Post on 07-Feb-2017
transcript
Introducing ShareSafe
How to eliminate the #1 risk in modern litigation
January 27, 2017
CEO Co-founder Logikcull.com
Customers include…
The world is now digital. Including law firms.
A history of discovery evolution
PRE-INTERNET. PRE-CYBER SECURITY. POST-INTERNET
Paper Scanning Ediscovery Ediscovery 2.0 CLI1800s 1980s 1990s 2000s Today
From paper to Cloud-Based Legal Intelligence (CLI)
And the statistics are alarming…
Data breaches are commonplace
6 BillionRecords breached
since 2013
Source: Breach Level Index
46Records lost or stolen
every second
4%Of breached records are encrypted
Source: Breach Level Index Source: Breach Level Index
In fact, they’re among the most vulnerable targets
Law firms are not immune!
From the perspective of hackers, exactly because lawyers handle such valuable and sensitive information belonging to clients, law firms become a one-stop shop.
“
”Eli Wald
Legal Ethics Professor(and former BigLaw attorney)
Source: Logikcull.com
Including this guy…
And experts are in agreement
(Data breach) is a concern for lawyers… Lawyers have private information that could be subject to exposure, like we saw with Ashley Madison or Sony…. Lawyers are subject to potential blackmail (through) automatic ransomware programs.
“
”Bruce Schneier Leading Security Expert
(Coined the term ‘security theater’)Source: Logikcull.com
At least a quarter of all firms have been breached
The facts don’t lie.
1 in 4Law firms have
been hacked
Source: ACC
80% Of 100 biggest firms
have been breached
Source: Mandiant/BloombergSource: 2016 IBM Cost of a Date Breach Study
$3.79MThe average cost
of breach
90%Of breaches are
preventable
3 in 4Firms have not assessed cost
or risk
Source: Marsh Survey Source: ILTA 2016 Tech Survey
90%Of breaches are
preventable
Firms of all sizes are feeling the pain.
Neither do the headlines.
“Data is most at risk when it’s on the move.” - FCC Cyber Security Planning Guide
How current discovery works
1-3 days 1-2 days 1-5 days
Client Send data Law firm CDs DVDs Thumb drives FTP Email attachments
Sends data
Internal Tech
External Tech
Gather instructions Process data OCR images Fix exceptions Charge by the hour Make multiple copies of data
Loads data Review Platform
Ships data Requesting Party
Keyword search Linear review Manual prove review Exception review Final QC review Slow & inefficient
CDs DVDs Thumb drives FTP Email attachments
Confirm receipt Copies data loads for review Looks for errors
1-5 days
How cloud-based legal intelligence worksData stays in 1 secure place in a closed-loop system
Mins/hours Hours/days
Client Law firm
Requesting party
Uploads Data
Reviews Data
Downloads Data Securely shares data w/ShareSafe
https:// https://
https://https://
Why ShareSafe?
40%Of breaches
involve physical media
Source: InfoSecurity Magazine
>25%Of the largest data breaches resulted
from poor security or lost or stolen media
<2%
Multiple Sources
Amount of annual budget law firms spend on security
Source: Bloomberg BNA
How can we help?
Speed ROISecurity
Where is your data? Is it encrypted? Is it monitored? Is it backed up?
Does it take too long to start a review? Do productions take hours or days? Do you know who has access to it?
Are you getting less value than you’re paying? Are your costs unpredictable?
Tell us what you think!
Andy.wilson@logikcull.com@iDedupe