Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Managed Services – Treat the Cause… Not the Symptoms Managed Services – Treat the Cause… Not the Symptoms Stephen Whestone, Brad Harris, Bonnie Kennedy, George Socha, Tom Gelbmann Recorded: Sep 21 2016 60 mins
    EDRM webinar sponsored by Stroz Friedberg

    Successful companies abide by a fundamental business principle: “If you can’t measure it, you can’t manage it.” Lawyers and electronic discovery professionals, however, have been slow to adopt this bedrock tenet, relying instead on more reactive and subjective approaches. As regulatory requirements, data volumes and types, and budget pressures mount, proactively managing litigation portfolios can provide substantial differentiated value. In this webinar, our experts will discuss how pre-defined, comprehensive, and legally defensible managed services programs foster faster identification of responsive and critical information, more efficient and predictable spending, and better litigation outcomes.

    Panelists:
    •Stephen D. Whetstone
    Executive Managing Director & Leader, Electronic Discovery & Disclosure
    Stroz Friedberg

    •Brad Harris
    Vice President of Product Strategy
    Zapproved, Inc.

    •Bonnie Kennedy
    eDiscovery Manager
    Delta Air Lines
  • Considerations for Corporate Legal Managing E-Discovery Considerations for Corporate Legal Managing E-Discovery Amy Sellars, Sarah Thompson, George Socha, Tom Gelbmann Recorded: Sep 7 2016 61 mins
    EDRM Webinar sponsored by Zapproved

    Considerations for Corporate Legal Teams Managing E-Discovery in a Changing Tech Environment

    As increasing numbers of corporations move to cloud productivity solutions like Microsoft Office 365, Box, Google Apps, and others, the legal department is tasked with the expanded challenge of managing the complex process of e-discovery in an environment where electronically stored information (ESI) is not only growing at an exponential rate but increasing in complexity due to the emergence of cloud sources.

    This webinar will share considerations that will help in-house corporate legal teams navigate this process and illustrate the opportunities and the risks cloud data brings and effectively manage e-discovery in a complex tech environment.

    Presenters:
    * Amy Sellars, Attorney, Williams Companies
    * Sarah Thompson, Sr. Product Manager, Zapproved, Inc.
  • 9 Habits of Resilient e-Discovery Leaders, sponsored by kCura 9 Habits of Resilient e-Discovery Leaders, sponsored by kCura Doug Kaminski, Barclay Blair, Brian Stempel, George Socha, Tom Gelbmann Recorded: Aug 25 2016 60 mins
    EDRM webinar sponsored by kCura

    9 Habits of Resilient e-Discovery Leaders

    e-Discovery is one of the most stressful, demanding, and high-stakes experiences that practitioners can go through. What do resilient e-discovery leaders do differently as they face setbacks or chronic adversity? The team will share insights into information leadership gleaned from their research and experience working with lawyers, technologists, and other IG professionals, helping organizations through the e-discovery process.

    Speakers:
    * Barclay T. Blair, Executive Director and Founder, Information Governance Initiative
    * Doug Kaminski, Director, Major Accounts, Enterprise Sales, kCura
    * Brian Stempel, Director Litigation Technology, Kirkland & Ellis LLP

    Moderators:
    George Socha, Co-Founder, EDRM and Managing Director, BDO
    Tom Gelbmann, Co-Founder, EDRM
  • What Does a World-Class Compliance Program for Endowments Look Like? What Does a World-Class Compliance Program for Endowments Look Like? Michael Lukasek, CPA, Managing Director, Office of Investments, University of Pennsylvania Recorded: Jul 15 2016 55 mins
    In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.

    Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:

    Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
    How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.

