Hi [[ session.user.profile.firstName ]]

e-Discovery

  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach EDRM and AccessData Recorded: Sep 25 2018 57 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades Leila Szwarc & Paola Fonseca TMF Group and Yoab Bitran, LRN Recorded: Sep 25 2018 61 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Recorded: Sep 25 2018 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Recorded: Sep 25 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES Waterford Technologies Recorded: Sep 19 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • WATERFORD TECHNOLOGIES | OVERVIEW
    WATERFORD TECHNOLOGIES | OVERVIEW Waterford Technologies Recorded: Sep 19 2018 2 mins
    Waterford Technologies are experts in Compliance Technology and Unstructured Data (Email & File) Management. We enable organisations to achieve a clear overview of their data, enabling informed business decisions to prepare for legislation such as GDPR and MiFID II. We simplify data oversight by providing cutting edge technology and unlimited unrivalled support.
  • Email and File Compliance Solution for GDPR
    Email and File Compliance Solution for GDPR Waterford Technologies Recorded: Sep 19 2018 3 mins
    ComplyKEY from Waterford Technologies has been developed to help organizations address their unstructured Email and File Data to meet new compliance regulations such as GDPR.

    Talk to us today about how our Data Management experts can help your compliance needs.

    https://www.waterfordtechnologies.com...

    Call us today for a FREE Data Strategy Review
    EMEA: +353 (0) 51 334 967
    UK: 0845 378 0935
    USA: +1 (949) 428 9300
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION Waterford Technologies Recorded: Sep 19 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • eDiscovery Dirty Tricks (And How to Defeat Them)
    eDiscovery Dirty Tricks (And How to Defeat Them) Michael Simon, Brian Wolfinger, Moneet Kohli, & Rebecca Rakoski Recorded: Sep 18 2018 64 mins
    Join a panel of experts as they identify some of the most common underhanded eDiscovery tricks and teach you what you can do to defeat them.

    Document dumps, questionable denials of custody and control, meritless objections—when it comes to eDiscovery, your opposing counsel may have a few dirty tricks up his sleeve.

    Attend the webinar and learn to how to counter common situations such as:
    - When a party produces everything plus the kitchen sink
    - When counsel wields proportionality as both a shield and a sword
    - When attorneys play games with privilege claims
    - And many more!

    Featured Presenters:

    Brian Wolfinger: Chief Technology Officer at Everest Technologies, Brian Wolfinger has decades of experience in the worlds of digital forensics and electronic discovery, as founder of Wolfinger Forensics, former CISO and VP of Technology at LDiscovery, and Manager of the Emergency Response Services at ISS.

    Rebecca Rakoski: Rebecca Rakoski is the co-founder and managing partner at XPAN Law Group, a boutique law firm focusing exclusively on cybersecurity and data privacy. She is an expert on the intersection of technology and legal obligations and liabilities and has extensive experience in cybersecurity standards and guidelines.

    Moneet Kohli: An attorney and seasoned eDiscovery expert, Moneet Kohli helps legal professionals implement, manage, and simplify eDiscovery, as Senior Customer Success Manager at Logikcull. In the past, Moneet managed eDiscovery projects at multiple AmLaw 100 firms and corporations throughout the United States. She also serves as San Francisco's Chapter Director of Women in eDiscovery.

    Michael Simon: Michael Simon is an attorney and consultant with over 15 years of experience in the eDiscovery industry, during which he’s seen more than his fair share of dirty tricks. Principal at Seventh Samurai and adjunct professor of law, he regularly writes and presents on pressing eDiscovery issues throughout the country.
  • Corporate compliance in Latin America: main challenges and opportunities
    Corporate compliance in Latin America: main challenges and opportunities Leila Szwarc & Paola Fonseca, TMF Group and Yoab Bitran, LRN Recorded: Sep 18 2018 61 mins
    Meeting the global challenge of evolving corporate compliance.

    Issues to be discussed include:

    1.An overview of the Compliance Complexity Index 2018 (CCI 2018) - Key global trends and the most and least complex countries.

