The e-discovery community covers emerging trends in e-discovery solutions, data mapping and data collection. Find best practices for email archiving, selecting the right e-discovery solution for your organization and more. Join the community to learn from top legal, compliance and e-discovery professionals and prepare yourself for what lies ahead.
In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.
Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:
Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.
Three reasons why you join us on July 15
1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
“Shift Left”- A New Age of eDiscovery – Analytics and ECA
Sponsored by LexisNexis
More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:
· Strategies on performing an ECA risk/benefit analysis;
· A new way of thinking: employing analytics in ECA?
· How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?
In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.
Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.
* M. James Daley, Senior Counsel, Seyfarth Shaw LLP
* Emily R. Fedeles, Associate, BakerHostetler
* Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.
Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations
Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.
In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.
* William F. Auther, Partner, Bowman and Brooke LLP
* Melinda L. McLellan, Counsel, BakerHostetler
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:
Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.
* Krista Fuller, Director of Product Management, LexisNexis
* Ryan Bilbrey, Managing Director, OmniVere
* George Socha, Co-Founder, EDRM
* Tom Gelbmann, Co-Founder, EDRM
Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.
* Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
* Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
* Barry C. O’Melia, Chief Operations Officer, Digital WarRoom
George Socha, Co-Founder, EDRM
Tom Gelbmann, Co-Founder, EDRM
Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?
Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
How to defend against digital hijack of your business data, and what to do if you get hit
Cyber criminals have discovered the perfect tool to force modern business owners into the vice of extortion – drop malware onto an unsuspecting network to encrypt all the data and demand payment to provide the key to unlock the data. The attacked business has two choices; either lose access to years of data or pay a ransom to get the data back. The cyber criminals bank on the fact that businesses will pay to rescue their hijacked data.
Such attacks or ransomware are on the rise, fuelled by successful extortion payments. The types of businesses being targeted are expanding, and the delivery methods used to infect systems are becoming increasingly sophisticated. There are also many different types of malware now available; Crypto Wall also known as Crowti, Crypto Locker, FakeBSOD and The FBI scam.
Preparation is essential to surviving such attacks and monitoring of systems is needed to prevent them.
Discover what attorneys and litigation support managers are high-fiving about. They’re excited about Thomson Reuters’ new, and dare to say revolutionary ediscovery platform: eDiscovery Point. A new ediscovery platform that allows users simultaneously upload and process data; access that data within minutes; achieve accurate search results within seconds of performing a complex search query; as well as several other time and costs saving functionalities like advanced data analysis and predictive coding. Attend this webinar to see how eDiscovery Point will make ediscovery easier for you.
Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.
Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives.
In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss:
• What makes organizations vulnerable to cyberespionage
• Why cyberespionage activity can vary across industries based on hacking drivers
• How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise
Will Myanmar’s historic elections outcome bring durable change to the country? Who are the forces at play, and what is at stake in the negotiations around the transition to NLD rule? How will the influence of the Myanmar military change (and the companies that have chosen to affiliate with them) change after the election – and what impact will this have on the economy, on US sanctions, and on business?
Join Kroll for an hour long webinar to discuss the historic NLD victory, the state-of-play-among political actors, and the implications for business.
In this webinar, you’ll hear from Kroll cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing the need for organizations and advisors to prepare for an attack, and know how to respond when your clients...and sometimes their families, are put at risk.
In this webinar, you’ll hear from cyber security expert Jonathan Fairtlough. He’ll discuss how recent data breaches are showing just how unprepared organizations are in understanding where their data is held, and how to respond when your clients...and sometimes their families, are put at risk.
Jonathan and Kroll have experience with complex cyber investigations, including computer intrusions, insider attacks, ransomware and malware outbreaks, Internet fraud and theft of trade secrets. He has worked with clients on a wide range of cyber concerns, including security policy and implementation, incident investigation and detection, forensic analysis, malware analysis, and breach threat reduction.
It’s universally accepted that technology assisted review (TAR) speeds review and reduces costs, but many attorneys are still loathe to use it. In the eDJ Group’s recently released 2015 PC-TAR survey, nearly 40% of respondents say they are using TAR less than 5% of the time on their cases. While a majority of respondents say they have tried it, it’s clear that TAR hasn’t crossed the chasm as a go to tool for the legal community yet. Join Greg Buckles, eDJ co-founder and Tammy Doss, VP of Business Operations at Ipro, as they dig into what the survey and interview findings show for analytics and TAR usage and trends as we move into 2016.
Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.
Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.
While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.
How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?
Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
This webinar is the final in a series of five practical sessions by the creators of the eMSAT-1. This webinar focuses on tying it all together: how to understand and act on the results obtained by completing the eMSAT.
Please join us on Wednesday, November 18, 2015, from 1:00 to 2:00 pm Central, as we present the free live EDRM webinar, "Away with Words: An Investigative Approach to eDiscovery,” sponsored by LexisNexis.
In this webinar, our presenters will step you though an approach to eDiscovery that might not be so familiar to you: one grounded in data science, an investigative mindset, and a focus on the real end-game of discovery - bringing a case to a satisfactory resolution.
** Presenter **
Thomas A. Barnett, Special Counsel, eDiscovery and Data Science, Paul Hastings
** Moderators **
George Socha, Co-Founder, EDRM
Tom Gelbmann, Co-Founder, EDRM
Join us as we demonstrate a new era in eDiscovery and a new innovation created to solve one of the industry’s most pressing and costly problems – disconnected and inefficient workflows. Currently, we batch data into containers to accommodate the limits of the processing tools we use. Breaking up data comes at signification cost, however: time. It takes time to create the batches, run each batch, and make sure that the batch ran properly without introducing errors. To eliminate the starts, stops and errors Ipro has introduced a patent-pending, continuous data streaming technology named, Automated Digital Discovery (ADD). By attending this webinar, you’ll see and in action and discuss how it unifies and simplifies the eDiscovery process.
Too often cyber security is viewed as an issue relevant only for businesses holding customer data. The reality is quite different. Hackers regularly target all electronic information and systems in a company, and even attack executives and their relationships. Those targeted attacks can put executives at risk of being extorted or manipulated.
More specifically, cyber criminals can wreak havoc by leveraging an executive’s family and community connections, social media, and publicly available digital information. Cyber criminals can even impersonate the executive and compromise highly valued investor or board member relationships.
Learn best practices from experts on how to defend against cyber theft across all spheres, respond to and investigate theft-related breaches or seek legal remedy to recover losses.
Join us as we demonstrate a new era in eDiscovery and a new innovation created to solve one of the industry’s most pressing and costly problems – disconnected and inefficient workflows. Automation offers the ability to eliminate the usual starts and stops, as well as reduce many time-consuming human touch points while preparing data for review. By attending this session, you’ll learn how to avoid time delays, errors, and budget overruns common in today’s eDiscovery workflows.
Join Kroll’s team as they share the shifting dynamics of Chinese investment into Australia, replete with both risks and rich rewards at every turn. It includes an in-depth interview with Violet Ho, Senior Managing Director, and Richard Dailly, Managing Director at Kroll, who will discuss the most urgent risks of cross-border deal-making, offering insights on conducting pre-transactional due diligence on potential foreign investors.
Critical Qualities of the Resilient E-Discovery Leader
Members of the executive team of the IGI, an industry-leading think tank, will present what they have learned about what makes a resilient eDiscovery leader. In this session, the team will share insights into information leadership gleaned from experience helping organizations through the e-discovery process; our work at the IGI that involves speaking with hundreds of IG practitioners, and also the extensive quantitative research we conduct at the IGI. E-discovery is one of the most stressful, demanding, and high-stakes experiences that practitioners can go through. The IGI will present unique insight into the qualities that make e-discovery leaders resilient. The session will close with a discussion around how we can all apply these lessons in our own roles.