    Three reasons why you join us on July 15

    1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
    2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
    3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
  • “Shift Left”- A New Age of eDiscovery – Analytics and ECA “Shift Left”- A New Age of eDiscovery – Analytics and ECA Xavier Diokno, Naz Shwayhat, George Socha, Tom Gelbmann Recorded: Jun 30 2016 61 mins
    “Shift Left”- A New Age of eDiscovery – Analytics and ECA

    Sponsored by LexisNexis


    More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:

    · Strategies on performing an ECA risk/benefit analysis;
    · A new way of thinking: employing analytics in ECA?
    · How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
  • Strategies for Staying Ahead of Bribery and Corruption Challenges Strategies for Staying Ahead of Bribery and Corruption Challenges Kevin Braine and Joe Spinelli (Kroll); Erica Salmon Byrne (Ethisphere) Recorded: Jun 22 2016 64 mins
    Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?

    In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.

    Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
  • 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 影山正:シニア・マネジング・ディレクター、アジア太平洋地域統括責任者、坂出國雄:マネジング・ディレクター、ジャパンデスクヘッド、オットー マンフレッド 倉雄:ドウェイン・モリス・ベトナム法律事務所 Recorded: May 24 2016 89 mins
    ベトナムは、アジア太平洋地域のなかでも引き続き海外からの直接投資が多い国のひとつです。堅調なGDP増加、多くの自由貿易協定、インフラ改善、多い若年層、安価な労働力といったマクロ経済視点での好材料がビジネスを呼び込む要因となっています。一方で今年1月に開催された第12回共産党大会で選出された新指導部の動向は、投資家にとって不確定要素やリスクが残ります。また、南シナ海を巡る地政学的な状況についてもベトナムでビジネスを展開する際の懸念材料であり、さらに、政府による情報統制は、ディールの行使に際して大きな課題となっています。

    投資先としてのベトナムについて、クロールのシニア・マネジング・ディレクター、アジア太平洋地区統括責任者である影山正と、マネジング・ディレクター、東南アジアのジャパンデスク・ヘッドである坂出國雄がセミナーを開催し、クロールが過去にベトナムで行なった調査を踏まえながら、ベトナムでのビジネス上および政治上のリスク、新指導部の動向、自由貿易協定が海外からの投資に与える影響、事業運営する際の留意点やビジネスリスクについて紹介します。皆様のご参加を心よりお待ち申し上げております。
  • Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro M. James Daley, Emily Fedeles, Kenneth J. Withers, George Socha, Tom Gelbmann Recorded: May 17 2016 63 mins
    When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.

    Speakers:
    * M. James Daley, Senior Counsel, Seyfarth Shaw LLP
    * Emily R. Fedeles, Associate, BakerHostetler
    * Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
  • Vietnam: Risks and opportunities in Asia’s next emerging market Vietnam: Risks and opportunities in Asia’s next emerging market Richard Dailly, Managing Director at Kroll and Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris Recorded: May 11 2016 89 mins
    Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.

    Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
  • Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Melinda McLellan, Will Auther, George Socha, Tom Gelbmann Recorded: May 10 2016 62 mins
    Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations

    Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.

    In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.

    Speakers:
    * William F. Auther, Partner, Bowman and Brooke LLP
    * Melinda L. McLellan, Counsel, BakerHostetler
  • Train as You Fight: The Value of Threat Simulations vs. Pen Testing Train as You Fight: The Value of Threat Simulations vs. Pen Testing Ryan Linn, Director of Advanced Tactics and Countermeasures Recorded: Apr 12 2016 59 mins
    Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.

    Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
    This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.

    We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
  • The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly Krista Fuller, Ryan Bilbrey, George Socha, Tom Gelbmann Recorded: Mar 24 2016 60 mins
    Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:

    Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.

    Speakers:
    * Krista Fuller, Director of Product Management, LexisNexis
    * Ryan Bilbrey, Managing Director, OmniVere

    Moderators:
    * George Socha, Co-Founder, EDRM
    * Tom Gelbmann, Co-Founder, EDRM
  • EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved Eric Hibbard, Jeremy Schaper, Barry C. O’Melia,George Socha, Tom Gelbmann Recorded: Mar 23 2016 60 mins
    Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.

    Presenters:

    * Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
    * Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
    * Barry C. O’Melia, Chief Operations Officer, Digital WarRoom

    Moderators:

    George Socha, Co-Founder, EDRM
    Tom Gelbmann, Co-Founder, EDRM
  • Lessons Not Learned: Cybersecurity's Habitual Mistakes Lessons Not Learned: Cybersecurity's Habitual Mistakes Grayson Lenik, Nuix; Dan Haagman, NotSoSecure; Gregory J. Bautista, Wilson Elser LLP; Scott Sarafian, US Secret Service Recorded: Mar 23 2016 59 mins
    Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?

    Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
  • Ransomware Ransomware Jonathan Fairtlough, Managing Director, Kroll, and Brett Williams, Senior Regional Security Engineer, Carbon Black Recorded: Mar 10 2016 62 mins
    How to defend against digital hijack of your business data, and what to do if you get hit

    Cyber criminals have discovered the perfect tool to force modern business owners into the vice of extortion – drop malware onto an unsuspecting network to encrypt all the data and demand payment to provide the key to unlock the data. The attacked business has two choices; either lose access to years of data or pay a ransom to get the data back. The cyber criminals bank on the fact that businesses will pay to rescue their hijacked data.

    Such attacks or ransomware are on the rise, fuelled by successful extortion payments. The types of businesses being targeted are expanding, and the delivery methods used to infect systems are becoming increasingly sophisticated. There are also many different types of malware now available; Crypto Wall also known as Crowti, Crypto Locker, FakeBSOD and The FBI scam.

    Preparation is essential to surviving such attacks and monitoring of systems is needed to prevent them.
  • Thomson Reuters Introduces eDiscovery Point Thomson Reuters Introduces eDiscovery Point Keith Schrodt, James Jarvis, George Socha Recorded: Feb 16 2016 63 mins
    Discover what attorneys and litigation support managers are high-fiving about. They’re excited about Thomson Reuters’ new, and dare to say revolutionary ediscovery platform: eDiscovery Point. A new ediscovery platform that allows users simultaneously upload and process data; access that data within minutes; achieve accurate search results within seconds of performing a complex search query; as well as several other time and costs saving functionalities like advanced data analysis and predictive coding. Attend this webinar to see how eDiscovery Point will make ediscovery easier for you.

    Speakers:
    * Keith Schrodt, JD, MBA; Marketing Manager, Legal Managed Solutions; Thomson Reuters
    * James Jarvis; Vice President, Product & Partner Management; Thomson Reuters

    Moderator: George Socha
  • Investigating human trafficking in supply chains Investigating human trafficking in supply chains Richard Dailly, Kroll Managing Director Recorded: Jan 27 2016 52 mins
    Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.

    Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
  • Fighting Cyberespionage: Protecting Enterprise from the Enemy Outside & Within Fighting Cyberespionage: Protecting Enterprise from the Enemy Outside & Within Keith Lowry, Nuix SVP Threat Intelligence; Chris Pogue, Nuix SVP CyberThreat Analysis; Amie Taal, Cybersecurity Expert Recorded: Dec 17 2015 59 mins
    The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives.

    In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss:

    • What makes organizations vulnerable to cyberespionage
    • Why cyberespionage activity can vary across industries based on hacking drivers
    • How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise
  • Myanmar Post Elections - Changes in the political playing field Myanmar Post Elections - Changes in the political playing field Kroll’s Cem Ozturk and Shaun Sandu along with US Sanctions expert Peter Kucik Recorded: Dec 17 2015 71 mins
    Will Myanmar’s historic elections outcome bring durable change to the country? Who are the forces at play, and what is at stake in the negotiations around the transition to NLD rule? How will the influence of the Myanmar military change (and the companies that have chosen to affiliate with them) change after the election – and what impact will this have on the economy, on US sanctions, and on business?

    Join Kroll for an hour long webinar to discuss the historic NLD victory, the state-of-play-among political actors, and the implications for business.
  • How to advise your clients, your company and your board after a major breach How to advise your clients, your company and your board after a major breach Jonathan Fairtlough Recorded: Dec 16 2015 45 mins
    In this webinar, you’ll hear from Kroll cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing the need for organizations and advisors to prepare for an attack, and know how to respond when your clients...and sometimes their families, are put at risk.

