Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Being Future Ready in a Trasformative Digital Economy
    Being Future Ready in a Trasformative Digital Economy
    Chuck Rybacki, Chief Product Officer, Conga & Sheryl Kingstone, Research Director, 451 Research Recorded: Mar 19 2019 47 mins
    In today’s digital economy, companies are competing for customers like never before as price and product are no longer the only drivers of business. The value of delivering an engaging customer experience is on the rise, and businesses are increasingly turning to software and digitized processes to accommodate this trend. In fact, 80 percent of businesses are either planning or formally engaged in digital transformation initiatives to improve their overall customer experience.

    Join us to understand:

    -The importance of Digital Transformation
    -Why businesses must respond to the pace of change
    -The tools for Digital Transformation success
  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most...
    Mark Elwood - Marketing Director, TeleWare Recorded: Mar 19 2019 44 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility-enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile-enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post-GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility-enabled workforce

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • Best Practices for Selling the Investment in Legal Technology Internally
    Best Practices for Selling the Investment in Legal Technology Internally
    Jay Andrews, Crocs, Sheena Ferrari, FitBit Recorded: Mar 14 2019 62 mins
    Legal technology provides clear benefits to legal teams of all sizes and is critical to running and managing an highly efficient legal department. What’s often not so clear is how to convey this message to internal stakeholders and build consensus around the need for a solution.

    In this webinar recording, hear from operationally-focused legal leaders as they share their experiences and expert advice on how to:

    + Extract the most value and determine ROI from a potential solution

    + Effectively speak to qualitative benefits of selected legal technology

    + Influence decision-makers and partner with other business functions to get buy-in

    + Build a strong business case for legal technology
  • Leveraging Your Existing SIEM Solution with SOAR Technology
    Leveraging Your Existing SIEM Solution with SOAR Technology
    Mike Fowler, VP of Professional Services at DFLabs; Christian Have, Chief Product Officer at LogPoint Recorded: Mar 12 2019 42 mins
    Improve Your Incident Response with LogPoint and DFLabs

    Empower your security analysts to accelerate detection and response of cyber incidents by combining the power of SIEM and SOAR.

    Based on the recent joint solution from DFLabs and LogPoint resulting from their deep two-way integration, join this webinar to see how two security operations tools can work seamlessly together fusing intelligence to improve the overall effectiveness and operational performance of your existing security program.

    While a SIEM solution delivers tons of valuable information about the security status of your IT system, a SOAR solution uses this information to automate the response needed to incoming cyber threats. Combining the two will free up valuable time and resources in any security program and make for faster, smarter detection, response, and remediation of potential incidents.

    Learn how to:

    · Respond to all security alerts
    · Automate repeatable, mundane tasks
    · Orchestrate actions across multiple security tools
    · Enrich raw data, allowing for more informed, effective decisions
    · Reduce the mean time to detection and response
    · Increase the ROI on existing security operations tools
  • How Top Boutique Firms Are Winning Big Clients From Big Law
    How Top Boutique Firms Are Winning Big Clients From Big Law
    William Delgado, Partner, Willenken, Wilsion, Loh & Delgado, & Roy Shives, General Counsel, Shinko Electric Recorded: Mar 7 2019 70 mins
    Today, you don’t need an army of first-year associates to have a powerful legal practice. You just need the right tools. This change has allowed savvy legal professionals to scale their practices in ways previously not possible, and to win the business of large corporate clients in the process. In this webinar, you’ll get insider tips from both mid-sized firms who are making themselves enticing to big-sized business clients and the corporate buyers who are selecting outside representation.
  • The New World of AI - Powered Contracts
    The New World of AI - Powered Contracts
    Tim Cummins, IACCM President and Jason Gabbard, Head of AI, Conga Recorded: Mar 6 2019 54 mins
    Contract management is an area that is ripe for innovation and digital transformation. Often contracting processes are bureaucratic, burdensome, and a major source of delays. Yet new technological solutions are emerging quickly, affording the opportunity for AI to manage much of the process, while freeing up people—contract management staff—to focus on more strategic tasks.

    Are you prepared for the pace of change?