    2. Insights about the main challenges in Latin America:
    - Which are the most complex countries in the Americas (from CCI 2018)
    - Compliance and main regulatory developments in Latin America

    3. How companies should prepare to meet these challenges
  • You've been breached: now what?
    You've been breached: now what? Keith Lockhart, VP Strategic Programs, Access Data Recorded: Sep 14 2018 30 mins
    Do you know where to begin if your organization is impacted by a breach? Learn about best practices for post-breach analysis and response.
  • How to Evaluate & Improve Your E-Discovery Process
    How to Evaluate & Improve Your E-Discovery Process EDRM and Exterro Recorded: Sep 13 2018 63 mins
    No two e-discovery processes are alike. But that doesn’t mean there aren’t universal principles and tools to evaluate and take steps to improve your e-discovery processes.

    Register for this webinar and learn from three e-discovery practitioners about how they have assessed and mended gaps in their e-discovery processes, including:
    -Tips and tools for evaluating your own e-discovery process
    -How to get buy-in across departments for real change
    -Learn more about what mature e-discovery operations look like
  • Aviation Law News European Drone Law
    Aviation Law News European Drone Law Airbus, Bird & Bird, Monard Law, LS Lexjus Sinacta, DLA Piper Recorded: Sep 13 2018 64 mins
    Recent months have seen the European Parliament back EU-wide safety regulations and registries for drones, which could mean large fines for manufacturers and operators, as well as recommendations by the European Aviation Safety Agency for new rules on the use of electronic identification systems and geo-awareness technology in drones.

    Against this backdrop, our panel will provide detailed insight on the current legislative state of play, taking in such topics as the transition from national to EU-wide drone laws; the timeline and implementation of the new regulations; practical challenges for regulators; and the categorisation and certification requirements for drones.

    Panellists will also examine related issues for drone users and regulators – including insurance, liability and privacy – as well as looking to what developments we can expect in the future.
  • Seven Steps to Effective Regulatory Response
    Seven Steps to Effective Regulatory Response EDRM and Zapproved Recorded: Sep 5 2018 60 mins
    Learn the seven steps to effective regulatory response and be prepared to respond quickly to ensure compliance.

    Regulatory agencies such as the SEC and CFTC can initiate an investigation into business activity at any time, bringing challenges beyond those of typical ediscovery. Regulatory investigations often relate to unclear charges, make broad and sweeping data requests under unrealistically tight timelines, and bear severe consequences for noncompliance. Organizations need to be prepared to identify, preserve, and analyze relevant information rapidly and accurately.

    In this webinar, Zapproved will discuss seven clear, actionable steps to launch a successful regulatory response. These steps start with strategizing and preserving data before moving into assessing information, negotiating the terms of the request, creating privilege logs, and keeping the lines of communication open.

    Any organization subject to regulatory oversight could be investigated at any time. Prepare today so you can face tomorrow with confidence.
  • Theft of Trade Secrets - Forensics Best Practices
    Theft of Trade Secrets - Forensics Best Practices Dylan Wiseman, Esq. (Buchalter) and Michael Sarlo (HaystackID) Recorded: Sep 5 2018 74 mins
    Attorneys and in-house counsel need to be aware of how best to respond to the potential for loss of control of protected and trade secret information in the face of the departure of employees who may have had access to such information. Time is of the essence, but the methodology and process controls governing the forensic preservation and collection of at-risk information is critical to mounting a valid response.

    This expert presentation will cover the best practices for counsel to adopt in working to identify and forensically preserve and collect data in a sound, defensible manner. The presentation also will educate legal professionals as to the essential categories of evidence that can be recovered from smartphones and how these categories can be leveraged in not only a defensive manner but also an offensive manner in civil litigation.

    Key Presentation Topics Include:

    + Defining Trade Secrets
    + Trade Secret Violations and Theft
    + Defining When Should One Reasonably Panic
    + The Importance of Defining Wins Upfront
    + Steps to Identify Custodians of Potential Evidence
    + The Anatomy of an Investigation
    + Reasonable Forensic Analysis Triage
    + Addressing Privacy Concerns

    Presentation Experts:

    + Dylan W. Wiseman, Esq. (Buchalter)

    Based in California, Dylan is a Shareholder with Buchalter. His practice focuses upon intellectual property protection including representing employers in cases involving trade secrets, unfair competition, employee mobility disputes, non-solicitation disputes, social media, workplace privacy, BYOD devices, and eDiscovery.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA (HaystackID)

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • Digital Transformation Series Part 2: Sales Insights
    Digital Transformation Series Part 2: Sales Insights Justin Mongroo VP, Worldwide Sales Excellence at Conga, Seth Marr Demand Generation Coordinator at Conga Recorded: Aug 30 2018 30 mins
    For our 3-part webinar series on Digital Tranformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why Sales professionals should have Digital Transformation on their radar as we discuss:

    - Removing manual administrative tasks through automation
    - How to leverage data and insights to remain competitive
    - Empowering your team with better tools to remove productivity roadblocks
  • Digital Transformation Series Part 1: Legal Insights
    Digital Transformation Series Part 1: Legal Insights Mark Fowler, VP General Counsel at Conga Recorded: Aug 30 2018 42 mins
    For our 3-part webinar series on Digital Tranformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why Legal professionals should have Digital Transformation on their radar as we discuss:

    - The importance of business contracts
    - How bringing efficiency to contracting processes can greatly impact the organization's bottom line
    - The need for legal departments to maximize their efficiencies and automate whenever possible
  • Litigate or Settle? Info You Need to Make Case Decisions
    Litigate or Settle? Info You Need to Make Case Decisions Doug Austin and Tom O'Connor Recorded: Aug 29 2018 65 mins
    People say that fewer and fewer cases go to trial these days. Is that true. Regardless of whether it is or not, what information do you need to know to make an informed decision whether or not to litigate or settle the case and how do you gather that information? This CLE-approved* webcast will discuss how litigation has evolved over the years, how that impacts discovery and what you need to know to decide on the best course of action for each case. Topics include:

    + How Litigation Has Evolved
    + The Importance of Deciding Correctly
    + eDiscovery Considerations
    + Covering Your Bases While You Decide
    + Benefits of Early Data Analysis
    + How Much Each GB Can Cost You
    + Why Number of GBs Isn't All You Need to Know
    + Why You Should Test Searches Before Meet and Confer
    + Other Tips and Tricks to Know for a Successful Outcome

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Dreamforce Panel: How to Dreamforce
    Dreamforce Panel: How to Dreamforce Peter Terhune, Salesforce Evangelist at Conga, Katy Engebretson Partnership Alliances & Sales Operations Manager at Penrod Recorded: Aug 29 2018 30 mins
    Join us to learn how to get the most out of your time at Dreamforce! With 200,000+ attendees, 3,000+ educational sessions, and countless parties, the week can be a lot to tackle.

    Hear from Dreamforce vets and Salesforce MVPs their experiences identifying:

    - Can't-miss breakout sessions
    - Top social events and parties
    - Networking opportunities
  • Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues
    Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues Panelists: Matt Kelly, CEO of Radical Compliance; Catherine Castaldo, Global Chief Privacy Officer, Nuance Communications; Zo Recorded: Aug 29 2018 55 mins
    Emerging privacy issues are coming your way—are you prepared for all the change? Europe’s General Data Protection Regulation will impose significant new duties of risk assessment, data protection, breach response, and much more on companies around the world. Join us for a webinar focused on the potential impact of GDPR coming into force next spring, and how to prepare. Panelists discuss how these obligations will affect companies’ information risk management efforts, and how prepared your business needs to be for these compliance burdens coming soon.
  • Session 2 Managing Internal Investigations Swamped with Data
    Session 2 Managing Internal Investigations Swamped with Data Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Mark Antalik, Managing Director, BDO's Forensic Tec Recorded: Aug 28 2018 58 mins
    Digital forensics is critical to today’s internal investigations swamped in data. How prepared are you to manage the task? Hear panelists discuss strategies and techniques for internal investigations where data forensics is critical. They’ll answer questions such as how a company can police against insider threats, and how BYOD policy management can satisfy modern corporate life and modern information risk. They’ll also share pitfalls to avoid so companies won’t inadvertently jeopardize privacy or IP rights (their own or someone else’s) during investigations.
  • New Horizons in Data and Litigation
    New Horizons in Data and Litigation Christopher J. Adams, Martha K. Louks, and Michael Simon Recorded: Aug 28 2018 62 mins
    The amount of data available to legal professionals is expanding at a mind-boggling pace. Over 2.5 exabytes, or 75 trillion pages’ worth, of data is generated every day. And much of it isn’t the email inboxes and Office documents attorneys are used to dealing with.

    From chat messages, to IoT data, to ephemeral communications, tomorrow’s case-dispositive data can take nearly any shape.

    Join us for this webinar as we explore the ways novel data sources are reshaping the future of discovery and litigation. Topics to be covered include:

    -- Mobile data: Does BYOD, BYOA and BOYC all add up to Bring Your Own Nightmare?
    -- Redefining TL;DR with ephemeral messaging
    -- Welcome to your quantified life. BTW, it’s all discoverable
    -- The IoT isn’t SciFi. It’s here now and it’s also all discoverable

    It’s an educational, action- and acronym-packed hour you don’t want to miss.
  • Session 1 Information Risk and Compliance in the Digital Age
    Session 1 Information Risk and Compliance in the Digital Age Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Debra Farber, Privacy Consultant and former Sr. Dir Recorded: Aug 28 2018 55 mins
    Is your IT team driving information risk strategy, or is it being driven by new technology used across your organization? How do you divide and conquer risk and data governance across disparate teams and tools? How do you define information risk? In this webinar, speakers will answer these questions and more as they explore the modern challenges of information risk, and the oversight systems necessary for the enterprise-wide management of it. They’ll share insights and best practices on how to strike the balance between instituting protective measures, responding to threats and providing assurances that risk is under control.
  • New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4
    New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4 Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs Recorded: Aug 28 2018 50 mins
    Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs

    Aug 28 2018
    10:00 EDT / 15:00 BST

    The latest release of DFLabs IncMan SOAR platform v4.4 includes a range of additional and enhanced features and capabilities including:

    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - Enhanced flexibility of runbooks
    - And more...

    Join this webinar to get this unique opportunity to take a look at the new and improved IncMan SOAR platform and see first-hand one of the most exciting new features and first of its kind capability, START (Simple Triage And Rapid Treatment) Triage, in action.

    START Triage aims to dramatically reduce the number of security incidents generated from alerts and is being used in production by a major European bank to eliminate manual first line assessment of suspected fraudulent online transactions. IncMan SOAR has reduced triage time by 90% for cyber fraud events generated by its mainframe and other external systems. The flexible, open and customizable architecture of IncMan SOAR’s START Triage allows it to adapt to virtually any use case and data source, including network alerts, endpoint alerts, transaction fraud alerts, physical security events and threat intelligence alerts.
  • Preparing for Litigation Before it Happens
    Preparing for Litigation Before it Happens Doug Austin and Tom O'Connor Sep 26 2018 5:00 pm UTC 75 mins
    Information Governance (IG) has always been part of the eDiscovery landscape and it has always been important for reducing the population of potentially responsive electronically stored information (ESI) that might be subject to litigation by helping organizations adopt best practices for keeping their information “house in order”. But now with an increased concentration on the two-fold concerns of privacy and security, IG has become more important than ever. This CLE-approved* webcast will explore the implementation of Information Governance best practices to help organizations better prepare for litigation before it happens. Topics include:

    + Minority Report: Pre-Case for Litigation Avoidance
    + What Information Governance is and What it Isn't
    + General Principles for Information Governance
    + Who Uses Information Governance?
    + IG Considerations and Issues
    + Basic Information Governance Solutions
    + Information Governance vs. Analytics
    + How Privacy/Security Has Impacted the Importance of an IG Program
    + Recommendations for Implementing an IG Program

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Drone Forensics
    Drone Forensics Rob Attoe, CEO, Spyder Forensics Sep 28 2018 3:00 pm UTC 60 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • Debunking the Top Ten Myths of Document Review
    Debunking the Top Ten Myths of Document Review Michael Dalewitz, President (ReviewRight) Oct 3 2018 4:00 pm UTC 75 mins
    Representing the largest expenditure in the eDiscovery task continuum, the review phase of legal discovery consumes almost 70% of each dollar spent on eDiscovery. Understanding budgetary constraints routinely are a top concern for eDiscovery professionals, legal departments and law firms are continually seeking ways to become more time effective and cost efficient during document reviews. But are these professionals making sourcing decisions based on facts or assumptions? This expert presentation will highlight ten of the most common myths associated with attorney document reviews and present approaches for avoiding decisions based on myths.

    Key Presentation Topics Include:

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Presentation Leader: Michael Dalewitz, HaystackID

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model. He created one of the industry’s first managed document review models and developed the first document review metrics tracking software.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.
  • Get a “Clue” Regarding Your eDiscovery Process
    Get a “Clue” Regarding Your eDiscovery Process Doug Austin, Tom O'Connor, and Mike Quartararo Oct 31 2018 5:00 pm UTC 75 mins
    As evidenced by some high-profile recent eDiscovery disasters, managing eDiscovery projects is more complex than ever. Not only have the volume and variability of ESI data sources increased dramatically, but there are often more stakeholders in eDiscovery projects today than characters on the board game Clue©. Successful eDiscovery today means not only meeting your obligations, but also making sure that each stakeholder in the process succeeds as well. This CLE-approved* webcast will discuss the various participants in the eDiscovery process, what motivates each of them, and best practices on how to avoid becoming the next high-profile eDiscovery disaster. Topics include:

    + The Process: Managing the Project from Initiation to Close
    + The Phases: Managing the Flow of ESI Before and During the Process
    + The Players: Goals and Objectives of Each eDiscovery Stakeholder
    + Whodunnit?: Lessons Learned from a Large Financial Institution’s Mistakes
    + Whodunnit?: Lessons Learned from a Government Entity’s Mistakes
    + Whodunnit?: Lessons Learned from a Medical Center’s Mistakes
    + Recommendations for Avoiding Your Own Mistakes
    + Resources for More Information

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    Mike Quartararo is the founder and managing director of eDPM Advisory Services. He is also the author of the 2016 book Project Management in Electronic Discovery, the only book to merge project management principles and best practices in electronic discovery.
  • Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain
    Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain John Wilson, ACE, AME, CBE Nov 7 2018 5:00 pm UTC 75 mins
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Etherium, today's legal professional is behind the proverbial power curve if they do not have a basic understanding of emerging cryptocurrency and blockchain technologies. As these emerging technologies are rapidly moving from proof of concept projects to formal systems of record, it is only a matter of time until almost anyone involved in the business of law or the law of business is confronted with a situation involving these highly publicized technologies.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both blockchains and cryptocurrencies to arm attendees with essential information that will help them understand these technologies that are changing the landscape of business and law.

    Key Presentation Topics Include:

    + Understanding Cryptocurrencies
    + Why Cryptocurrencies Have Value
    + How Cryptocurrencies Work
    + Understanding Blockchain
    + Why Blockchain Is A Foundational Technology
    + How Blockchain Works
    + Use Cases for Blockchain as a Legal Technology
    + eDiscovery Considerations for Cryptocurrencies and Blockchain

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.
  • Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain John Wilson, ACE, AME, CBE Dec 4 2018 5:00 pm UTC 75 mins
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as part of data discovery and legal discovery processes.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both cryptocurrencies and blockchains and provide attendees with fundamental information that will help them understand how to examine and investigate these technologies and the electronically stored information that results from their usage.

    Key Presentation Topics Include:

    + Quick Review: Cryptocurrencies and Blockchain
    + Crime, Cryptocurrencies, and Blockchain
    + Investigating Cryptocurrencies and Blockchain
    + The Physical Scene
    + The Digital Scene
    + Forensic Evidence
    + Following Transaction Trails
    + Investigation Intelligence

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.