink