Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Nuix Ringtail demonstration: removing doubt from your discovery process
    Nuix Ringtail demonstration: removing doubt from your discovery process
    Christina Mather, Solutions Consultant, Nuix Recorded: Nov 12 2018 31 mins
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Re:Call from TeleWare at Microsoft Future Decoded 2018
    Re:Call from TeleWare at Microsoft Future Decoded 2018
    Mark Elwood - Marketing Director, TeleWare Recorded: Nov 12 2018 2 mins
    Check out our highlights video from Future Decoded 2018 to see what we got up to (you might have even made the final cut!).
  • Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain
    Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain
    John Wilson, ACE, AME, CBE Recorded: Nov 7 2018 56 mins
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Etherium, today's legal professional is behind the proverbial power curve if they do not have a basic understanding of emerging cryptocurrency and blockchain technologies. As these emerging technologies are rapidly moving from proof of concept projects to formal systems of record, it is only a matter of time until almost anyone involved in the business of law or the law of business is confronted with a situation involving these highly publicized technologies.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both blockchains and cryptocurrencies to arm attendees with essential information that will help them understand these technologies that are changing the landscape of business and law.

    Key Presentation Topics Include:

    + Understanding Cryptocurrencies
    + Why Cryptocurrencies Have Value
    + How Cryptocurrencies Work
    + Understanding Blockchain
    + Why Blockchain Is A Foundational Technology
    + How Blockchain Works
    + Use Cases for Blockchain as a Legal Technology
    + eDiscovery Considerations for Cryptocurrencies and Blockchain

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.
  • The New World of AI - Powered Contracts
    The New World of AI - Powered Contracts
    Tim Cummins, IACCM President and Jason Gabbard, Head of AI, Conga Recorded: Nov 6 2018 55 mins
    Contract management is an area that is ripe for innovation and digital transformation. Often contracting processes are bureaucratic, burdensome, and a major source of delays. Yet new technological solutions are emerging quickly, affording the opportunity for AI to manage much of the process, while freeing up people—contract management staff—to focus on more strategic tasks.

    Are you prepared for the pace of change?

    Join us live to hear from IACCM President Tim Cummins and Conga Head of AI Jason Gabbard while they chat about:

    -The essential documents and contracts to automate.
    -Driving compliance across departments and increasing collaboration.
    -Boosting efficiency by reducing errors with key AI technology and Machine Learning.
  • Get a “Clue” Regarding Your eDiscovery Process
    Get a “Clue” Regarding Your eDiscovery Process
    Doug Austin, Tom O'Connor, and Mike Quartararo Recorded: Oct 31 2018 69 mins
    As evidenced by some high-profile recent eDiscovery disasters, managing eDiscovery projects is more complex than ever. Not only have the volume and variability of ESI data sources increased dramatically, but there are often more stakeholders in eDiscovery projects today than characters on the board game Clue©. Successful eDiscovery today means not only meeting your obligations, but also making sure that each stakeholder in the process succeeds as well. This CLE-approved* webcast will discuss the various participants in the eDiscovery process, what motivates each of them, and best practices on how to avoid becoming the next high-profile eDiscovery disaster. Topics include:

    + The Process: Managing the Project from Initiation to Close
    + The Phases: Managing the Flow of ESI Before and During the Process
    + The Players: Goals and Objectives of Each eDiscovery Stakeholder
    + Whodunnit?: Lessons Learned from a Large Financial Institution’s Mistakes
    + Whodunnit?: Lessons Learned from a Government Entity’s Mistakes
    + Whodunnit?: Lessons Learned from a Medical Center’s Mistakes
    + Recommendations for Avoiding Your Own Mistakes
    + Resources for More Information

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    Mike Quartararo is the founder and managing director of eDPM Advisory Services. He is also the author of the 2016 book Project Management in Electronic Discovery, the only book to merge project management principles and best practices in electronic discovery.
  • Using Threat Intelligence Effectively in Security Automation and Orchestration
    Using Threat Intelligence Effectively in Security Automation and Orchestration
    John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Recorded: Oct 30 2018 54 mins
    Using Threat Intelligence Effectively in Security Automation and Orchestration: A DFLabs and Cisco Use Case.

    Actionable intelligence is critical to responding efficiently and effectively to a potential security incident. Inaccurate or incomplete intelligence can lead to threats dwelling on the network, resulting in increased financial losses and irreparable damage to reputation. Once a threat has been discovered, decisive action must be taken to contain the threat.

    Cisco’s suite of detection, intelligence and response products, including Email Security Appliance, Threat Grid, Umbrella and Umbrella Investigate; offer security practitioners an unparalleled suite of tools, to address all phases of the incident response lifecycle.

    Combining the vast capabilities of Cisco’s suite of security products, with the orchestration and automation power of DFLabs’ IncMan SOAR platform, allows organizations to respond to potential security incidents, with unmatched speed and accuracy.

    Key Takeaways:

    · How Cisco’s suite of security products can improve your security infrastructure
    · How IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    · How Cisco security products combined with IncMan SOAR from DFLabs can automatically respond to threats

    Presented by:
    John Moran, Senior Product Manager, DFLabs
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security
    Michael Auger, Senior Security Solutions Architect, Cisco Security

    Your registration information will be shared with DFLabs’ solution partner Cisco Security, who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Cybersecurity and Your Ethical Duties
    Cybersecurity and Your Ethical Duties
    Eli Wald and Casey Sullivan Recorded: Oct 25 2018 64 mins
    In the eyes of cybercriminals, legal professionals are an easy—and lucrative—target. Law firms are often a one-stop shop for incredibly sensitive information and you might not be doing enough to protect the data in your possession.

    So if a breach occurs, what potential ethics violations may result? Join us for an upcoming webinar as we delve into this question.

    Watch to learn:
    + How not to get hacked and how to respond when you do
    + Where professional responsibility and cybersecurity intersect
    + What steps attorneys must take to protect client data
    + How the "reasonableness" of cybersecurity protections is determined
    And more!

    Featuring Eli Wald, Professor, Sturm College of Law

    A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli was one of the first academics to investigate the ethical implications of law firm cybersecurity, or, as he terms it, “legal ethics’ next frontier.”

    A frequent author and speaker on ethics and professional responsibility, his work has appeared in leading journals such as the Fordham, Stanford, University of Colorado and Wisconsin law reviews, and the Georgetown Journal of Legal Ethics. Eli’s articles have also been cited in ABA ethics opinions and excerpted in legal ethics casebooks.
  • Internal Investigations in Today’s Connected World
    Internal Investigations in Today’s Connected World
    Len Robinson, Ahold Delhaize; Paul Becker, Rockwell Automation: and Keith Lockhart, AccessData Recorded: Oct 23 2018 60 mins
    Whether for employee theft, harassment, data security or other events, corporations are conducting internal investigations on almost a daily basis to investigate claims and identify potential issues. These investigations can prove challenging when crucial evidence in a case is often located across disparate devices and platforms, and numerous stakeholder across the organization need to be involved. Investigative teams need to be prepared in advance for when the need to investigate should arise, to ensure it is handled quickly, efficiently and cost effectively without disruption to business operations.

    During this webinar we will discuss recommended best practices for ensuring a successful internal investigation, covering everything from who should be involved to how you prepare when the investigation moves to potential litigation.
  • Being Future Ready in a Transformative Digital Economy
    Being Future Ready in a Transformative Digital Economy
    Doug Rybacki, Chief Product Officer, Conga & Sheryl Kingstone, Research Director, 451 Research Recorded: Oct 23 2018 48 mins
    In today’s digital economy, companies are competing for customers like never before as price and product are no longer the only drivers of business. The value of delivering an engaging customer experience is on the rise, and businesses are increasingly turning to software and digitized processes to accommodate this trend. In fact, 80 percent of businesses are either planning or formally engaged in digital transformation initiatives to improve their overall customer experience.

    Join us to understand:

    -The importance of Digital Transformation
    -Why businesses must respond to the pace of change
    -The tools for Digital Transformation success
  • The Lawyer's Guide to Slack Discovery
    The Lawyer's Guide to Slack Discovery
    Michael Simon, David Slarskey, and others Recorded: Oct 16 2018 63 mins
    Slack, the massively popular file sharing and messaging platform, is changing communications and discovery as we know them. That's because Slack, and similar tools, are fastly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.

    Join this webinar for a dive into how Slack is changing communications and discovery--and how you can take advantage of this new source of data.

    Register now to learn:
    - How Slack is changing discovery and investigations
    - Why Slack could hold key data for your case
    - The unique challenges Slack data poses
    - How creative legal teams are leveraging Slack data during the discovery process
    - Best practices for dealing with Slack data and overcoming objections, from those who’ve done it
  • How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology
    How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology
    Mike Fowler, CISSP, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs, Recorded: Oct 16 2018 52 mins
    Increased workload coupled with an industry-wide shortage of skilled responders is a common challenge heavily impacting operational performance in Security Operations Centers globally. An integral part of the solution is formulating a methodology to ensure that crucial knowledge is held and transferred between incident responders at all levels and overall retained within the organization.

    By utilizing Security Orchestration, Automation and Response (SOAR) technology, security teams can combine traditional methods of knowledge transfer with more modern techniques and technologies by incorporating machine learning and artificial intelligence capabilities.

    Join this webinar to learn about the benefits of implementing a SOAR solution, such as IncMan SOAR from DFLabs, and see how we can help to ensure that your organization’s knowledge is consistently and accurately retained, used and transferred, while simultaneously contributing to the efficiency and effectiveness of your entire incident response process.

    Key Takeaways:

    - The benefits of using SOAR technology
    - How to overcome the shortage of skilled security operations staff
    - How security orchestration and automation can facilitate knowledge transfer
    - How a SOAR solution can improve your overall security program performance
  • Debunking the Top Ten Myths of Document Review
    Debunking the Top Ten Myths of Document Review
    Michael Dalewitz, President (ReviewRight) Recorded: Oct 3 2018 62 mins
    Representing the largest expenditure in the eDiscovery task continuum, the review phase of legal discovery consumes almost 70% of each dollar spent on eDiscovery. Understanding budgetary constraints routinely are a top concern for eDiscovery professionals, legal departments and law firms are continually seeking ways to become more time effective and cost efficient during document reviews. But are these professionals making sourcing decisions based on facts or assumptions? This expert presentation will highlight ten of the most common myths associated with attorney document reviews and present approaches for avoiding decisions based on myths.

    Key Presentation Topics Include:

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Presentation Leader: Michael Dalewitz

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model. He created one of the industry’s first managed document review models and developed the first document review metrics tracking software.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION
    Waterford Technologies Recorded: Oct 3 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • CloudNine Training Snapshot: Concordance Desktop Updating Image Bases
    CloudNine Training Snapshot: Concordance Desktop Updating Image Bases
    Travis Ballenger, Solutions Consultant Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of the process required to update an image base within Concordance Desktop.

    Some of the various ways in which to update a Concordance Desktop image base are renaming media paths and folders, editing or deleting media keys and calculating and updating the page count for an image base. Use Concordance Desktop’s Image Base Management feature to accomplish each of these tasks.
  • CloudNine Electronic Discovery Loader Settings Overview
    CloudNine Electronic Discovery Loader Settings Overview
    Terry Leang, CloudNine Solutions Consultant Recorded: Oct 1 2018 8 mins
    An overview of the configurable settings in the LAW PreDiscovery Electronic Discovery Loader, that are specific to the type of source you’re importing. Based on policies and project specifications, the settings tab is used to determine how specific file types will be handled during the import process, such as extracting the contents of an archive or detecting duplicate files, as well as how the files will be organized in the folder view of LAW PreDiscovery.
  • Law Prediscovery Electronic Discovery Loader
    Law Prediscovery Electronic Discovery Loader
    Terry Leang, CloudNine Solutions Architect Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of an introduction to the LAW PreDiscovery Electronic Discovery Loader.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    Waterford Technologies Recorded: Oct 1 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks?
    BYOD: Do benefits of personal devices at work outweigh drawbacks?
    AccessData and Corporate Counsel Business Journal Recorded: Sep 28 2018 63 mins
    This webinar will identify BYOD trends, concerns and its impact on eDiscovery.
  • Drone Forensics
    Drone Forensics
    Rob Attoe, CEO, Spyder Forensics Recorded: Sep 28 2018 63 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • Preparing for Litigation Before it Happens
    Preparing for Litigation Before it Happens
    Doug Austin and Tom O'Connor Recorded: Sep 26 2018 62 mins
    Information Governance (IG) has always been part of the eDiscovery landscape and it has always been important for reducing the population of potentially responsive electronically stored information (ESI) that might be subject to litigation by helping organizations adopt best practices for keeping their information “house in order”. But now with an increased concentration on the two-fold concerns of privacy and security, IG has become more important than ever. This CLE-approved* webcast will explore the implementation of Information Governance best practices to help organizations better prepare for litigation before it happens. Topics include:

    + Minority Report: Pre-Case for Litigation Avoidance
    + What Information Governance is and What it Isn't
    + General Principles for Information Governance
    + Who Uses Information Governance?
    + IG Considerations and Issues
    + Basic Information Governance Solutions
    + Information Governance vs. Analytics
    + How Privacy/Security Has Impacted the Importance of an IG Program
    + Recommendations for Implementing an IG Program

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach
    EDRM and AccessData Recorded: Sep 25 2018 57 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Leila Szwarc & Paola Fonseca TMF Group and Yoab Bitran, LRN Recorded: Sep 25 2018 61 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response
    John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Recorded: Sep 25 2018 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Recorded: Sep 25 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise
    Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • How To Create A Mobile-First People Strategy To Modernise Employment
    How To Create A Mobile-First People Strategy To Modernise Employment
    Mark Elwood Nov 22 2018 11:00 am UTC 45 mins
    Just 29% of UK employees work for firms that operate flexible working policies for all employees according to recent research commissioned by TeleWare.

    This highlights the stark differences in how firms are creating workforces who can work flexibly in an increasingly mobile environment. One thing is certain, tools that enable employees to work wherever and whenever they want to are here to stay, but how firms deploy them could be the difference between success or failure.

    Join us in the latest webinar in our mobility and productivity programme where we will share exclusive insight into mobile and flexible working practices.

    Join our panel of experts to find out:
    •The impact on businesses who fail to deliver changing flexible working expectations
    •The technological advancements that are helping firms operate flexibly
    •The benefits and the pitfalls of a more mobility enabled workforce
    •The barriers to successful adoption and how you can overcome them.

    Panellists:
    Steve Haworth, CEO, TeleWare
    Andrew Fawcett, Product Manager, TeleWare
  • DFLabs IncMan SOAR Platform V4.5: Open Integration Framework and More
    DFLabs IncMan SOAR Platform V4.5: Open Integration Framework and More
    Mike Fowler, VP of Professional Services, DFLabs and John Moran, Senior Product Manager, DFLabs Nov 27 2018 3:00 pm UTC 60 mins
    The latest release of DFLabs IncMan SOAR platform v4.5 includes a range of additional and enhanced features and capabilities highly focused around delivering a more open, extensible and community-oriented solution to some of the most challenging problems facing SOCs, CSIRTs and MSSPs today.

    Key New Features include:

    - Open Integration Framework
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...

    Join this webinar to see first hand how DFLabs’ Open Integration Framework enables security teams to easily add and orchestrate new functions between IncMan SOAR and third party products even without coding experience.

    In addition, learn about additional new features including how IncMan SOAR’s enhanced REST API allows users to extend and integrate security automation and orchestration with other processes in new and exciting ways, as well as how its START Triage module now enables granular control over which events are automatically enriched to validate which should be converted directly into a security incident.
  • Consistent, Repeatable, Powerful Nuix 7.6 enhances eDiscovery and investigations
    Consistent, Repeatable, Powerful Nuix 7.6 enhances eDiscovery and investigations
    Dr Nick Sharples Nov 28 2018 11:30 am UTC 45 mins
    Our latest release is designed to give eDiscovery professionals, legal operations, lawyers, investigators, information governance professionals, and law enforcement additional freedom and functionality to automate and simplify their workflows.

    Users will find it easier to add, organize, and share information within and across cases, incorporate social media into investigations, and load and process files with additional data inputs, bulk load capabilities, and workflow templates.
  • The “Luddite” Lawyer: Will Lawyers Ever Embrace Technology?
    The “Luddite” Lawyer: Will Lawyers Ever Embrace Technology?
    Doug Austin and Tom O'Connor Nov 28 2018 6:00 pm UTC 75 mins
    Technology Assisted Review (TAR) has been court approved for nearly seven years now and other technologies and approaches have been proven to save time and money while even improving quality within the discovery process. Yet, many lawyers still have yet to embrace these new technologies and approaches. Why, and what needs to happen to change things? This CLE-approved* webcast will discuss a lawyer’s ethical duty to understand technology, how to address today’s challenges and embrace approaches for addressing those technologies, pertinent case law regarding the use of technology and resources for more information. Topics include:

    + Ethical Duties and Rules for Understanding Technology
    + Addressing Discovery of Various Sources of ESI Data
    + Understanding the Goals for Retrieving Responsive ESI
    + Considerations and Challenges for Using Technology Assisted Review
    + Considerations for Form of Production
    + Key Case Law Related to Technology Challenges
    + Resources for Expanding Your Technical Expertise
    + Recommendations for Becoming Technology Competent
    + Resources for More Information


    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • 2018 eDiscovery Case Law Review
    2018 eDiscovery Case Law Review
    Judge Thomas I Vanaskie, U.S. Third Circuit Court of Appeals, and a panel of attorney experts Nov 28 2018 7:00 pm UTC 75 mins
    In modern legal practice, the difference between failure and success can often turn on data. Yet after nearly two decades of eDiscovery case law and two related sets of revisions to the Federal Code of Civil Procedure, the bench and bar still grapple with how best to handle data in litigation, as the most important cases of the past year show.

    From discovery processes gone wrong and new sources of sanctions, from anonymous messaging platforms to claims of discovery malpractice, the past year’s cases are a reminder that discovery remains as critical, and sometimes as risky, as ever.

    Join Judge Thomas I. Vanaskie of the U.S. Court of Appeals for the Third Circuit and a panel of attorney experts for an upcoming webinar surveying these cases and more.

    Feature Presenter:
    Judge Vanaskie was appointed to the Third Circuit Court in 2010, having served at the federal district court level in Scranton for 16 years prior. Over the course of his two decades on the bench, technology has dramatically reshaped how litigation is waged and disputes resolved. But Vanaskie has spearheaded efforts to keep the justice system up to speed. In 2005, he was selected by Chief Justice William Rehnquist to head the Information Technology Committee of the U.S. Judicial Conference, the policy making body for federal courts, a role he served until 2008. Judge Vanaskie may be best known in legal technology circles for authoring what is perhaps the most influential decision on the recovery of electronic discovery costs, Race Tires America.
  • Nuix Orchestration because staring at a progress bar is never fun
    Nuix Orchestration because staring at a progress bar is never fun
    Alex Chatzistamatis and Glen Painter Dec 4 2018 2:00 pm UTC 60 mins
    Staring at a progress bar is nobody’s idea of a good time: Investigation, discovery and information governance tasks often involve complex workflows that you must complete consistently and repeatably. Traditional approaches—such as detailed process manuals, custom scripts, third-party applications, or just staring at the progress bar—all have hidden costs in time, money, inconsistency, and potential for errors.

    Nuix Orchestration is a web-based multi-user graphical tool that allows you to map out complex data processes across multiple activities and machines and let them run with minimal user input. It gives you the “easy button” to optimize resource utilization, manage changing priorities, and maintain consistent workflows.

    Alex Chatzistamatis and Glen Painter will demonstrate how Nuix Orchestration can:
    Help you achieve greater efficiencies, manage resource utilization, optimize processes, and shift priorities from a collaborative web-based platform.
    Streamline many repetitive tasks such as processing, search and tag, exclusions, OCR, production sets and legal exports into easy-to-use workflows.
    Maximize throughput by queuing tasks across multiple servers overnight, eliminating the need to wait around for one process to complete so you can feed the results into the next.
    Minimize errors and rework, creating detailed templates and workflows with consistent settings applied to each activity, greatly reducing the opportunity for human error and the need for costly rework.
  • Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    John Wilson, ACE, AME, CBE Dec 4 2018 5:00 pm UTC 75 mins
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as part of data discovery and legal discovery processes.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both cryptocurrencies and blockchains and provide attendees with fundamental information that will help them understand how to examine and investigate these technologies and the electronically stored information that results from their usage.

    Key Presentation Topics Include:

    + Quick Review: Cryptocurrencies and Blockchain
    + Crime, Cryptocurrencies, and Blockchain
    + Investigating Cryptocurrencies and Blockchain
    + The Physical Scene
    + The Digital Scene
    + Forensic Evidence
    + Following Transaction Trails
    + Investigation Intelligence

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.