Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Contract Management Maturity - A Tool, an App or a Platform? Contract Management Maturity - A Tool, an App or a Platform? Andrew Bartels, Vice President & Principal Analyst, Forrester Research, Samir Bodas, Co-founder and CEO, Icertis Recorded: Feb 1 2017 61 mins
    It's time to re-evaluate your contract management strategy. Today's digital business world demands the latest contract management software, automation, and integration in the cloud. Contracts are the foundation of commerce touching every department and function across the enterprise. Contract lifecycle management (CLM) systems help firms create, execute and manage the contracts that define their relationships with their customers and suppliers.

    There are a number of options that companies can choose to get the most out of their current and future CLM implementations.

    In this webinar: Icertis CEO Samir Bodas and Andrew Bartels, VP and Principal Analyst at Forrester will discuss the pros and cons of the various approaches to meet your contract-related business goals.
  • Outpost for Relativity from CloudNine Outpost for Relativity from CloudNine Brad Jenkins Recorded: Jan 28 2017 9 mins
    Outpost for Relativity from CloudNine is an automated data loading service for Relativity that automatically ingests and loads data into Relativity based on your specified criteria.

    CloudNine’s eDiscovery automation integration provides Relativity users with a tool that accelerates the upload, processing, and ingestion of electronically stored information (ESI). This complementary capability allows Relativity users to immediately ingest ESI directly from their desktops and automatically move ESI into Relativity.

    Learn more about Outpost for Relativity from CloudNine at eDiscovery.co.
  • What Every Attorney Should Know About eDiscovery in 2017 What Every Attorney Should Know About eDiscovery in 2017 Doug Austin and Karen DeSouza, Esq. Recorded: Jan 25 2017 62 mins
    Managing discovery is more complicated and expensive than ever, with more data and documents to manage, new sources and types of data to consider, and changing Federal and State rules. As an attorney, what do you need to know today to stay on top of it all? This CLE-approved* webcast session will cover key terms, rules, duties, and case law to give you the tools and resources necessary to efficiently and effectively meet the challenging discovery obligations that attorneys will face in 2017.

    Webcast Highlights

    + Key Terms
    + Phases of the EDRM
    + Rules Regarding Electronically Stored Information (ESI)
    + Competency Ethical Duties of Attorneys Regarding eDiscovery
    + Top Ten Important Cases in the Evolution of eDiscovery Best Practices
    + Useful Resources for eDiscovery Continued Education

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    *Approved for MCLE in TX and FL (and selected states based on approval at time of webcast delivery).
  • Simplified eDiscovery Automation from CloudNine Simplified eDiscovery Automation from CloudNine Brian Kelly, Customer Success Manager, CloudNine Recorded: Dec 23 2016 10 mins
    A short demo of SaaS-delivered eDiscovery automation software that simplifies litigation, investigations, and audits for legal, compliance, and security pros by allowing them to upload, review, and produce documents from one platform within minutes. For a free trial, visit eDiscovery.co.
  • Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights Andrew Bartels, VP and Principal Analyst at Forrester and Samir Bodas, CEO of Icertis Recorded: Dec 20 2016 45 mins
    Webcast with guest speaker Andrew Bartels from Forrester Research: Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights.

    Our special guest, Andrew Bartels, VP and Principal Analyst at Forrester and Samir Bodas, CEO of Icertis discuss how CLM software has today become a strategic asset, not just a transaction module.

    In the webcast, Andrew and Samir discuss:
    - Evolution of CLM products from departmental tools to enterprise platforms
    - The new decision making process and changing evaluation criteria
    - How to get the most out of any enterprise CLM implementation – do’s and don’ts
    - New buzz words – cloud, machine learning, big data, etc. – if and how they matter
    - Implications of the change on enterprise user adoption and usage
  • Operate with Confidence: Responding to the Changing Risk Environment in LATAM Operate with Confidence: Responding to the Changing Risk Environment in LATAM Brian Weihs and Ian Cook with Kroll Investigations and Disputes and John Fanning with Kroll Compliance Recorded: Dec 13 2016 62 mins
    Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.

    Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.

    Agenda:

    - Corruption risks and trends in Latin America

    - Understanding local nuances: What you need to know when conducting business with third parties in the region

    - Best practices for risk mitigation and due diligence

    - Q&A
  • Next Generation Data Breach Response: Preparing Your C-Suite and Board Next Generation Data Breach Response: Preparing Your C-Suite and Board King & Spalding, Rite Aid, and Kroll Recorded: Dec 8 2016 58 mins
    In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.

    Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
    In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:

    •Why the C-Suite and Board need to champion planning and prevention efforts.
    •How to get Executive buy-in.
    •Ways to build stronger response structures from the top.
    •How to construct response architectures. Who needs to be responsible for what?
    •Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
    •Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
    •Examples our experts have seen – the good and the bad
  • 10 Years Forward and Back – Automation in eDiscovery 10 Years Forward and Back – Automation in eDiscovery Doug Austin - Vice President of Operations and Professional Services, CloudNine Recorded: Dec 1 2016 89 mins
    This unique E-Discovery Day webinar highlighted the progress of eDiscovery technologies during the last decade and looked forward through the lens of innovation into the next ten years of data discovery. This information-packed session included some of the world’s foremost authorities on eDiscovery who shared their thoughts, considerations, and recommended best practices for the use of Technology-Assisted Review.

    Panelists included moderator Mary Mack (ACEDS), George Socha (BDO), David Horrigan (kCura), Bill Dimm (Hot Neuron), Bill Speros (Speros and Associates) and Doug Austin (CloudNine).
  • Spotlight Asia – Investing in India’s Growth Story Spotlight Asia – Investing in India’s Growth Story Reshmi Khurana, Kroll’s Managing Director and Head of South Asia, and Tarun Bhatia, Managing Director at Kroll Recorded: Oct 19 2016 69 mins
    India remains an attractive destination for foreign investors as its economic fundamentals and optimism about its prospects remain strong. From a macroeconomic perspective, India is one of the fastest growing major emerging markets, with recent projections from the International Monetary Fund (IMF) pointing to a fiscal growth of 7.4% versus a 6.6% expansion in China for 2016. Politically, it is more stable than in previous cycles, with the BJP led government initiating a number of reforms and regulatory measures that are instilling economic confidence and raising India’s attractiveness as a destination for FDI. The country’s demographics are equally promising: India is home to 18% of the world’s working-age population (ages 15-64), a growing middle class with increasing purchasing power and a corporate sector that is flexing its muscle domestically and globally.

    Join Kroll’s team as they share the shifting dynamics of investing in India, replete with both risks and rich rewards at every turn. It includes an in-depth commentary by Reshmi Khurana, Kroll’s Managing Director and Head of South Asia, and Tarun Bhatia, Managing Director at Kroll, who will discuss the most urgent risks of cross-border deal-making, offering insights on conducting pre-transactional due diligence on
  • Managed Services – Treat the Cause… Not the Symptoms Managed Services – Treat the Cause… Not the Symptoms Stephen Whestone, Brad Harris, Bonnie Kennedy, George Socha, Tom Gelbmann Recorded: Sep 21 2016 60 mins
    EDRM webinar sponsored by Stroz Friedberg

    Successful companies abide by a fundamental business principle: “If you can’t measure it, you can’t manage it.” Lawyers and electronic discovery professionals, however, have been slow to adopt this bedrock tenet, relying instead on more reactive and subjective approaches. As regulatory requirements, data volumes and types, and budget pressures mount, proactively managing litigation portfolios can provide substantial differentiated value. In this webinar, our experts will discuss how pre-defined, comprehensive, and legally defensible managed services programs foster faster identification of responsive and critical information, more efficient and predictable spending, and better litigation outcomes.

    Panelists:
    •Stephen D. Whetstone
    Executive Managing Director & Leader, Electronic Discovery & Disclosure
    Stroz Friedberg

    •Brad Harris
    Vice President of Product Strategy
    Zapproved, Inc.

    •Bonnie Kennedy
    eDiscovery Manager
    Delta Air Lines
  • Considerations for Corporate Legal Managing E-Discovery Considerations for Corporate Legal Managing E-Discovery Amy Sellars, Sarah Thompson, George Socha, Tom Gelbmann Recorded: Sep 7 2016 61 mins
    EDRM Webinar sponsored by Zapproved

    Considerations for Corporate Legal Teams Managing E-Discovery in a Changing Tech Environment

    As increasing numbers of corporations move to cloud productivity solutions like Microsoft Office 365, Box, Google Apps, and others, the legal department is tasked with the expanded challenge of managing the complex process of e-discovery in an environment where electronically stored information (ESI) is not only growing at an exponential rate but increasing in complexity due to the emergence of cloud sources.

    This webinar will share considerations that will help in-house corporate legal teams navigate this process and illustrate the opportunities and the risks cloud data brings and effectively manage e-discovery in a complex tech environment.

    Presenters:
    * Amy Sellars, Attorney, Williams Companies
    * Sarah Thompson, Sr. Product Manager, Zapproved, Inc.
  • 9 Habits of Resilient e-Discovery Leaders, sponsored by kCura 9 Habits of Resilient e-Discovery Leaders, sponsored by kCura Doug Kaminski, Barclay Blair, Brian Stempel, George Socha, Tom Gelbmann Recorded: Aug 25 2016 60 mins
    EDRM webinar sponsored by kCura

    9 Habits of Resilient e-Discovery Leaders

    e-Discovery is one of the most stressful, demanding, and high-stakes experiences that practitioners can go through. What do resilient e-discovery leaders do differently as they face setbacks or chronic adversity? The team will share insights into information leadership gleaned from their research and experience working with lawyers, technologists, and other IG professionals, helping organizations through the e-discovery process.

    Speakers:
    * Barclay T. Blair, Executive Director and Founder, Information Governance Initiative
    * Doug Kaminski, Director, Major Accounts, Enterprise Sales, kCura
    * Brian Stempel, Director Litigation Technology, Kirkland & Ellis LLP

    Moderators:
    George Socha, Co-Founder, EDRM and Managing Director, BDO
    Tom Gelbmann, Co-Founder, EDRM
  • What Does a World-Class Compliance Program for Endowments Look Like? What Does a World-Class Compliance Program for Endowments Look Like? Michael Lukasek, CPA, Managing Director, Office of Investments, University of Pennsylvania Recorded: Jul 15 2016 55 mins
    In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.

    Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:

    Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
    How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.

    Three reasons why you join us on July 15

    1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
    2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
    3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
  • “Shift Left”- A New Age of eDiscovery – Analytics and ECA “Shift Left”- A New Age of eDiscovery – Analytics and ECA Xavier Diokno, Naz Shwayhat, George Socha, Tom Gelbmann Recorded: Jun 30 2016 61 mins
    “Shift Left”- A New Age of eDiscovery – Analytics and ECA

    Sponsored by LexisNexis


    More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:

    · Strategies on performing an ECA risk/benefit analysis;
    · A new way of thinking: employing analytics in ECA?
    · How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
  • Strategies for Staying Ahead of Bribery and Corruption Challenges Strategies for Staying Ahead of Bribery and Corruption Challenges Kevin Braine and Joe Spinelli (Kroll); Erica Salmon Byrne (Ethisphere) Recorded: Jun 22 2016 64 mins
    Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?

    In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.

    Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
  • 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 影山正:シニア・マネジング・ディレクター、アジア太平洋地域統括責任者、坂出國雄:マネジング・ディレクター、ジャパンデスクヘッド、オットー マンフレッド 倉雄:ドウェイン・モリス・ベトナム法律事務所 Recorded: May 24 2016 89 mins
    ベトナムは、アジア太平洋地域のなかでも引き続き海外からの直接投資が多い国のひとつです。堅調なGDP増加、多くの自由貿易協定、インフラ改善、多い若年層、安価な労働力といったマクロ経済視点での好材料がビジネスを呼び込む要因となっています。一方で今年1月に開催された第12回共産党大会で選出された新指導部の動向は、投資家にとって不確定要素やリスクが残ります。また、南シナ海を巡る地政学的な状況についてもベトナムでビジネスを展開する際の懸念材料であり、さらに、政府による情報統制は、ディールの行使に際して大きな課題となっています。

    投資先としてのベトナムについて、クロールのシニア・マネジング・ディレクター、アジア太平洋地区統括責任者である影山正と、マネジング・ディレクター、東南アジアのジャパンデスク・ヘッドである坂出國雄がセミナーを開催し、クロールが過去にベトナムで行なった調査を踏まえながら、ベトナムでのビジネス上および政治上のリスク、新指導部の動向、自由貿易協定が海外からの投資に与える影響、事業運営する際の留意点やビジネスリスクについて紹介します。皆様のご参加を心よりお待ち申し上げております。
  • Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro Moving Data Across Borders: No More Safe Harbors EDRM webinar, sponsored by Ipro M. James Daley, Emily Fedeles, Kenneth J. Withers, George Socha, Tom Gelbmann Recorded: May 17 2016 63 mins
    When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.

    Speakers:
    * M. James Daley, Senior Counsel, Seyfarth Shaw LLP
    * Emily R. Fedeles, Associate, BakerHostetler
    * Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
  • Vietnam: Risks and opportunities in Asia’s next emerging market Vietnam: Risks and opportunities in Asia’s next emerging market Richard Dailly, Managing Director at Kroll and Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris Recorded: May 11 2016 89 mins
    Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.

    Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
  • Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Cybersecurity Threats and Client Confidential Data, Sponsored by Ipro Melinda McLellan, Will Auther, George Socha, Tom Gelbmann Recorded: May 10 2016 62 mins
    Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations

    Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.

    In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.

    Speakers:
    * William F. Auther, Partner, Bowman and Brooke LLP
    * Melinda L. McLellan, Counsel, BakerHostetler
  • Train as You Fight: The Value of Threat Simulations vs. Pen Testing Train as You Fight: The Value of Threat Simulations vs. Pen Testing Ryan Linn, Director of Advanced Tactics and Countermeasures Recorded: Apr 12 2016 59 mins
    Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.

    Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
    This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.

    We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
  • The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly The Future of E-Discovery: An Analytics Revolution to See your Case More Clearly Krista Fuller, Ryan Bilbrey, George Socha, Tom Gelbmann Recorded: Mar 24 2016 60 mins
    Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:

    Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.

    Speakers:
    * Krista Fuller, Director of Product Management, LexisNexis
    * Ryan Bilbrey, Managing Director, OmniVere

    Moderators:
    * George Socha, Co-Founder, EDRM
    * Tom Gelbmann, Co-Founder, EDRM
  • Lessons Not Learned: Cybersecurity's Habitual Mistakes Lessons Not Learned: Cybersecurity's Habitual Mistakes Grayson Lenik, Nuix; Dan Haagman, NotSoSecure; Gregory J. Bautista, Wilson Elser LLP; Scott Sarafian, US Secret Service Recorded: Mar 23 2016 59 mins
    Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?

    Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
  • EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved EDRM webinar, "Catching the Third Wave of E-Discovery," sponsored by Zapproved Eric Hibbard, Jeremy Schaper, Barry C. O’Melia,George Socha, Tom Gelbmann Recorded: Mar 23 2016 60 mins
    Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.

