Hi [[ session.user.profile.firstName ]]

e-Discovery

  • The California Consumer Privacy Act: Preparing for the CCPA
    The California Consumer Privacy Act: Preparing for the CCPA
    Eric Goldman, Emily Yu, Christian Auty, and Casey Sullivan Recorded: Sep 11 2019 70 mins
    Some of the greatest discovery challenges today aren’t arising from litigation, but from a new regime of privacy laws. The latest—and in some ways most challenging—of those laws is the California Consumer Privacy Act, or CCPA.

    For organizations with even slight connections to California, and for those law firms advising them, the CCPA can create pressing new obstacles for compliance and data access.

    Join Logikcull and an expert-packed panel for an upcoming webinar on the CCPA, the responsibilities it creates, and strategies to reduce the burden of compliance.

    Featuring:
    Eric Goldman, Professor, Santa Clara University School of Law
    Emily Yu, Privacy, Policy and Compliance Director, Roblox
    Christian Auty, Counsel, Bryan Cave Leighton Paisner LLP
  • IncMan SOAR: Developing Next-Generation Security Operations
    IncMan SOAR: Developing Next-Generation Security Operations
    John Moran - Senior Product Manager, DFLabs and Heather Hixon - Senior Solutions Architect, DFLabs Recorded: Sep 5 2019 55 mins
    Efficiency and effectiveness are key when it comes to security operations and incident response in terms of both humans and the tools being used. Having the ability to identify and investigate alerts, reduce false positives and respond to the threats that need action in the fastest possible time frame is crucial.

    With increasing numbers of cyber attacks affecting today’s organizations, security analysts are continuously bogged down with a seemingly never-ending stream of alerts that need to be investigated. At DFLabs we believe security teams shouldn't have to sift through this plethora of alerts, wasting precious time and effort with mundane and repetitive tasks to gather the important information they need to identify if the threat is legitimate or a false positive, before then responding to those that need further action in order to be mitigated.

    By utilizing a sophisticated Security Orchestration, Automation and Response (SOAR) solution, such as IncMan SOAR from DFLabs, providing end-to-end incident management with customizable systems and flexibility, automated incident response, dual mode orchestration and more, security operations teams are able to respond more effectively to all alerts, freeing up valuable analyst time which can be used to proactively investigate and hunt for more complex threats.

    Join this webinar to learn what SOAR really is, the key benefits it has to offer, the pain points it can help to resolve, as well as how the unique features and capabilities of DFLabs’ solution can transform your security operations and incident response programs regardless of their size or maturity to keep up with the next-generation cyber attacks affecting our organizations.


    Key Takeaways:

    - The Key Components of SOAR
    - SecOps Challenges SOAR Can Solve
    - The DFLabs Difference
    - An Insight into IncMan SOAR in Action
  • Benchmarking Discovery Cost Recovery: Logikcull’s 2019 Billing Survey
    Benchmarking Discovery Cost Recovery: Logikcull’s 2019 Billing Survey
    Robert Hilson, Casey Sullivan, Mary Mack Recorded: Aug 27 2019 65 mins
    When it comes to recouping discovery expenses, is your cost recovery process as effective as it could be? Are you are able to reduce billing challenges and anticipate areas of client pushback? And where do you stand compared to your peers?

    Join us for this upcoming webinar as we survey cost recovery benchmarks, based off Logikcull’s recent survey of over 100 law firms.

    Register for the webinar to learn:

    How effective common bill back approaches are
    What percentage of discovery costs the average law firm recoups
    Where law firms experience the most challenges with discovery billing
    What prompts client push back and write-offs
  • DFLabs and SEMNet: Strengthening Security Operations with SOAR
    DFLabs and SEMNet: Strengthening Security Operations with SOAR
    Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNet Recorded: Aug 22 2019 59 mins
    In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.

    With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.

    Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.

    During this webinar you will learn:

    - What is Security Orchestration, Automation and Response (SOAR) technology?
    - Why there is a growing need for SOAR solutions?
    - The problems SOAR technology can help you solve
    - How it helps to improve security operations and incident response programs
    - How DFLabs and SEMNet partner together to make this possible

    Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.

    Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.

    Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
  • In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    EDRM and Exterro Recorded: Aug 21 2019 33 mins
    In any matter, your potential e-discovery burden will greatly affect your case strategy. What if you could immediately—right after receiving a complaint—not only know how much likely data you would need to search, collect, process and review, but also have access to potentially responsive documents prior to collection? New e-discovery technology now empowers legal teams to do just that with in-place Early Case Assessment (ECA) capabilities.

    In our new technology webcast series, you will hear from technology experts along with in-house legal professionals like yourself on what e-discovery tools they are keeping an eye on and those that have made a lasting impact on their legal departments. This webcast will discuss how in-place ECA works, how other leading legal departments are using it, and why this technology will enable you to make big case strategic decisions earlier, saving you time and money.
  • The Seven Deadly Sins of Email in eDiscovery
    The Seven Deadly Sins of Email in eDiscovery
    Jeff Fugitt and Nancy Rigassio Recorded: Aug 21 2019 66 mins
    During this informative session you'll learn about the seven deadly sins of email, email best practices to avoid malpractice and how to identify the seven deadly sins in eDiscovery.
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Recorded: Aug 21 2019 51 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Tackling the Top 5 Incident Response Challenges with SOAR
    Tackling the Top 5 Incident Response Challenges with SOAR
    John Moran, Senior Product Manager, DFLabs Recorded: Aug 20 2019 41 mins
    Incident response can feel like a constant battle, especially for those analysts who are on the front lines of the organization’s response, struggling every day to protect its resources and minimize risk from any potential security events.

    While there are some inherent challenges in incident response which will exist no matter the circumstances, it is the responsibility of security managers and executives to reduce or remove impediments to the incident response process as much as possible. Incident response will never be a frictionless process, however, there are many things we can do to minimize the impediments and provide analysts with the needed resources in order to be successful.

    Year after year, security analysts express the same challenges, across all verticals. Even though we have made many important strides in the past several years, it is clear that our current approach is not adequate to completely solve the most pressing challenges we are facing.

    Incident response analysts typically possess a high drive and passion for their chosen career. Not being given the proper tools to perform a job can be demoralizing and cause the types of analysts you really want on your team to look elsewhere for career satisfaction. With competition for skilled analysts as strong as ever, this is a real concern.

    In order to overcome these challenges, organizations today are increasingly turning to the capabilities of Security Orchestration, Automation and Response (SOAR) technology to help.

    Join this webinar to learn more in-depth about these top 5 incident response challenges and how a SOAR solution can be utilized to successfully resolve them:

    - Shortage of staffing and skills
    - Lack of budget for tools and technology
    - Poorly defined processes and owners
    - Organizational silos between IR and other groups or between data sources and tasks
    - Lack of integration with our other security and monitoring tools
  • Say Hello to Nuix Discover
    Say Hello to Nuix Discover
    JR Jenkins, Emily Tice, Karen Burkardsmaier, Carlyn Milla, Tish Looper Recorded: Aug 15 2019 41 mins
    Nuix Ringtail has a new name -Nuix Discover! During this webinar we will provide an in-depth overview of what this renaming means to existing Nuix Discover clients and what changes they can expect to see in the weeks ahead. We will also provide a preview of the Nuix Exchange user conference taking place in September.
  • When the Clock is Ticking: Mastering the First 48 Hours of an eDiscovery Project
    When the Clock is Ticking: Mastering the First 48 Hours of an eDiscovery Project
    JR Jenkins and Emily Tice Recorded: Aug 9 2019 38 mins
    The first 48 hours of a new eDiscovery project can be the most challenging for legal teams. During this critical time there is often the need to get data staged, processed and into the review platform quickly. And, once in the platform, the data needs to be analyzed and assessed by several key individuals – from litigation support professionals to subject matter experts to attorney’s assigned to the case. It’s enough to strike fear in the heart of most seasoned eDiscovery professionals. Well, help is on the way.

    Join Nuix for a live webinar of its innovative eDiscovery software platform. Featuring integrated data processing, visual analytics and a collaborative approach to document review, Nuix has been helping legal teams around the globe solve the many challenges of early case assessment, investigations and eDiscovery for more than 20 years.

    During this webinar we will discuss and demo:

    •Smart processing strategies no matter the size and complexity of the data
    •How to approach looking at “unknown” data for the first time
    •How to decide if a project could benefit from analytics
    •Can you use keyword search too soon? Too late?
    •How to more effectively collaborate during the early data / case assessment phase

    Register today to see how easy it can be to turn the first 48 hours of any eDiscovery project into one that is collaborative, exciting and effective.
  • Integrated Incident Response: A SANS Survey
    Integrated Incident Response: A SANS Survey
    Matt Bromiley, a SANS Digital Forensics and Incident Response instructor, Recorded: Aug 7 2019 62 mins
    Results of the 2019 SANS Incident Response Survey Sponsored by DFLabs

    This incident response (IR) survey is designed to provide insight into the integration of IR capabilities to identify weak spots and best practices for improving IR functions and capabilities. Attendees at this webcast will learn about the experiences of survey participants with regard to:

    - The anatomy of incidents/breaches
    - How quickly organizations were able to react
    - What types of data, tools and information are key to investigations of an incident
    - How successful investigations have been
    - The state of budget and staffing for IR
    - Levels of integration of IR teams and the maturity of IR processes
    - Impediments to IR implementations and plans for improvement

    Best practices and actionable advice will be presented to help organizations improve their IR practices to be more integrated and efficient.
  • Mastering Audio eDiscovery with Nuix
    Mastering Audio eDiscovery with Nuix
    JR Jenkins and Emily Tice Recorded: Aug 5 2019 23 mins
    Looking for a better way to review audio files during investigations or legal matters? Nuix Ringtail gives you the power to transform audio files into reviewable, redactable, and searchable files that can be analyzed and produced alongside all case documents in Ringtail. Learn how you can use Nuix Ringtail to unlock key insights from audio based data during this webinar. Webinar includes a live demo.

    Who should attend:

    •Litigation support professionals looking for a better way to process and produce audio files alongside all other case documents.
    •Attorneys tasked with analyzing and reviewing audio files during internal investigations, early case assessments or during the course of legal matter.
  • Key eDiscovery Case Law Review for First Half of 2019
    Key eDiscovery Case Law Review for First Half of 2019
    Doug Austin and Tom O'Connor Recorded: Jul 31 2019 70 mins
    So far, 2019 has been another interesting year with notable and important case law decisions related to eDiscovery best practices. What do you need to know about the cases to avoid mistakes made by others and save time and money for your clients? This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2019 to identify trends that lawyers should consider for their own practices. Key topics include:

    + Can ESI related to an unsolved murder case be compelled to be produced in a related civil case?
    + Is the use of biometric fingerprint scanning technology an invasion of privacy?
    + When can non-parties be compelled to produce ESI in litigation?
    + Are social media photos that you didn’t post discoverable if you’ve been tagged in them?
    + Can sanctions be so important that you fight NOT to have a claim against you dismissed?
    + Is being forced to provide your cell phone password the “death knell” for fifth amendment protection?
    + Should a case ruling be reversed if a judge is Facebook friends with one of the parties?
    + Should discovery be stayed while a motion to dismiss is being considered?
    + Does Rule 37(e) eliminate the potential for obtaining sanctions for spoliation of ESI?

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for three consecutive years .

