Card image cap

Beyond Encryption: Protecting Your Company's Assets & Client Confidence

Level: Advanced
Runtime: 56 minutes
Recorded Date: June 12, 2017
Click here to share this program
Download PDF


  • Current data security and privacy environment
  • Indiscriminate data retention
  • Ephemerality and Risk Management
Runtime: 56 minutes
Recorded: June 12, 2017


From massive breaches to fear of litigation and rising costs of e-discovery, the urge to retain large amounts of information has been tempered by evidence that holding data when not required can actively work against companies’ interests. While data encryption is a great step forward, a mere fact of storing too much sensitive client data significantly increases security risks and potential liability. How can law firms minimize the window of opportunity for attackers while enabling active communication in house and with the clients?

This session will discuss how proactive ephemerality, or automatic data deletion, can help manage information security risks, support in-house and client collaboration while ensuring that no valuable communication lives beyond its useful life and intended recipients.

This program was recorded on June 12th, 2017.

Provided By

Card image cap Legalweek
Card image cap


Card image cap

Jessy Irwin

Vice President & Security+ Privacy Consultant
Jessysaurusrex, LLC

Jessy Irwin is a security communications education expert who excels in translating complex cybersecurity issues into simple, relatable terms for non-technical audiences. In her work as an consultant, security executive, and former Security Empress at 1Password, she has taught people how to better protect themselves, their data and their identities online. Her current areas of interest include making security more accessible for the average person, advocating for strong privacy protections in education for students, building better models for digital security training, and building proactive security communications strategies for consumers, policymakers, small businesses and Fortune500 companies. Irwin regularly writes and presents internationally on human-centric security, student privacy, and security communication at events including O’Reilly Security, RSA Conference, TechSummit Amsterdam, Infosec Southwest, and Shmoocon. Her work has appeared in CSO Online, VICE Broadly, Mashable, TechCrunch, and CNN.

Card image cap

Wynter Lavier Deagle

Mintz, Levin, Cohn, Ferris, Glovsky & Popeo, P.C.

Wynter is a seasoned trial lawyer whose practice encompasses a wide range of litigation matters including business disputes, commercial litigation, corporate governance, fiduciary duties, class actions and First Amendment claims. Wynter has helped numerous companies, particularly in the technology, life sciences, financial and professional services sectors, craft business solutions to a variety of complex legal problems including business fraud, misappropriation of trade secrets, breaches of fiduciary duty, and contract disputes. Wynter has an aggressive but practical approach to business disputes and her clients rely on her to create and implement a successful strategy when initiating, defending, or avoiding litigation.

Wynter counsels directors and officers of both public and private companies on corporate governance issues and fiduciary duties. Wynter’s client representation reflects the breadth of her practice. Her clients include directors and officers of manufacturing companies, medical device companies, pharmaceutical and life sciences companies, regulated broker-dealers, investment banking and asset management firms, non-profit and for-profit hospitals, and private foundations.

A member of the International Association of Privacy Professionals, Wynter also counsels clients in proactively identifying, assessing, and managing risks associated with their privacy, data security, and information management practices. In addition to cybersecurity counseling, Wynter’s practice focuses on assisting clients in the areas of data breach compliance, incident management and response, and privacy related litigation. Wynter has also assisted clients in responding to regulatory inquiries regarding their data security practices.

Wynter has extensive experience representing corporate and individual clients in cases involving allegations of false claims, mail fraud, false statements, public corruption, and campaign finance violations. Wynter has represented clients at all stages of government investigations. Wynter has also conducted internal investigations, both at the client’s own initiative and following receipt of a subpoena or other notice of a government investigation, in the areas of embezzlement, fraud, Foreign Corrupt Practices Act (FCPA) violations, consumer protection claims, and California’s unfair competition law, among others.

Card image cap

Jennifer DeTrani

General Counsel

As General Counsel, Jennifer manages Wickr’s legal and human resources departments and manages privacy concerns affecting the company.

Card image cap

John Villasenor

UCLA School of Law

John Villasenor, a visiting professor at the UCLA School of Law, a nonresident senior fellow at the Brookings Institution, and a National Fellow at the Hoover Institution, Stanford. He is also a visiting professor of law, at the University of California, Los Angeles, a member of the World Economic Forum’s Global Agenda Council on Cybersecurity, and a member of the Council on Foreign Relations. His work addresses the intersection of technology, policy and law.

Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference


Add to Cart
Card image cap
77 minutes
§ 363 Sale Issues
Dive into Section 363 sales issues, including whether there are limits to “free and clear”; the GM conflict between Sections 365(h) and 363(f) (“lease-stripping”); sales free and clear of leasehold interests, restrictive covenants and override royalties; being free and clear of successorships in CBAs; selling free and clear of environmental liabilities (La Paloma, Exide); and loan-to-own strategies.

American Bankruptcy Institute


Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.



Add to Cart
Card image cap
97 minutes
26 Words that Created the Internet - Basics of the Communications Decency Act Section 230 Safe Harbor
This program will examine the basics of CDA 230 and its day to day affect for those who advise internet businesses as well as those who litigate against them. It will give practical guidance as to what extend internet companies can or should edit or censor the information their users contribute to their sites and to what extent those users will actually be liable.

New Media Rights


Add to Cart
Previous Next