    Join us live to hear from IACCM President Tim Cummins and Conga Head of AI Jason Gabbard while they chat about:

    -The essential documents and contracts to automate.
    -Driving compliance across departments and increasing collaboration.
    -Boosting efficiency by reducing errors with key AI technology and Machine Learning.
  • EDRM Releases TAR Guidelines
    EDRM Releases TAR Guidelines
    EDRM Recorded: Mar 4 2019 61 mins
    EDRM released a comprehensive set of guidelines that aim to objectively define and explain technology-assisted review for members of the judiciary and the legal profession. In this webinar, we will discuss the drafting and editing process as well as how the Guidelines are being used to develop a TAR protocol or exemplar on when and under what circumstances TAR should be used.

    Meet our Presenters:
    John Rabiej, Deputy Director, Bolch Judicial Institute
    Jim Waldron, Director, EDRM at Duke Law
    Hon. James Francis, Southern District of New York, Ret.
    Tim Opsitnick, Executive Vice President and General Counsel, TCDI
    Matthew Poplawski, Senior e-Discovery Attorney, Winston & Strawn LLP
    Michael Quartararo, Managing Director, eDPM Advisory Services
  • Two Billion Dollars and Counting: A SOLID Talk (February 28, 2019)
    Two Billion Dollars and Counting: A SOLID Talk (February 28, 2019)
    Mike Bryant, Operating Partner, Knox Capital Recorded: Feb 28 2019 9 mins
    Knox Capital Operating Partner Mike Bryant presents a short, eight-minute TED-style talk on investments and investing in the legal tech market during SOLID West on February 28, 2019, in San Francisco. SOLID, also known as the Summit on Legal Innovation and Disruption, is a TED talk-style summit focused on innovation and the business of law.

    Presentation Highlights:

    + Who is Investing in Legal Tech? From Venture Captial to Private Equity
    + The Legal Tech Landscape: Investment Sources and Investment Targets
    + What Drives Legal Tech Valuations? From Comparable Transactions to Market Size
    + Are We in a Legal Tech Bubble? Winners, Losers, and Roadkill

    Presenting Expert: Mike Bryant

    Mike Bryant serves as an operating advisor as part of Chicago-based Knox Capital Holdings. He joined the firm in 2014 and focuses on private equity investments in the legal, business services and technology sectors.

    Currently a board member to the eDiscovery-centric alternative legal services provider HaystackID, Mike has served as the Founder and CEO of nSource, the President of Legal Services for Integreon, and the EVP of Strategy and Business Development for Bowne Business Solutions.
  • Active Learning in eDiscovery: From Analytics to Outcomes
    Active Learning in eDiscovery: From Analytics to Outcomes
    Vazantha Meyers, Esq., Todd Haley, Sarah Whitney, Esq., and Melanie Ramsey Arthur Recorded: Feb 27 2019 53 mins
    The promise of employing active learning in eDiscovery has been its capability to simplify and speed the reduction and review of legal documents when compared to traditional data reduction and review approaches. However, this promise of active learning is often not achieved based on the lack of understanding and expertise of the individuals and organizations seeking to use this powerful eDiscovery tool.

    This expert presentation will help eDiscovery professionals understand how to appropriately apply active learning to audits, investigations, and litigation by explaining how active learning works, what are the best situations and practices for its use, and how it has been successfully employed to help legal teams speed and shape positive eDiscovery outcomes.

    Webcast Highlights:

    + Active Learning: How It Works
    + Appropriate Uses: When Active Learning Makes Sense
    + Benefits, Costs and Cost Savings: The Reasons for Choosing Active Learning
    + Shaping Positive Outcomes: Practical Examples and Explanations of Active Learning Success
    + Lessons Learned: How to Use Active Learning Successfully and Avoid Pitfalls

    Presenting Experts:

    + Vazantha Meyers, Esq.

    As Director of Review Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives. Recognized as an expert in all aspects of traditional and technology-assisted review, Vazantha graduated from Purdue University and obtained her JD from Valparaiso University School of Law.

    + Todd Haley

    As VP of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery. An IT expert with expertise in managed services, Todd has served in IT and leadership positions with multiple law firms and technology integrators.

    + Sarah Whitney, Esq. (HaystackID)
    + Melanie Ramsey Arthur (HaystackID)
  • What you need to know about forensics in the cloud
    What you need to know about forensics in the cloud
    Marc Cressall, VP Business Development at AccessData and Keith Lockhart, Vice President of Strategic Programs at AccessData Recorded: Feb 27 2019 31 mins
    More and more organizations have made the decision to migrate to the cloud. Speed, security, collaboration, scalability and reliability are some of the many benefits of adopting a cloud strategy. In fact, some larger organizations and government agencies have a cloud first policy owing to the aforementioned benefits. However, given the current assumption of “when, not if” a cyber event will affect your organization, it’s necessary to have a plan in place for collecting evidential data from the cloud and analyzing it in a forensically sound manner.

    Join Marc Cressall, VP Business Development and Keith Lockhart, VP Strategic Programs in a 30-minute webinar to learn about:

    • Trends impacting forensics in the cloud
    • Benefits of the cloud
    • What AccessData offers in managed cloud solutions

    Next up—in March, Eide Bailly joins us to talk about how they are using the AccessData Cloud Solution to increase the efficiency of working a case and increase their overall profits. You won’t want to miss it!
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Recorded: Feb 27 2019 31 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Automation as a Force Multiplier in Cyber Incident Response
    Automation as a Force Multiplier in Cyber Incident Response
    Mike Fowler, CISSP - VP of Professional Services, DFLabs Recorded: Feb 26 2019 15 mins
    Security analysts are subjected to such a volume and frequency of alerts that over time they can become desensitized to the information they are analyzing, resulting in critical alerts potentially being disregarded or missed.

    When responding to tens of thousands of security alerts a month, how can you reliably distinguish what's important from what's just a noise in the background?

    Join our new webinar to learn how a Security Orchestration, Automation and Response (SOAR) solution can help your overwhelmed cyber response team to "SOAR" above the noise when detecting, responding to and remediating a potential security incident. Our VP of Professional Services, Mike Fowler, will present proven best practices to reduce and avoid alert fatigue.

    Key Takeaways:

    ● What is “Alert/Alarm Fatigue” and why should you care?
    ● What is the impact of alert fatigue on Security Operations and Incident Response?
    ● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
    ● How to reinforce the front line
    ● How to leverage SOAR capabilities that act as a Force Multiplier in Incident Response

    Want to learn more on the topic ahead of the webinar? Download our white paper "Automation as a Force Multiplier in Cyber Incident Response" here: https://bit.ly/2SKN9pL
  • 2019 Federal Judges Survey: Key Takeaways and Trends
    2019 Federal Judges Survey: Key Takeaways and Trends
    EDRM and Exterro Recorded: Feb 14 2019 63 mins
    More than 250 federal judges responded to a survey from Exterro and Duke Law on how they view and handle discovery disputes and what they expect from lawyers.

    Register for this webcast to get exclusive advice and best practices for not only meeting e-discovery defensibility requirements but also learn...

    - Tips for reducing e-discovery expenses without sacrificing defensibility
    - How to effectively interact and communicate with judges on e-discovery issues
    - What new data types judges are seeing spoliated the most in their cases
  • Digital Document Transformation is Here: Are You Ready?
    Digital Document Transformation is Here: Are You Ready?
    Will Spendlove, VP Product Marketing & Marcus Wadell, Solutions Engineer Recorded: Feb 14 2019 50 mins
    Automating the creation and distribution of your most commonly used and highest-value documents can help teams across your company achieve greater speed and efficiency, deliver a better customer experience, and improve business operations without additional resources or expense.

    Join us to:

    1. Discuss the importance of Digital Document Transformation.
    2. Hear more use cases for Conga Composer and Conga Collaborate.
    3. Start transforming your processes to generate more revenue and create business-critical efficiencies.
  • Breached! What’s Your Cybersecurity Response Plan?
    Breached! What’s Your Cybersecurity Response Plan?
    EDRM and Zapproved Recorded: Feb 12 2019 61 mins
    There is a lot of talk about strategies to prevent your data but what about your response plan if a breach does happen? Minimizing risk is essential, but just as critical for your litigation readiness plan is how to adjust your processes and measures in response. During this webinar, our panel of security experts will walk you through the steps and considerations following exposure.

