The e-discovery community covers emerging trends in e-discovery solutions, data mapping and data collection. Find best practices for email archiving, selecting the right e-discovery solution for your organization and more. Join the community to learn from top legal, compliance and e-discovery professionals and prepare yourself for what lies ahead.
India remains an attractive destination for foreign investors as its economic fundamentals and optimism about its prospects remain strong. From a macroeconomic perspective, India is one of the fastest growing major emerging markets, with recent projections from the International Monetary Fund (IMF) pointing to a fiscal growth of 7.4% versus a 6.6% expansion in China for 2016. Politically, it is more stable than in previous cycles, with the BJP led government initiating a number of reforms and regulatory measures that are instilling economic confidence and raising India’s attractiveness as a destination for FDI. The country’s demographics are equally promising: India is home to 18% of the world’s working-age population (ages 15-64), a growing middle class with increasing purchasing power and a corporate sector that is flexing its muscle domestically and globally.
Join Kroll’s team as they share the shifting dynamics of investing in India, replete with both risks and rich rewards at every turn. It includes an in-depth commentary by Reshmi Khurana, Kroll’s Managing Director and Head of South Asia, and Tarun Bhatia, Managing Director at Kroll, who will discuss the most urgent risks of cross-border deal-making, offering insights on conducting pre-transactional due diligence on
Successful companies abide by a fundamental business principle: “If you can’t measure it, you can’t manage it.” Lawyers and electronic discovery professionals, however, have been slow to adopt this bedrock tenet, relying instead on more reactive and subjective approaches. As regulatory requirements, data volumes and types, and budget pressures mount, proactively managing litigation portfolios can provide substantial differentiated value. In this webinar, our experts will discuss how pre-defined, comprehensive, and legally defensible managed services programs foster faster identification of responsive and critical information, more efficient and predictable spending, and better litigation outcomes.
•Stephen D. Whetstone
Executive Managing Director & Leader, Electronic Discovery & Disclosure
Vice President of Product Strategy
Delta Air Lines
Considerations for Corporate Legal Teams Managing E-Discovery in a Changing Tech Environment
As increasing numbers of corporations move to cloud productivity solutions like Microsoft Office 365, Box, Google Apps, and others, the legal department is tasked with the expanded challenge of managing the complex process of e-discovery in an environment where electronically stored information (ESI) is not only growing at an exponential rate but increasing in complexity due to the emergence of cloud sources.
This webinar will share considerations that will help in-house corporate legal teams navigate this process and illustrate the opportunities and the risks cloud data brings and effectively manage e-discovery in a complex tech environment.
* Amy Sellars, Attorney, Williams Companies
* Sarah Thompson, Sr. Product Manager, Zapproved, Inc.
e-Discovery is one of the most stressful, demanding, and high-stakes experiences that practitioners can go through. What do resilient e-discovery leaders do differently as they face setbacks or chronic adversity? The team will share insights into information leadership gleaned from their research and experience working with lawyers, technologists, and other IG professionals, helping organizations through the e-discovery process.
* Barclay T. Blair, Executive Director and Founder, Information Governance Initiative
* Doug Kaminski, Director, Major Accounts, Enterprise Sales, kCura
* Brian Stempel, Director Litigation Technology, Kirkland & Ellis LLP
George Socha, Co-Founder, EDRM and Managing Director, BDO
Tom Gelbmann, Co-Founder, EDRM
In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.
Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:
Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.
Three reasons why you join us on July 15
1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
“Shift Left”- A New Age of eDiscovery – Analytics and ECA
Sponsored by LexisNexis
More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:
· Strategies on performing an ECA risk/benefit analysis;
· A new way of thinking: employing analytics in ECA?
· How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?
In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.
Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.
* M. James Daley, Senior Counsel, Seyfarth Shaw LLP
* Emily R. Fedeles, Associate, BakerHostetler
* Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.
Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations
Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.
In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.
* William F. Auther, Partner, Bowman and Brooke LLP
* Melinda L. McLellan, Counsel, BakerHostetler
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:
Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.
* Krista Fuller, Director of Product Management, LexisNexis
* Ryan Bilbrey, Managing Director, OmniVere
* George Socha, Co-Founder, EDRM
* Tom Gelbmann, Co-Founder, EDRM
Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.
* Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
* Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
* Barry C. O’Melia, Chief Operations Officer, Digital WarRoom
George Socha, Co-Founder, EDRM
Tom Gelbmann, Co-Founder, EDRM
Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?
Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
How to defend against digital hijack of your business data, and what to do if you get hit
Cyber criminals have discovered the perfect tool to force modern business owners into the vice of extortion – drop malware onto an unsuspecting network to encrypt all the data and demand payment to provide the key to unlock the data. The attacked business has two choices; either lose access to years of data or pay a ransom to get the data back. The cyber criminals bank on the fact that businesses will pay to rescue their hijacked data.
Such attacks or ransomware are on the rise, fuelled by successful extortion payments. The types of businesses being targeted are expanding, and the delivery methods used to infect systems are becoming increasingly sophisticated. There are also many different types of malware now available; Crypto Wall also known as Crowti, Crypto Locker, FakeBSOD and The FBI scam.
Preparation is essential to surviving such attacks and monitoring of systems is needed to prevent them.
Discover what attorneys and litigation support managers are high-fiving about. They’re excited about Thomson Reuters’ new, and dare to say revolutionary ediscovery platform: eDiscovery Point. A new ediscovery platform that allows users simultaneously upload and process data; access that data within minutes; achieve accurate search results within seconds of performing a complex search query; as well as several other time and costs saving functionalities like advanced data analysis and predictive coding. Attend this webinar to see how eDiscovery Point will make ediscovery easier for you.
Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.
Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives.
In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss:
• What makes organizations vulnerable to cyberespionage
• Why cyberespionage activity can vary across industries based on hacking drivers
• How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise
Will Myanmar’s historic elections outcome bring durable change to the country? Who are the forces at play, and what is at stake in the negotiations around the transition to NLD rule? How will the influence of the Myanmar military change (and the companies that have chosen to affiliate with them) change after the election – and what impact will this have on the economy, on US sanctions, and on business?
Join Kroll for an hour long webinar to discuss the historic NLD victory, the state-of-play-among political actors, and the implications for business.
In this webinar, you’ll hear from Kroll cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing the need for organizations and advisors to prepare for an attack, and know how to respond when your clients...and sometimes their families, are put at risk.
In this webinar, you’ll hear from cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing just how unprepared organizations are in understanding where their data is held, and how to respond when your clients...and sometimes their families, are put at risk.
Jonathan and Kroll have experience with complex cyber investigations, including computer intrusions, insider attacks, ransomware and malware outbreaks, Internet fraud and theft of trade secrets. He has worked with clients on a wide range of cyber concerns, including security policy and implementation, incident investigation and detection, forensic analysis, malware analysis, and breach threat reduction.
It’s universally accepted that technology assisted review (TAR) speeds review and reduces costs, but many attorneys are still loathe to use it. In the eDJ Group’s recently released 2015 PC-TAR survey, nearly 40% of respondents say they are using TAR less than 5% of the time on their cases. While a majority of respondents say they have tried it, it’s clear that TAR hasn’t crossed the chasm as a go to tool for the legal community yet. Join Greg Buckles, eDJ co-founder and Tammy Doss, VP of Business Operations at Ipro, as they dig into what the survey and interview findings show for analytics and TAR usage and trends as we move into 2016.
Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.
Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.
While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.
How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?
Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
This webinar is the final in a series of five practical sessions by the creators of the eMSAT-1. This webinar focuses on tying it all together: how to understand and act on the results obtained by completing the eMSAT.
Please join us on Wednesday, November 18, 2015, from 1:00 to 2:00 pm Central, as we present the free live EDRM webinar, "Away with Words: An Investigative Approach to eDiscovery,” sponsored by LexisNexis.
In this webinar, our presenters will step you though an approach to eDiscovery that might not be so familiar to you: one grounded in data science, an investigative mindset, and a focus on the real end-game of discovery - bringing a case to a satisfactory resolution.
** Presenter **
Thomas A. Barnett, Special Counsel, eDiscovery and Data Science, Paul Hastings
** Moderators **
George Socha, Co-Founder, EDRM
Tom Gelbmann, Co-Founder, EDRM
In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.
Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:
•Why the C-Suite and Board need to champion planning and prevention efforts.
•How to get Executive buy-in.
•Ways to build stronger response structures from the top.
•How to construct response architectures. Who needs to be responsible for what?
•Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
•Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
•Examples our experts have seen – the good and the bad
Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.
Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.
- Corruption risks and trends in Latin America
- Understanding local nuances: What you need to know when conducting business with third parties in the region
- Best practices for risk mitigation and due diligence