    Presenters:

    * Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
    * Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
    * Barry C. O’Melia, Chief Operations Officer, Digital WarRoom

    Moderators:

    George Socha, Co-Founder, EDRM
    Tom Gelbmann, Co-Founder, EDRM
  • Ransomware Ransomware Jonathan Fairtlough, Managing Director, Kroll, and Brett Williams, Senior Regional Security Engineer, Carbon Black Recorded: Mar 10 2016 62 mins
    How to defend against digital hijack of your business data, and what to do if you get hit

    Cyber criminals have discovered the perfect tool to force modern business owners into the vice of extortion – drop malware onto an unsuspecting network to encrypt all the data and demand payment to provide the key to unlock the data. The attacked business has two choices; either lose access to years of data or pay a ransom to get the data back. The cyber criminals bank on the fact that businesses will pay to rescue their hijacked data.

    Such attacks or ransomware are on the rise, fuelled by successful extortion payments. The types of businesses being targeted are expanding, and the delivery methods used to infect systems are becoming increasingly sophisticated. There are also many different types of malware now available; Crypto Wall also known as Crowti, Crypto Locker, FakeBSOD and The FBI scam.

    Preparation is essential to surviving such attacks and monitoring of systems is needed to prevent them.
  • Utilizing Blockchain in Contract Management - Featuring Gartner Research Utilizing Blockchain in Contract Management - Featuring Gartner Research Nigel Montgomery Research Director, Gartner and Monish Darda Co-founder and CTO, Icertis Feb 22 2017 4:00 pm UTC 45 mins
    Contracts are the backbone of an enterprise. Blockchain technology will have important implications when it comes to contract management. Blockchain is becoming a new area of interest, from governments creating secure databases of land titles to consortiums of leading financial institutions working together to design new distributed ledger technologies.

    It is a brave new world and a lot of conversations are going on. Where will it go? What will the impact be? What will blockchain bring to contract management?

    In this webcast, we’ll answer these questions and more with two of the industry’s leading experts: Gartner Research Director, Nigel Montgomery, and Monish Darda, CTO and co-founder of Icertis.

    In the webcast, Nigel and Monish discuss:

    - The opportunity seen by enterprises, working together, to design new distributed ledger technologies

    - What will be the impact of blockhain related technologies?

    - What will blockchain bring to contract management?

    - What can you do now to prepare?
  • Best Practices for Effective eDiscovery Searching Best Practices for Effective eDiscovery Searching Doug Austin and Karen DeSouza, Esq. Feb 28 2017 6:00 pm UTC 75 mins
    With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.

    Webcast Highlights

    + Search Fundamentals
    + Considerations Before Searching
    + Mechanisms for Culling Before and After Searching
    + Mechanisms for Improving Recall and Precision
    + Searching Considerations and Challenges
    + Using Sampling for Defensible Searching

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    * Approved in Selected States (To Be Published Prior To Webcast Delivery)
  • Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Satindar Dogra (Partner, London) and Adam Lurie (Partner, Washington D.C.), Linklaters LLP Apr 5 2017 3:00 pm UTC 75 mins
    With cross-border enforcement on the rise, companies must consider what information, if any, to provide to various regulators. But that’s only the start of the challenge. Having decided to provide information, companies must carefully consider how to protect their privileged and otherwise protected information, including information subject to data protection law.

    This GIR Live webinar will break down these challenges as well as looking at various strategies that companies can take to protect that which is privileged or protected when interacting with regulators around the world.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:
    •How to protect privilege and data privacy during an internal investigation in response to a regulator.
    •How to interact with regulators while preserving privilege and data protection rules.
    • How do legal privileges and data privacy protections vary between key jurisdictions?
    •How does increasing cross-jurisdictional cooperation between regulators impact these considerations?
    •What recent developments should practitioners should be aware of?