    Speakers Include:
    Brad Harris, Vice President of Corporate Strategy, Zapproved LLC
    Chris Wolski, Chief Information Security Officer, Herman Miller Inc.
    Sarah Knight, Senior Privacy Counsel, Gilead Sciences
    Matthew E. Yarbrough, Managing Partner, Yarbrough Law, PLLC
  • Unlock the Keys to Success in your CLM Journey
    Unlock the Keys to Success in your CLM Journey
    Andrew Walters, CLM Practice Manager & Lizzy Painter, CLM Marketing Manager Recorded: Feb 12 2019 29 mins
    Effective contract management has many quantifiable benefits for companies. The return on investment can be remarkable, appearing on many levels across various departments.

    At Conga we understand the importance of getting contract management right and we believe that all successful deployments share a common journey.

    Join us as we discuss:

    1. How to think big but act small - We know CLM can be overwhelming
    2. Key Elements of CLM
    3. Phased and iterative approach to Implementation (when to phase and a few considerations)
    4. The difference between a successful and a failed implementation
    5. CLM Maturity and it's affect on contracts

    Let us show you how your business can realize it’s full potential by understanding and managing your current and future contracts.
  • Best Practices : Efficiency with Contract Lifecycle Management
    Best Practices : Efficiency with Contract Lifecycle Management
    Conga & Statera Recorded: Feb 5 2019 45 mins
    The end of the fiscal year is always a mad rush of activity as department heads hurry to push through projects, spend remaining budget, and finalize contracts before the year closes. Sales, procurement, and legal teams usually feel the brunt of the pressure, as they battle timewasting manual processes and piles of paperwork to squeeze in priority projects and revenue opportunities in under the wire.

    Join Conga and Statera for a discussion about contract management pain points and best practices to remedy those pitfalls and put you on a path to efficiency for 2019.

    In this session you’ll learn:

    -Common pain points and pitfalls when it comes to contract management
    -Best practices for the buying process and implementation
    -Demo: MSA and NDA tips & tricks
  • Detect, Analyze & Respond to Advanced Malware Using Orchestration & Automation
    Detect, Analyze & Respond to Advanced Malware Using Orchestration & Automation
    John Moran, Senior Product Manager, DFLabs Mark Mastrangeli, Lead Architect, McAfee, Security Innovation Alliance Recorded: Feb 5 2019 48 mins
    Detect, Analyze and Respond to Advanced Malware Using Security Orchestration and Automation: A DFLabs and McAfee Use Case

    As malware attacks continue, attackers are going to great lengths to obfuscate both the intent and capabilities of their malicious payloads to evade detection and analysis. In addition, the rate at which new malware is being developed has reached staggering new levels. Zero-day malware is increasingly common in all environments and signature analysis is becoming less effective.

    As a result, malware has become increasingly difficult to detect using more traditional detection mechanisms. Once detection occurs, it is often difficult to successfully analyze the malicious file to determine the potential impact and extract indicators. To successfully respond to a potential malware incident to contain the threat and block malicious traffic to minimize the impact, early detection and analysis are critical.

    In this webinar we will discuss how a security operations team can detect, analyze and respond to advanced, evasive malware by using DFLabs’ IncMan SOAR platform integrated with McAfee’s suite of tools including Advanced Threat Defense (ATD), Web Gateway and ePO for malware detection, while further being able to share critical security information using McAfee OpenDXL.

    Key Takeaways:

    Learn how McAfee’s suite of security products combined with IncMan SOAR from DFLabs can automatically detect and respond to malware threats to improve the effectiveness and efficiency of your security program by:

    - Performing advanced malware analysis
    - Enriching alert data
    - Immediately blocking threats
    - Sharing critical threat intelligence

    Your registration information will be shared with McAfee who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Transform Your Security Operations With SOAR Technology -  IncMan SOAR Overview
    Transform Your Security Operations With SOAR Technology - IncMan SOAR Overview
    John Moran, Senior Product Manager, DFLabs Cody Mercer, Manager of Pre-Sales & Sales Marketing, DFLabs Recorded: Jan 29 2019 60 mins
    IncMan SOAR from DFLabs is the only Security Orchestration, Automation and Response (SOAR) platform available capable of full incident lifecycle automation, including built-in, automated threat intelligence gathering, risk assessment, triage and notification, context enrichment, hunting and investigating, threat containment and more.

    This feature rich, unique and scalable solution provides context to security incidents, automates actions, orchestrates response to activities, while enabling full reporting and measurement functionality across all stakeholders. With its Open integration Framework, REST API and Automated START Triage, it is the most open and customizable SOAR platform in the industry, helping organizations to overcome some of the most common challenges and pain points when it comes to incident response.

    Join this webinar to learn how to transform your Security Operations by using SOAR technology and discover how DFLabs can help you to detect, respond to and remediate all security incidents fast, before they impact your organization.

    Key Features & Capabilities:

    - Security Automation and Orchestration
    - Threat Hunting and Investigation
    - Incident Management
    - Flexible Integrations and Event Parsing
    - Forensic Evidence Management
    - Reporting and KPIs
    - Knowledge Transfer & Machine Learning
    - Community Portal and Community Edition
  • The End of Sanctions?
    The End of Sanctions?
    Mira Edelman, Craig Ball, and Casey Sullivan Recorded: Jan 23 2019 67 mins
    Following the 2015 amendments to the Federal Rules of Civil Procedure, the amount of cases involving spoliation sanctions has plummeted. Today, cases involving discovery sanctions are only one third as common as they were during their peak in 2011 and 2012.

    Are we seeing the end of sanctions? And if so, what effects is this having on the legal practice?

    Join Logikcull and eDiscovery experts Craig Ball and Mira Edelman as we explore these topics, including a review of extensive new research on eDiscovery sanctions post-2015, key case laws, and emerging corporate discovery trends.

    About our presenters:

    Craig Ball

    Craig Ball is a trial lawyer, computer forensic examiner, law professor and noted authority on electronic evidence. Among his many accomplishments, he has served as the Special Master or testifying expert in computer forensics and electronic discovery in some of the most challenging and celebrated cases in the U.S. He is a founder of the Georgetown University Law Center E-Discovery Training Academy and regularly teaches eDiscovery and digital evidence at the University of Texas School of Law.

    Mira Edelman

    Mira Edelman has decades of experience in discovery, both as in-house counsel and in private practice. She has worked as Associate General Counsel and Director of eDiscovery Services and Information Governance for Facebook, Senior Counsel and Discovery manager for Google, and eDiscovery Counsel at Hughes Hubbard & Reed. Mira is also a frequent writer and speaker on issues such as sanctions, legal holds, and ESI.
  • Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Presentation Leaders: Doug Austin and Tom O'Connor Recorded: Jan 23 2019 67 mins
    2018 was another notable year for eDiscovery case law with several significant rulings that stand to impact eDiscovery practices and the admissibility of evidence. How can these key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2018 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Technology Assisted Review best practices and trends
    + The use of sampling to settle disputes
    + Admissibility vs. proportionality and privacy disputes
    + Form of production disputes and the issues involved
    + Key case rulings on discoverability of mobile device data
    + Privilege disputes and clawback requests
    + Impact of rules changes on boilerplate objections
    + The state of sanctions three years after the 2015 Fed Rules updates

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    John Wilson, ACE, AME, CBE and Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA Recorded: Jan 23 2019 65 mins
    Even in the most clear-cut matters, defending IP and trade secrets can be difficult. And when digital evidence is obfuscated through direct and indirect efforts, these defenses can be downright daunting. However, with a comprehensive and integrated discovery plan supported by a team of experts with digital investigative experience augmented with targeted eDiscovery technologies, legal teams can quickly, effectively, and economically gain and maintain the legal high ground in these critical corporate matters.

    This expert presentation will present actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters. Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.

    Webcast Highlights:

    + Organizing for Success: From Complaint to Discovery Plan
    + Accelerated Execution: Translating Data into Evidence
    + Advancing on Smoking Guns: Advanced Technologies and Assisted Review
    + Reviewing Right: Accelerated Legal Document Review
    + Decisive Differences: The Benefit of an Integrated eDiscovery Provider

    Presenting Experts:

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • AMP Up Your Response with SOAR and Cisco’s Security Suite
    AMP Up Your Response with SOAR and Cisco’s Security Suite
    John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Recorded: Jan 11 2019 58 mins
    Presented By:
    John Moran, Senior Product Manager, DFLabs
    Michael Auger, Senior Solutions Security Architect, Cisco Security
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security

    Learn how DFLabs’ Security Orchestration, Automation and Response solution, IncMan SOAR, integrates and performs seamlessly with Cisco’s security suite, including its latest integration with Cisco AMP for Endpoints.

    As organizations are exposed to more advanced and frequent attacks, speed of detection and response is critical in reducing financial and reputational damage.

    Cisco AMP for Endpoints leverages cloud-based analytics to detect and respond to advanced threats in real-time. Used with Cisco’s security suite, including Threat Grid, Umbrella and Umbrella Investigate, threats can be assessed, and assessments of the network performed; but this consumes valuable analyst time.

    IncMan SOAR allows security teams to automate repeatable tasks, including enriching initial threat indicators, allowing more time to focus on tasks which require human intervention.

    By combining these solutions, security teams can automate and orchestrate the process from initial alert, to containment and remediation, reducing actionable detection and response times from hours to seconds.
  • Nuix Ringtail demonstration: removing doubt from your discovery process
    Nuix Ringtail demonstration: removing doubt from your discovery process
    Christina Mather, Solutions Consultant, Nuix Recorded: Jan 7 2019 31 mins
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Crowdsourcing IP Research: From Novelty to Best Practice
    Crowdsourcing IP Research: From Novelty to Best Practice
    Peter Vanderheyden, COO, RWS IP Research Recorded: Dec 18 2018 42 mins
    Join RWS IP Research COO Peter Vanderheyden for a live webinar on how crowdsourcing your prior art can serve as a best practice for your IP research. What was once a novel and uncertain methodology has been reliably used to kill bad patents in litigation, monetize patent portfolios and even provide competitive analyses. In 40 minutes, we will discuss:

    •Why crowdsourcing is particularly suited for infringement cases, monetization efforts and even competitive intelligence;
    •A walk through of results illustrative of a crowdsourced search;
    •How RWS uniquely approaches the crowdsourcing process for purposes of finding prior art;
    •How technology plays a role and the advantage of our AOP Connect™ platform;
    •How crowdsourcing can help you to efficiently and effectively manage discovery risk and confidentiality; and more.

    About the Presenter

    Peter Vanderheyden is COO of RWS IP Research where he brings over 30 years of experience across all business disciplines from finance to product management and entrepreneurial startups. Prior to joining RWS, Mr. Vanderheyden was the Chief Executive Officer of Article One Partners where he led a team that developed AOP Connect and helped revolutionize the way that IP research is conducted through crowdsourcing. While vice president and Managing Director of LexisNexis’s Global IP Solutions, his team developed both TotalPatent and PatentOptiimizer, while spearheading the first truly semantic search engine for technical/patent content.

    Mr. Vanderheyden earned a BS in Business from the University of Minnesota with undergrad certification in math, science and engineering. Mr. Vanderheyden also has a US Patent to his credit.

    https://www.rws.com/
  • After the Attack—Surviving and Thriving Post-Breach
    After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Mar 21 2019 4:00 pm UTC 60 mins
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Mar 26 2019 2:00 pm UTC 30 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Anatomy of an International Investigation
    Anatomy of an International Investigation
    Jeremy Burdge, John Wilson, and Michael Sarlo Mar 27 2019 4:00 pm UTC 90 mins
    From FCPA to FIFA and from the Panama Papers to GDPR privacy requirements, international investigations require an incredible balance of knowledge, expertise, and practical experience for those involved in collecting and assessing electronically stored information (ESI) in response to bribery, corruption, fraud, and privacy violation allegations. And with the increased risk factors associated with multinational and cross-border data transfer, an investigative misstep might be the last step for involved investigators.

    This expert presentation led by international investigations expert Jeremy Burdge of Hogan Lovells will present actionable considerations for auditors, investigators, and litigators as they navigate the planning requirements, political and people issues, privacy laws, and the technologies available to identify and shape positive investigation outcomes in international venues.

    Webcast Highlights

    + Defining Investigations: Internal and External Events
    + Preparing and Planning: Actors, