James is a passionate IT professional with a penchant for troubleshooting and translating geek speak to everyday human. With over 11 years of experience in the industry seeing evolving technology and trends being integrated into everyday life and business. He enjoys the current game of cyber security cat and mouse and aims to always be at the forefront of data classification and encryption.
He is excited by the new era of the digital age and the potential this creates for organisations going forward. Teaching users to share this love of technology and use it to its full potential is his main goal, which although can be tricky at times seems to be working out for the most part. In his down time, he enjoys building his own servers and PCs, reading up on emerging advancements and cycling, when his wife and two children allow.
Cyber Security Perimeters are No Longer Enough – It’s The Data ……
Gone are the days when you can build an impregnable cyber perimeter. They are like the castles of old – crumbling. So, how you can you completely safeguard data, files and emails and not just rely on your staff never making a mistake? And how do you track emails and documents from creation to deletion and be alerted instantly when things could be going wrong? Let me show you a practical solution, without affecting the way fee earners work.
EVEN MORE SEMINARS
Vanessa Ugatti The True Worth Expert
How to Charge What You’re Worth and Get It
Jon Payne Noisy Little Monkey
10 Things Google Hates About You
Paddy Synnott Miller Insurance
SRA application for new law firms: How to make the process run smoothly
Matthew Pennington | Stephen Ward Tonic Works | Council for Licensed Conveyancers
Wednesday 21st: 2018 Price Transparency Regulations and Conveyancing
Thursday 22nd: 2018 Price Transparency Regulations and Probate
Matthew Newton Oosha
Practical information security strategies for the modern law firm