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • How Corporate eDiscovery Programs Improve Efficiencies and Reduce Cost
    How Corporate eDiscovery Programs Improve Efficiencies and Reduce Cost
    Ashish Prasad, Vazantha Meyers, John Wilson, and Todd Haley Recorded: Jul 31 2019 61 mins
    Corporations faced with substantial eDiscovery requirements often lack the basic components of a corporate eDiscovery program, which prevents them from achieving efficiencies and reducing costs with respect to eDiscovery. Our expert panelists will explain how to design and implement a corporate electronic discovery program for use in litigation, investigation and compliance matters. This webcast will be of particular interest to corporate in house lawyers, paralegals, litigation support and technology professionals, and the law firm professionals who work with corporate teams on electronic discovery projects.

    Webcast Highlights:

    + eDiscovery Policy Development
    + Standard Operating Procedures and eDiscovery Training
    + Improved Efficiencies and Reduced Costs: The Reasons for Implementing a Corporate eDiscovery Program
    + Success Stories Around Technology Solutions and Pitfalls to Avoid
    + Pillars for Success: Foundational Steps and Milestones for a Corporate eDiscovery Solution

    Presenting Experts:

    + Ashish Prasad

    As VP and GC of HaystackID. Ashish is regarded as among the leading experts on discovery in the US. He has served as Litigation Partner, Founder and Chair of the Mayer Brown LLP Electronic Discovery and Records Management Practice, Founder and CEO of Discovery Services LLC, and VP and GC of eTERA Consulting.

    + Vazantha Meyers, Esq.

    As Director of Review Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.

    + John Wilson, ACE, AME, CBE

    As CISO at HaystackID, John provides security leadership and consulting to help companies address matters related to eDiscovery and computer forensics.

    + Todd Haley

    As VP of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery.
  • Achieving SOC Excellence with Security Orchestration and Automation
    Achieving SOC Excellence with Security Orchestration and Automation
    Mike Fowler: VP of Professional Services, DFLabs Recorded: Jul 30 2019 27 mins
    Achieving SOC Excellence with Security Orchestration and Automation: Results from SANS SOC Survey 2019 Report


    As cyber threat behavior, business processes and IT technologies are constantly changing, SOC operations are one of the most challenging environments to manage and measure.

    In a recently published annual SOC survey report for 2019, SANS highlighted that a lack of skilled staff, budget, and effective orchestration and automation were the most cited reasons for failing to achieve excellence in existing SOCs. On the other hand, success for improving effectiveness and efficiency could be seen as a result from increasing SOC staff in key areas, as well as through the better use of automation to augment existing staff and their skillsets.

    In this webinar we will provide a high-level overview of the findings of the survey and then take a deeper dive into how implementing effective orchestration and automation through the use of a Security Orchestration, Automation and Response (SOAR) solution can help to overcome a number of common security operations challenges and pain points, transforming your SOC while improving overall operational performance and success.

    We will also cover the unique features and capabilities of DFLabs’ SOAR platform, IncMan SOAR in a short demo.

    Key Takeaways:
    - Overview of SANS 2019 SOC Survey Findings
    - Common Security Operations Challenges and Pain Points
    - The Benefits of Orchestration and Automation
    - Demo of DFLabs’ IncMan SOAR Platform

    A copy of the full 2019 SANS SOC Survey will be available to download during and after the webinar.
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Recorded: Jul 23 2019 52 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Demystifying Technology Assisted Review
    Demystifying Technology Assisted Review
    Erika Biller Recorded: Jul 22 2019 36 mins
    Complex litigation can yield hundreds of thousands, even millions, of electronically stored documents needing review. The monster task of reviewing this ESI can be prohibitive, especially for a boutique firm with limited resources. Technology Assisted Review (TAR) can be the solution, potentially slashing review time and saving money. Empirical studies show that TAR, also called Predictive Coding, can outperform linear review in accuracy and efficiency. Still, there is a reluctance to adopt this practice as the "black box" technology offers little in the way of transparency, and thus defensibility. During this session, you'll learn when and how to use TAR to bolster your in-house review capacity while reducing eDiscovery costs.
  • In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    EDRM and Exterro Recorded: Jul 22 2019 33 mins
    In any matter, your potential e-discovery burden will greatly affect your case strategy. What if you could immediately—right after receiving a complaint—not only know how much likely data you would need to search, collect, process and review, but also have access to potentially responsive documents prior to collection? New e-discovery technology now empowers legal teams to do just that with in-place Early Case Assessment (ECA) capabilities.

    In our new technology webcast series, you will hear from technology experts along with in-house legal professionals like yourself on what e-discovery tools they are keeping an eye on and those that have made a lasting impact on their legal departments. This webcast will discuss how in-place ECA works, how other leading legal departments are using it, and why this technology will enable you to make big case strategic decisions earlier, saving you time and money.
  • Best Practices to Avoid Missing Key Evidence
    Best Practices to Avoid Missing Key Evidence
    Erin Derby Recorded: Jul 15 2019 59 mins
    Nothing can be more disastrous than showing up at a depo to find that your team missed a key piece of evidence in document review, but your opposition found it. Not finding that "smoking gun" admission, or allowing critical privileged information to slip through into a production can be avoided, but only if your search tools are fully functioning. Many attorneys assume that all eDiscovery processing approaches and search tools and techniques are basically the same, but nothing could be further from the truth. In this webinar learn crucial search functions and critical indexing differentiators that will protect you from inadvertently missing important evidence during eDiscovery.
  • Common and Best Practices for Security Operations Centers
    Common and Best Practices for Security Operations Centers
    Christopher Crowley, a senior SANS instructor and course author for SANS courses Recorded: Jul 15 2019 63 mins
    Common and Best Practices for Security Operations Centers

    Results of the 2019 SANS SOC Survey Sponsored by DFLabs

    The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations.

    Key Takeaways:

    - What types of SOC infrastructures are used most frequently
    - How SOCs interact with network operations centers and incident response teams
    - What activities typically define a SOC and how many of them are outsourced
    - Which SOC-related technologies organizations are most satisfied with
    - How organizations use metrics to evaluate SOC performance
    - What challenges inhibit integration and utilization of a centralized SOC model
  • Privacy Framework – The Information Governance and Cybersecurity Intersection
    Privacy Framework – The Information Governance and Cybersecurity Intersection
    Brian Tuemmler | Nuix Solutions Manager - Information Governance Recorded: Jul 9 2019 54 mins
    Organizations are faced with growing and increasingly complex privacy regulations but looking at the market you only see myopic and mono-disciplinary solutions.

    In this webinar, we will demonstrate how you can align a proactive information governance approach with a robust and focused cybersecurity solution.

    Along the way, you will learn how you can use the Nuix tools for cleanup, organization, discovery, investigation, classification, and protection to solve for more than just data protection.
  • Responding to a Security Incident within 72 hours with Nuix
    Responding to a Security Incident within 72 hours with Nuix
    Hoke Smith, Director, Cybersecurity & Analytics at Nuix Recorded: Jul 5 2019 39 mins
    The increasing frequency of major breaches and the introduction of government regulations such as Europe's General Data Protection Regulation is prompting organizations to re-examine their incident response programs and focus on enhanced detection and accelerated response.

    To meet today's challenges, organizations require tools that can detect the most advanced attack techniques, enable rapid breach investigations, provide remediation capability, and preserve evidence for downstream investigations and reporting.

    During this webinar, Hoke Smith, Director, Cybersecurity & Analytics at Nuix, will demonstrate how to detect, investigate, and respond to a breach within 72 hours. He will also show you how to maintain collected evidence as part of a legally defensible case.

    Join us at 10am (EST) 3pm (GMT) on Tuesday, 29 January 2019 to learn how to boost the effectiveness of your incident response program.