    In this webinar, you’ll hear from cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing just how unprepared organizations are in understanding where their data is held, and how to respond when your clients...and sometimes their families, are put at risk.

    Jonathan and Kroll have experience with complex cyber investigations, including computer intrusions, insider attacks, ransomware and malware outbreaks, Internet fraud and theft of trade secrets. He has worked with clients on a wide range of cyber concerns, including security policy and implementation, incident investigation and detection, forensic analysis, malware analysis, and breach threat reduction.
  • EDRM webinar, "State of the Industry: TAR & Analytics End of Year Report" EDRM webinar, "State of the Industry: TAR & Analytics End of Year Report" Greg Buckles, Tammy Doss, George Socha, Tom Gelbmann Recorded: Dec 10 2015 62 mins
    It’s universally accepted that technology assisted review (TAR) speeds review and reduces costs, but many attorneys are still loathe to use it. In the eDJ Group’s recently released 2015 PC-TAR survey, nearly 40% of respondents say they are using TAR less than 5% of the time on their cases. While a majority of respondents say they have tried it, it’s clear that TAR hasn’t crossed the chasm as a go to tool for the legal community yet. Join Greg Buckles, eDJ co-founder and Tammy Doss, VP of Business Operations at Ipro, as they dig into what the survey and interview findings show for analytics and TAR usage and trends as we move into 2016.
  • EDRM webinar, “Practical Options for US Litigators and Investigators Dealing wit EDRM webinar, “Practical Options for US Litigators and Investigators Dealing wit Jo Sherman, Dominic Jaar, George Socha, Tom Gelbmann Recorded: Dec 3 2015 62 mins
    Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.

    Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.

    While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.

    How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?

    Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
  • eMSAT-1: Understand and Acting on the Results eMSAT-1: Understand and Acting on the Results Tiana Van Dyk, George Socha, Tom Gelbmann Recorded: Dec 1 2015 39 mins
    This webinar is the final in a series of five practical sessions by the creators of the eMSAT-1. This webinar focuses on tying it all together: how to understand and act on the results obtained by completing the eMSAT.
  • "Away with Words: An Investigative Approach to eDiscovery,” sponsored by LN "Away with Words: An Investigative Approach to eDiscovery,” sponsored by LN Tom Barnett, George Socha, Tom Gelbmann Recorded: Nov 18 2015 57 mins
    Please join us on Wednesday, November 18, 2015, from 1:00 to 2:00 pm Central, as we present the free live EDRM webinar, "Away with Words: An Investigative Approach to eDiscovery,” sponsored by LexisNexis.

    In this webinar, our presenters will step you though an approach to eDiscovery that might not be so familiar to you: one grounded in data science, an investigative mindset, and a focus on the real end-game of discovery - bringing a case to a satisfactory resolution.

    ** Presenter **

    Thomas A. Barnett, Special Counsel, eDiscovery and Data Science, Paul Hastings

    ** Moderators **

    George Socha, Co-Founder, EDRM
    Tom Gelbmann, Co-Founder, EDRM
  • EDRM webinar, "What's Next in eDiscovery: Data Streaming," sponsored by Ipro EDRM webinar, "What's Next in eDiscovery: Data Streaming," sponsored by Ipro Sarai Guerra, George Socha, Tom Gelbmann Recorded: Nov 12 2015 62 mins
    Join us as we demonstrate a new era in eDiscovery and a new innovation created to solve one of the industry’s most pressing and costly problems – disconnected and inefficient workflows. Currently, we batch data into containers to accommodate the limits of the processing tools we use. Breaking up data comes at signification cost, however: time. It takes time to create the batches, run each batch, and make sure that the batch ran properly without introducing errors. To eliminate the starts, stops and errors Ipro has introduced a patent-pending, continuous data streaming technology named, Automated Digital Discovery (ADD). By attending this webinar, you’ll see and in action and discuss how it unifies and simplifies the eDiscovery process.