Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Training Snapshot: Early Data Assessment from CloudNine
    Training Snapshot: Early Data Assessment from CloudNine Brian Kelley Recorded: Jan 18 2018 4 mins
    A snapshot demonstration of the process required to quickly generate an Early Data Assessment (EDA) report from within the CloudNine eDiscovery Platform and to review the information provided in the report.

    EDA reports provide a comprehensive view of the content and context of a collection of electronically stored information (ESI) early in the litigation, audit, or investigation lifecycle to help eDiscovery practitioners better understand, estimate, and plan discovery efforts.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Breaking Down TAR and Its Uses
    Breaking Down TAR and Its Uses U.S. Magistrate Judge Andrew Peck (SDNY); Matt Poplawski (Winston & Strawn); Harsh Sutaria (Knovos) Recorded: Jan 18 2018 63 mins
    Learn about technology-assisted review methodologies, workflows, and uses in this comprehensive overview of TAR. We'll review what predictive coding methods are available, how they work, and what methods are recommended for specific situations. And we'll hear from a federal judge on why you need to understand TAR.

    Hosted by Jim Waldron, director, EDRM. Sponsored by Knovos.
  • Slack, Social Media and Self-Deleting Texts: Developments in Employment Law
    Slack, Social Media and Self-Deleting Texts: Developments in Employment Law Eric Meyer, Partner at Dilworth Paxson, Kristin Ahr, Of Counsel at Broad and Cassel, and Vilma Martinez, GC at Avante Group Recorded: Jan 18 2018 64 mins
    With the explosion of new technology and forms of communication, the modern workplace has become a hotbed of potential evidence that proves essential in labor and employment disputes and investigations. Landlines and water coolers have long been replaced by Slack and Google Hangouts -- and the resulting landscape is one that can vex employers and attorneys who are not up to speed. In this Logikcull webinar, experts including Eric Meyer, partner at Dilworth Paxson in Philadelphia and author of the award-winning Employer Handbook blog, give practical guidance for legal professionals on hot topics, including:

    - The obligations of employers to maintain and update social media, BYOD and other technology-related policies,

    - Navigating personal text messages, emojis, social media and Slack in the course of discovery,

    - The impact of recent case law on employee right to privacy in light of new technology,

    - Self-deleting messaging apps, “ephemeral” media, and their consequences on the duty to preserve.
  • Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018
    Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 Doug Austin and Tom O'Connor Recorded: Jan 11 2018 63 mins
    2017 was a very interesting year for eDiscovery case law and the impact of FRCP rules changes in 2015 became even more apparent. How can the key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2017 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Handling objections to production requests
    + Waiver of privilege and Rule 502(d)
    + Case law related to subpoenaed production of international data
    + Control of data stored by a third party
    + Dictation of search terms and production scope by courts
    + Form of production disputes and the issues involved
    + Performing keyword search before Technology Assisted Review
    + The state of sanctions with the new Rule 37(e)

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Recorded: Dec 19 2017 31 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • 2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation
    2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation Judge Frank Maas, Attorney Michael Simon and More Recorded: Dec 7 2017 63 mins
    In modern legal practice, the difference between success and failure often boils down to the ability to navigate and make sense of data. To that end, the legal profession in 2017 was largely shaped by major developments in data and legal technology, from the way in which discovery sanctions were adjudicated to news-making data breaches, such as the so-called “Paradise Papers,” where the hacking of a major law firm exposed illicit tax-sheltering practices of many of the firm’s clients. Over the course of a tumultuous year, legal professionals confronted the specter of cybercrime, a shifting of judicial views on how (and how hard) evidentiary penalties should be imposed, and the fact that the demise of a client’s case -- or a fruitful career -- can arise from a simple failure to understand how modern tech works. The Supreme Court, in the high-profile Goodyear decision, even got in on the action.

    Join a panel of experts, including federal judges, as we glean practical guidance from the most important cases and developments of 2017.

    Cases reviewed include:

    Goodyear Tire & Rubber Co. v. Haeger, No. 15-1406 (U.S. Apr. 18, 2017): When does a court’s inherent power to sanction cross the line?

    Ronnie Van Zant, Inc. v. Pyle, 2017 U.S. Dist. LEXIS 138039 (S.D.N.Y. Aug. 28, 2017): Non-party sanctioned under Rule 37(e) for loss of cell phone information.