    About Hoke
    Hoke is responsible for implementing cybersecurity and analytics solutions for Nuix customers. He has more than 20 years’ experience solving complex technical problems for large organizations. Before joining Nuix, Hoke managed insider threat and big data analytics programs at IBM, primarily for defense and intelligence organizations. His areas of expertise include endpoint security, counterintelligence, insider threat detection, optimizing organizational performance, and big data analytics.
  • Conquering the Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    Conquering the Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    Doug Austin and Tom O'Connor Recorded: Jun 26 2019 72 mins
    It seems as though the eDiscovery deck is stacked against plaintiff’s attorneys. Defendants seem to have all the resources, the technical know-how and the interest of the major eDiscovery vendors while the plaintiffs often have few resources, technical knowledge or eDiscovery experience. How do plaintiff’s attorneys bridge that gap? This CLE-approved* webcast session will discuss the biggest eDiscovery challenges facing plaintiff’s attorneys and provide best practices for addressing those challenges to give plaintiff’s attorneys the best chance t get the evidence they need for their case. Topics include:

    + Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    + Ethical Duties and Rules for Understanding Technology
    + Does the eDiscovery Market Care About Plaintiff's Attorneys?
    + Understanding the Fundamentals of eDiscovery
    + Your Clients May Have More ESI Than You Think
    + How to Request the Right Form of Production from Opposing Counsel
    + Mechanisms and Approaches for Getting the Data to Make Your Case
    + What You Need to Know About Technology Assisted Review
    + Resources You Need to Bridge Your Understanding Gap

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for three consecutive years .

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • What’s New in Nuix Ringtail 9.9
    What’s New in Nuix Ringtail 9.9
    JR Jenkins and Emily Tice Recorded: Jun 25 2019 44 mins
    Nuix Ringtail 9.9 improves the speed, productivity, and collaboration of legal teams working on early case assessments, investigations, and document review projects. In this webinar, we will cover several of the latest additions and updates to Nuix Ringtail, including:

    -Audio transcription
    -Password bank
    -Case decommission
    -New Portal and Case Home dashboards
    -Machine language translation enhancements
    -And more!
  • How to Successfully Evaluate SOAR Solutions
    How to Successfully Evaluate SOAR Solutions
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architecht, DFLabs Recorded: Jun 25 2019 47 mins
    Assessing solutions to meet your organization’s specific requirements and use cases

    When investing in a new tool or technology it is important that it fully meets the requirements of the organization, including all of the crucial “must have” aspects, as well as a number of ”would likes” that could also be beneficial.

    With the growing maturity of the SOAR market and an increasing number of vendors in the space now claiming to offer a SOAR solution, evaluating a number of solutions from different vendors can be a daunting and long process if not carried out methodically with clear objectives goals in mind.

    During this webinar we will discuss what a full SOAR solution should entail, common security operations problems that a SOAR solution can help to solve, as well as define a set of criteria that we believe should be taken into consideration when assessing a SOAR solution and vendor.

    Our aim is to cover as many angles and best practices to help provide the information you need to make an informed decision based on your individual organization requirements. DFLabs believes it has one of the most open and industry leading SOAR solutions available in the SOAR market today, which is flexible to adapt to any use case, including those outside the traditional security operations space, but above all we are committed to making sure all potential customers achieve the best possible solution to solving their critical security problems.

    Key Takeaways:
    - The core capabilities and functions of a full SOAR solution
    - SOAR vs. Orchestration and Automation
    - Defining the problems to be solved
    - Criteria for evaluating a SOAR solution
    - Criteria for evaluating a SOAR vendor
  • Thinking Like a Millennial in eDiscovery
    Thinking Like a Millennial in eDiscovery
    Doug Austin and Tom O'Connor Sep 18 2019 5:00 pm UTC 75 mins
    eDiscovery isn’t just about emails and Office documents anymore. Newer sources of electronically stored information (ESI) and newer devices from which those sources are accessed are causing an explosion of data volumes and a proliferation of data sources that is unprecedented. And, millennials’ use of technology is a primary driver in the proliferation of these newer sources and devices, changing the paradigm of where potentially responsive ESI may need to be identified, preserved and collected. This CLE-approved* webcast session will discuss how evolving technology trends are impacting eDiscovery today and how to think like a millennial to stay on top of those developing trends. Key topics include:

    + Understanding Millennials and How They Differ from Previous Generations
    + Drivers for Millennials’ Thinking Today
    + How Litigation Support and eDiscovery Has Evolved Over the Years
    + Challenges Posed by BIG Data and Variety of Data Sources
    + Ethical Duties and Rules for Understanding Technology
    + Impact of Millennials on Legal Technology and eDiscovery
    + Your Clients May Have More ESI Than You Think
    + Recommendations for Addressing Today and Future Technology Challenges

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Understanding CCPA: Preparing for California’s New Privacy Act
    Understanding CCPA: Preparing for California’s New Privacy Act
    Jessica R. Gross, Data Privacy & Security Attorney, Sheppard Mullin and Melissa Singleton, Account Executive, AccessData Sep 18 2019 6:00 pm UTC 60 mins
    As spiraling data breach incidents drive heightened privacy concerns, states are turning to the law to help control how organizations handle sensitive consumer data. With the California Consumer Privacy Act (CCPA), California is the first US state to pass a comprehensive new consumer protection law, which will go in to force on January 1, 2020.

    The CCPA includes significant changes to give consumers more control over their personal data, and regulate how organizations can collect and store private information on their customers. And it’s only the beginning – in the wake of CCPA, other states are introducing their own new privacy regulations. With just a few short months until CCPA is in force, organizations should already be taking action now to prepare. But where do you begin?

    During this webinar, co-presented by AccessData and Sheppard Mullins, we’ll discuss everything related to CCPA, including:

    • What the new law means for any organization across the US that is collecting data on California residents
    • Current areas of contention in the law, the current advice on these issues and how new legislative developments are addressing these areas
    • Best practices and tips for enforcing CCPA at your organization
    • How you can leverage technology to manage data privacy
    • And more!

    This activity has been approved for Minimum Continuing Legal Education credit by the State Bar of California. Sheppard Mullin Richter & Hampton LLP certifies that this activity conforms to the standards for approved education activities prescribed by the rules and regulations of the State Bar of California governing minimum continuing legal education.
  • The Evolution of SOAR: Meeting and Exceeding Gartner’s Expectations with DFLabs
    The Evolution of SOAR: Meeting and Exceeding Gartner’s Expectations with DFLabs
    Mike Fowler - VP of Professional Services, DFLabs, and John Moran - Senior Product Manager, DFLabs Sep 24 2019 3:00 pm UTC 60 mins
    Security Orchestration, Automation and Response (SOAR) today is more than simply a buzzword. For many organizations, it is becoming a primary focus for their SOCs and/or CSIRTs as a solution for addressing the numerous daily security operations challenges they face, as well as a means to improve their operational effectiveness and efficiency, and more importantly their incident response capabilities.

    The evolution of SOAR is in full motion, moving from the product funneling stage to now seeing the strongest vendors and solutions continue to evolve their SOAR capabilities, while others fall by the wayside or get swallowed up by larger companies.

    Watch this webinar to learn about the evolution of SOAR, what a SOAR solution should include according to Gartner, and how DFLabs and its innovative and award-winning IncMan SOAR platform meets and exceeds Gartner’s SOAR criteria, and the industry's evolving expectations with its unique features and capabilities.

    Key Takeaways:

    - Unravel the key customer pain points, challenges and evolving expectations
    - Discover the key requirements a SOAR solution must meet
    - Review Gartner’s recommendations when implementing a full SOAR solution
    - Examine how DFLabs meets and exceeds Gartner’s SOAR criteria
    - And more