Blogs

International Legal Technology Association

Blogs

Please enjoy this blog co-authored by Raquel Lewis, Technical Program Manager, Intapp and Natasha Tucker, Director, Business Development Operations, Bennett Jones LLP. Raquel's Story We often imagine our careers as a straight line: a roadmap with clear goals and milestones, leading us steadily toward the destination we envision. For me, that destination was the chief marketing officer chair. I was a successful marketing technology manager at a law firm, steadily building the skills, relationships, and experiences that I believed would carry me there. And then, life intervened in a way I could never have predicted. My mom and my nephew were murdered. ...
0 comments
Please enjoy this blog co-authored by Dr. Melissa L. Brown, Learning & Development Manager, Holland & Hart and Harriet Joubert-Vaklyes, Senior Manager of Legal Process Improvement, Michael Best. ________________________________________ Series Introduction What Strong Leaders Carry Through AI Transformation ILTA Leadership Development Community Legal tech leaders sit in the rare roles where AI transformation is both a strategic mandate and a constant operational challenge. You are expected to modernize workflows, manage risk, support attorneys, and maintain legacy systems while preparing for what comes next. The technology keeps ...
0 comments
Last month, several of my colleagues within the Knowledge Management and Innovation department at Troutman Pepper Locke and I attended Thomson Reuter ’s SYNERGY Conference in sunny Orlando, Florida. It was TR’s first year opening the conference up to folks in the legal sector, a nd we were lucky enough to make the cut. As we are all on different teams but connected via AI and technology , I was curious to compare our takeaways from the experience . 1. What are your names, and roles? Darbi Howe , AI Solutions Analyst ...
0 comments
Please enjoy this Collaborative Conversation Series with contributions from, Sara Miro, Managing Attorney, Director of KM Solutions, Sullivan & Cromwell, Juliet Muccillo, President, O365/SharePoint and Custom Solutions at Muccillo Tech LLC, and Ted Theodoropoulos, CEO, Infodash. #KMStrategy #KMEducation #RelationshipManagement #Just-in-Time #LawFirmandClientRelationships #100Level #200Level
0 comments
Here is a playbook to share as my first blog post. At our firm, we've been very intentional about how we handle vendor issues both internally and with Vendor Support and its leadership. A few things we're doing have helped us keep everyone aligned, from the C‑suite to front-line support teams and ultimately our attorneys and staff: 1. Executive Awareness and Ownership Our C‑suite leaders are briefed early whenever there is a material impact to a mission‑critical system like time entry. For recurring issues (like month‑end), we maintain: A standing "at‑risk systems" item in our leadership check‑ins. This ensures leadership is not surprised and ...
0 comments
Please enjoy this blog authored by Ricci Masero, Marketing Manager, Intellek. For decades, legal commentators, law firms, tech vendors, and legal industry influencers have debated the end of billable hours. The argument goes something like this: with LegalTech automating more tasks, standardizing processes, and making legal research faster than ever, why do lawyers still charge by the hour? Despite frequent predictions of its demise, the billable hour persists. Understanding why requires looking at the different types of legal work, the role of technology , and how clients perceive value. The conversation isn’t about stubborn lawyers clinging to tradition; ...
0 comments
(Chicago, IL) – 8 December 2025 – The International Legal Technology Association (ILTA) is excited to announce the opening of nominations and applications for the highly anticipated 2026 Distinguished Peer Awards. These prestigious awards celebrate excellence and innovation within the legal technology community, recognizing the outstanding contributions of individuals, teams, and organizations that have significantly impacted the industry. Award Categories: • Lifetime Achievement • Innovative Leader of the Year – ILTA Members • Innovative Leader of the Year – ILTA Business Partner • Best Blog of the Year ...
0 comments
Why spend time and energy breaking into a system when you can manipulate someone else into doing the hard work for you? Social engineering is one of the most dangerous and effective forms of cyberattack, and law firms are increasingly in the crosshairs . Why? Because legal professionals handle sensitive client data, financial records, and privileged communications daily. A single misstep like clicking a malicious link or trusting a fraudulent email can lead to devastating consequences. What Is Social Engineering? Social engineering is a form of cyberattack that targets human ...
0 comments
Please enjoy this infographic blog authored by LaToya Deese-Richardson, Application Analyst, Gibson, Dunn & Crutcher. #Security #ITTrainingandSecurityAwareness #Security Professionals #100Level #RemoteWorking #Just-in-Time
0 comments
Please enjoy this blog co-authored by April Heimerl, Senior Business Consultant, Epiq and Suresh Annamalai, Senior Manager of Digital Innovation, Proskauer Rose LLP. Introduction The legal industry is undergoing a quiet revolution. The growing complexity of today’s legal environment has sparked an unprecedented demand for efficient, user-friendly self-service tools. Legal professionals are looking for smarter, faster ways to access knowledge, automate routine tasks, and collaborate more effectively—without waiting in line for IT support. But delivering these tools isn’t simple. Legal workflows are intricate, users span a wide range ...
0 comments
(Chicago, IL - 12/3/2025) The International Legal Technology Association (ILTA) is excited to announce two premier educational events as part of Microsoft Days: the SharePoint Symposium and the Copilot Symposium . These programs are designed to empower legal technology professionals with cutting-edge strategies and tools to drive innovation, security, and efficiency within their organizations. SharePoint Symposium - February 10 and 11 The Microsoft SharePoint Symposium is a technical, peer-driven event tailored for legal technology professionals seeking to maximize their organization’s investment in SharePoint. This one-and-a-half-day ...
0 comments
Artificial intelligence is transforming industries, and unfortunately, cybercrime is no exception. Today’s threat actors are leveraging AI to launch faster, more convincing, and more scalable attacks. For law firms, which handle highly sensitive client data and operate under strict confidentiality and compliance requirements, this evolution in cyber threats is especially alarming. Let’s explore the top AI- powered cybersecurity threats facing legal practices and how your firm can stay protected. Why AI is a Special Threat to Law Firm Cybersecurity Law firms are built on trust, ...
0 comments
Master of the Rolls, Sir Geoffrey Vos, and the Chancellor of the High Court, Sir Colin Birss, signal strong judicial support for AI-assisted disclosure guidance. (Chicago, IL) 19/11/2025 - The International Legal Technology Association (ILTA) welcomes the proposed statement of support from the Master of the Rolls and Deputy Head of Civil Justice for the ILTA Active Learning Best Practice Guide, a practitioner-led framework designed to ensure the responsible and effective use of Technology Assisted Review (TAR) in disclosure. The statement: "The ILTA best practice guide in relation to the use of AI in disclosure is a welcome initiative and we support ...
0 comments
Please enjoy this blog post co-authored by Raenesia Jones, Cybersecurity Analyst II, Davis Wright Tremaine LLP and Kevin J. Foster, Sr., Director Cybersecurity Operations, White and Williams LLP. Reviewed by Crystal Little, Editor of Content and Publications, ILTA. Threat hunting for misconfigurations is the art of proactively seeking out the unknown unknowns within configuration settings, permissions, and assets that may be exploited by an attacker. This is an area that consistently proves its value and ultimately leads to operational resilience yet doesn't always receive the attention it deserves. Clients want proof that their lawyers are serious about ...
0 comments
Please enjoy this blog authored by Adam Wehler, Director of eDiscovery and Litigation Technology, Smith Anderson. 1. What It Is (and Isn’t) Effective October 1, 2025, California’s Civil Rights Department will enforce regulations clarifying how the Fair Employment and Housing Act (FEHA) applies to automated decision-making systems (ADS) used in employment. The key here is that this isn’t a new law with new fines but its a clarification that existing anti-discrimination rules fully apply when AI or algorithms are used in hiring, promotion, and other HR decisions. 2. Why It Matters • Employers remain responsible for discrimination ...
1 comment
Cybercrime has evolved. What was once the domain of elite hackers operating in the shadows i s now a subscription-based business model accessible to virtually anyone with malicious intent. Enter Ransomware-as-a-Service (RaaS) : a turnkey solution that allows even low-skilled cybercriminals to launch sophisticated ransomware attacks with minimal effort. For law firms, this shift represents a significant and growing threat. With sensitive client data, confidential case files, and privileged communications at stake, legal practices are increasingly attractive targets for cybercriminals. Understanding how RaaS works a s ...
0 comments
Please enjoy this blog authored by Shannon O'Connor, Legal Systems Manager, Squire Patton Boggs (US) LLP. Document Automation, also known as document assembly, has long been a staple of the legal field. It’s a standard for several reasons, including faster drafting and minimizing errors. Document automation takes a standard set of documents, identifies variable fields such as names or dates, and then uses a form interface to gather the necessary data. The data is populated across the documents, generating a new set of documents that reflect those changes. This approach saves lawyers time, freeing them to focus on higher-value work. Common Roadblocks After ...
0 comments
Please enjoy this blog authored by Suresh Annamalai, Senior Manager of Digital Innovation, Proskauer Rose LLP. 🔹Designing Legal Workflows with Low-Code Tools In our last post , we explored why low-code platforms are gaining momentum in legal departments. Now let’s talk about how legal teams can actually use these tools to build smarter workflows—without needing to become full-time developers. This isn’t about replacing your core legal systems. It’s about fixing the gaps: those slow, manual processes that waste time and increase risk. With low-code platforms—like PowerApps, Power Automate, Appian, Mendix, or OutSystems—legal teams can turn ideas ...
0 comments
Please enjoy this blog authored by Kara Portwood, Director of Innovation, Armstrong Teasdale LLP. On May 2, 2025, PACER released an announcement stating that on May 11, 2025, the Administrative Office of the U.S. Courts would begin implementation of multifactor authentication to enhance system security for CM/ECF and PACER. They also informed everyone that users with CM/ECF-level access who do not voluntarily enroll will be randomly selected to do so beginning in August and by the end of 2025, everyone with CM/ECF-level access will be required to use MFA when logging in. To read the complete announcement, click here . For years, many law ...
0 comments