    Harleysville Insurance Co. v. Holding Funeral Home, Inc., No. 1:15cv00057 (W.D. Va. Oct. 2, 2017): Should privilege be waived due to inappropriate use of a file-sharing site?

    N.M. Oncology & Hematology Consultants v. Presbyterian Healthcare Servs., 2017 U.S. Dist. LEXIS 130959 (D.N.M. Aug. 16, 2017): Should sanctions be levied for giving employees discretion to preserve emails?

    Bailey v. Brookdale University Hospital Medical Center, No. CV 16-2195(ADS)(AKT), 2017 WL 2616957 (E.D.N.Y. June 16, 2017): Expensive discovery persuades court to split costs, and penalize counsel, in light of lopsided ESI agreement.
  • Creating an Information Governance Roadmap
    Creating an Information Governance Roadmap Mark Diamond, CEO, Contoural Recorded: Dec 1 2017 54 mins
    A well-designed Information Governance roadmap with appropriate milestones and metrics can drive a successful program forward. Join this webcast to learn more about:
    • Key elements for launching an Information Governance Program
    • How to incorporate these elements to meet your organization’s specific needs
    • Creating a team to help you launch your program
  • Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong
    Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong Doug Austin and Tom O'Connor Recorded: Dec 1 2017 67 mins
    As data complexity, discovery costs, and regulatory challenges increase in volume and impact, the pulse rate of publicly highlighted eDiscovery mistakes continues to build. While these mistakes are unfortunate for those who experienced them, they can be beneficial to the rest of us in highlighting mistakes you can avoid in your own cases. During this free, one-hour, CLE* presentation, eDiscovery experts Doug Austin and Tom O'Connor will discuss examples of recent eDiscovery disasters and highlight the common characteristics of those disasters and what can be done to avoid them in your own cases. Topics include but are not limited to:

    + Attorney Duty of Competence
    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching and Redaction Mistakes and How to Avoid Them
    + Checklist of Items to Ensure a Smooth and Accurate Production
    + Managing Communications: Attorney and Vendor Responsibilities

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Creating an In-House Discovery Response Plan
    Creating an In-House Discovery Response Plan Tom Mighell, Esq., VP of Delivery Services, Contoural Recorded: Dec 1 2017 59 mins
    Like most companies, you probably have a process for responding to discovery requests in litigation or regulatory matters. But is that process documented? If the staff in charge of discovery left today, or if that big class action finally hit, would you be prepared? Sometimes, having a consistent, repeatable process in place can help to protect you from surprise, sanction, or high discovery costs - especially if your company has a low litigation profile.

    This webcast will cover:
    • How to create a discovery response plan, no matter your company size
    • Understanding how good information governance practices can improve your litigation readiness
    • Best practices for legal holds
    • The role technology plays in eDiscovery, whether you should invest in it, or use outsourced technology services
    • eDiscovery when your company stores records in the cloud
  • Is It Time for Your Retention Schedule to Grow Up and Become Something Useful?
    Is It Time for Your Retention Schedule to Grow Up and Become Something Useful? Mark Diamond, CEO, Contoural Recorded: Dec 1 2017 51 mins
    We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your e-discovery and information governance foundations. Many organizations consider records retention as something that they have to do, but feel handcuffed because they have no way of enforcing a policy.

    Join this webcast to learn more about:
    • Creating a modern, compliant and useful records retention schedule
    • Applying a schedule to reduce risks and costs in future discovery
    • Addressing both legal and regulatory requirements as well as business needs
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Executive for Germany/Austria/Switzerland Recorded: Nov 27 2017 34 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • ACEDS Webinar: On Premise, Off Premise, or Both? Factors Affecting eDiscovery
    ACEDS Webinar: On Premise, Off Premise, or Both? Factors Affecting eDiscovery Doug Austin Recorded: Nov 15 2017 62 mins
    Many say that the cloud is revolutionizing eDiscovery as we know it, while others still prefer the control of the on-premise eDiscovery solutions they’re used to using. So, what factors should you consider when selecting your own eDiscovery solution? This presentation and technology demonstration led by eDiscovery Daily Blog author and eDiscovery expert Doug Austin will provide attendees with an overview of the different approaches and how both approaches could fit into the workflow of an organization.
  • eDiscovery Case Law Update Webinar
    eDiscovery Case Law Update Webinar Robert Hilson Recorded: Nov 15 2017 60 mins
    Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.

    Featured cases include:

    Fischer v. Forrest - Boilerplate objections create havoc
    Morgan Hill Concerned Parents Ass'n - If at first you don't produce correctly, try try again.
    Harleysville Ins. Co. v. Holding Funeral Home - Hitting 'reply all' to the entire internet = privilege waiver
    Solo v. UPS Co. - Proportionality is here, finally.
    Shawe v. Elting - Bad conduct draws bad sanctions...
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Recorded: Nov 6 2017 28 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • Lessons Learned from Recent eDiscovery Disasters
    Lessons Learned from Recent eDiscovery Disasters Doug Austin and Tom O'Connor Recorded: Oct 25 2017 63 mins
    The recent eDiscovery failures at Wells Fargo and at the Department of Justice show that eDiscovery mistakes and failures happen even at the largest corporations and government agencies. This CLE-approved* webcast will discuss the various issues that occurred in these high-profile cases and what to do to avoid them in your own cases. Topics include:

    + Attorney Duty of Competence
    + Managing Communications: Attorney Responsibilities
    + Managing Communications: Vendor Responsibilities
    + Recommended Workflows for Tracking Review
    + Common Redaction Mistakes and How to Avoid Them
    + Checking for Personally Identifiable Information (PII)
    + Key Takeaways for Better eDiscovery Project Management

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • 2017 In-House E-Discovery Trends Analysis
    2017 In-House E-Discovery Trends Analysis George Socha (BDO and EDRM), Jim Waldron (EDRM), Joe Mulenex (Exterro) Recorded: Oct 17 2017 62 mins
    The year is almost over, but before we start looking ahead to 2018 it's important to look back and clearly understand how your e-discovery and legal processes stack up against those of your peers. In this upcoming webcast, learn how in-house legal departments are trying to become more productive and reduce legal spend. We'll review new legal research conducted by EDRM/Duke, Exterro and BDO Consulting to examine trends, what's working, and what's not.
  • ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security
    ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security Doug Austin and Tom O'Connor Recorded: Oct 11 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • Holy ****, The Case is Filed!  What Do I Do Now?
    Holy ****, The Case is Filed! What Do I Do Now? Doug Austin and Tom O'Connor Recorded: Sep 27 2017 66 mins
    The first days after a complaint is filed are critical to managing the eDiscovery requirements of the case efficiently and cost-effectively. With a scheduling order required within 120 days of the complaint and a Rule 26(f) “meet and confer” conference required at least 21 days before that, there’s a lot to do and a short time to do it. Where do you begin? This CLE-approved* webcast will discuss the various issues to consider and decisions to be made to help you meet your discovery obligations in an efficient and proportional manner. Topics include:

    + What You Should Consider Doing before a Case is Even Filed
    + Scoping the Discovery Effort
    + Identifying Employees Likely to Have Potentially Responsive ESI
    + Mapping Data within the Organization
    + Timing and Execution of the Litigation Hold
    + Handling of Inaccessible Data
    + Guidelines for Interviewing Custodians
    + Managing ESI Collection and Chain of Custody
    + Search Considerations and Preparation
    + Handling and Clawback of Privileged and Confidential Materials
    + Determining Required Format(s) for Production
    + Timing of Discovery Deliverables and Phased Discovery
    + Identifying eDiscovery Liaison and 30(b)(6) Witnesses
    + Available Resources and Checklists

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Protecting Client Data in the Age of Cybercrime
    Protecting Client Data in the Age of Cybercrime Brian Focht, Eli Walk, Joe Marquette Recorded: Sep 22 2017 61 mins
    If you're practicing law in 2017, you're squarely in the crosshairs of one of the biggest threats the profession has ever faced. Law firms, by the nature of their business, are possessors of their clients' most sensitive trade secrets, IP and electronic records. And hackers know it. Earlier this year, this threat came home to roost in a big way: The Panama-based law firm Mossack Fonseca fell prey to what Edward Snowden described as the "biggest leak in the history of data journalism" -- where hackers accessed the firms IT framework and leaked more than 11.5 million documents across the web.
  • Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives
    Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives Sponsored by Dechert LLP; hosted by Jim Waldron, director of EDRM. Recorded: Sep 19 2017 60 mins
    Join us for a discussion of the E.U. General Data Protection Regulation and the new People’s Republic of China data privacy law and the potential impact on e-discovery in litigation. We'll also discuss how changing technologies in cloud computing might impact preservation and collection in e-discovery, including cross-border data sharing. Presenters include experienced attorneys from Dechert LLP based in the U.S., Asia and the E.U. The session will conclude with a Q&A.

    Moderator: Jim Waldron – Director, EDRM
    Speakers:
    Timothy C. Blank – Partner, Boston
    Hilary Bonaccorsi – Associate, Boston
    Dr. Olaf Fasshauer – National Partner, Munich
    Philip Kwok – Associate, Hong Kong
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin and Tom O'Connor Recorded: Sep 13 2017 66 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This free and CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017.

    Presentation Highlights

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Webinar Presenters

    Doug Austin: VP of Operations and Professional Services, CloudNine
    At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor: eDiscovery Expert and Special Consultant to CloudNine
    Tom is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.
  • Social Media and the Law
    Social Media and the Law John Isaza, Eric Goldman, Aryan Kushan Recorded: Sep 6 2017 65 mins
    There are more than three billion active social media users across the world today. That’s almost half the global population, regularly tweeting about the news, sharing updates about their work, and, yes, uploading pictures of their lunch. But social media isn’t just changing the way we interact with each other; it’s changing the way we practice law.

    The rise of social media has significant and novel implications for legal professionals. How are social media messages accessed and preserved for litigation? What are the information governance implications, and potential liabilities, that can stem from a company’s Twitter account or an employee’s Facebook usage? And how are attorneys supposed to make sense of a or a , when emojis are working their way into more and more communication, on social networks and off?
  • Automation as a Force Multiplier in Cyber Incident Response
    Automation as a Force Multiplier in Cyber Incident Response Mike Fowler (CISSP, EnCE), VP of Professional Services at DFLabs Recorded: Sep 6 2017 33 mins
    Four Best Practices to eliminate Security Analyst Alert Fatigue

    Join us in this webinar to learn industry best practices to improve your security analyst’s effectiveness by eliminating Alert Fatigue.

    By 2019, ISACA predicts a shortage of 2 million cyber security professionals. This scarcity of skilled labor and a security alert false positive rate of over 52% means that your security team is overstretched and overwhelmed.

    Security Analysts are subjected to such a volume and frequency of alerts that they become desensitized to the information they are meant to analyze, resulting in critical alerts being disregarded or missed.

    When responding to tens of thousands of security alarms a month, how can you reliably distinguish what's important from what's just a noise in the background?

    Join us in this webinar and learn how you can help your overwhelmed cyber response team to "SOAR" above the noise when responding to incidents. Mike Fowler will present proven best practices to reduce and avoid alert fatigue:

    ● What is “Alert/Alarm Fatigue” and why should you care?
    ● What is the impact of alert fatigue on Security Operations and Incident Response?
    ● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
    ● How to reinforce the front line
    ● How to leverage automation capabilities to act as a Force Multiplier through Incident Automation and Orchestration

    Our webinar presenter, Mike Fowler (CISSP, EnCE), is the Vice President of Professional Services at DFLabs and has over two decades of experience in incident response and forensic investigations.
  • On Premise or Off Premise? A Look at Security Approaches to eDiscovery
    On Premise or Off Premise? A Look at Security Approaches to eDiscovery Doug Austin and Tom O'Connor Recorded: Aug 30 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • Practical Tips for a Successful First TAR Project
    Practical Tips for a Successful First TAR Project George Socha, Kelly Atherton, and Sam Merritt Recorded: Aug 8 2017 63 mins
    Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.
  • Webinar: A Sneak Peek at Exterro's 2018 Federal Judges Survey Results
    Webinar: A Sneak Peek at Exterro's 2018 Federal Judges Survey Results U.S. Magistrate Judge Andrew Peck (SDNY); former U.S. Magistrate Judge Ron Hedges; Michael Hamilton (Exterro) Jan 23 2018 5:30 pm UTC 60 mins
    Get a sneak peek at new legal research conducted by EDRM/Duke Law, Exterro and BDO Consulting on how judges are enforcing new e-discovery rules in their courtrooms along with judicial insight for improving e-discovery outcomes. In this webinar, two federal judges will walk attendees through the judges survey results and offer their own perspectives for implementing defensible but yet proportional e-discovery practices.

    We'll discuss what federal judges see as:

    - The primary cause of e-discovery problems and how to fix them
    - The easiest way for legal teams to improve e-discovery outcomes
    - The "must-do" preservation activities to ensure your actions are defensible

    Hosted by George Socha, cofounder, EDRM. Sponsored by Exterro.
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Feb 6 2018 3:00 pm UTC 30 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • 2018: Emerging Trends in eDiscovery
    2018: Emerging Trends in eDiscovery Antigone Peyton, Protorae Law, Michael Simon, Seventh Samurai Feb 7 2018 6:00 pm UTC 75 mins
    In 2018, will ever-accelerating data growth threaten to overwhelm the legal system? Will ephemeral messaging result in a new body of spoliation case law? Will sanctions based on inherent authority make a resurgence? Will the Alexa, social media, and the Internet of Things start changing how lawyers approach discovery? Will eDiscovery finally become just discovery?

    Join hosts Antigone Petyon, Chair of the Intellectual Property and Technology Law Practice group at Protorea Law, and Michael Simon, attorney and consultant with Seventh Samurai, as we discuss these emerging trends and many more. It’s almost like staring into a crystal ball.
  • You've Got Your GDPR Policy, Now What?
    You've Got Your GDPR Policy, Now What? Tom Mighell, Esq., VP of Delivery Services, Contoural Feb 20 2018 4:00 pm UTC 60 mins
    In many ways, having your Data Protection Policy in place is not necessarily the last mile, but the first. In order to be fully GDPR-compliant, you need to understand where all of your information is, where your privacy data lives and how it’s being secured.
    Join Contoural CEO Mark Diamond as he discusses the roadmap you need to follow to achieve full compliance before the May 25th deadline. Topics will include:
    • Strategies to execute your policy
    • How to train everyone in your organization to be aware of privacy requirements
    • Appointing a Data Protection Officer to manage your privacy program for your organization
    • Steps your organization needs to take now to be ready
  • Becoming Compliant – Finding GDPR Data in the Wild
    Becoming Compliant – Finding GDPR Data in the Wild Tom Mighell, Esq., VP of Delivery Services and Greg Forest, CTO, Contoural Feb 21 2018 4:00 pm UTC 60 mins
    In many ways, creating your GDPR Data Protection Policy is the easy part. As the May deadline approaches, the real work begins on finding all your Privacy Data not only in databases but also GDPR content scattered across file shares, desktops and other storage repositories around the world.
    In this Webcast, Contoural expert Tom Mighell will discuss:
    • Real-world strategies and processes for identifying, classifying and securing large amounts of not only unstructured GDPR data
    • Addressing semi-structured content
    • Applying automation
    • Creating an ongoing process
  • eDiscovery and the GDPR: Ready or Not, Here it Comes!
    eDiscovery and the GDPR: Ready or Not, Here it Comes! Doug Austin and Tom O'Connor Feb 21 2018 6:00 pm UTC 75 mins
    Do you think that your organization isn’t subject to the requirements of Europe’s impending General Data Protection Regulation (GDPR)?  You may be wrong about that.  If it is, are you on target to be compliant by May 25?  This CLE-approved* webcast session will cover how data privacy requirements have evolved over time, the parameters associated with the GDPR, what they mean to your organization and what steps your organization needs to take to ensure compliance with the GDPR.  Topics include:
     
    + How Data Privacy Requirements Have Evolved in the US and Europe
    + Scope of the GDPR Beyond the EU
    + A Definitional Baseline for GDPR
    + Important Changes and Organizational Impact
    + Data Existence and GDPR Compliance
    + Challenges Presented by Privacy Rights Associated with the GDPR
    + Fines: The Potential Cost of Non-Compliance
    + Business of the GDPR: Controllers and Processors
    + Steps to Take to Comply with the GDPR

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. 

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Creating a Single Data Security Classification Policy for GDPR & Everything Else
    Creating a Single Data Security Classification Policy for GDPR & Everything Else Greg Forest, CTO Feb 22 2018 4:00 pm UTC 60 mins
    In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
    • An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
    • Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
    • How to create a hybrid standard
    • Sampling your standard with content, and using this to drive adjustments and fine tuning
    • How to integrate data classification with record retention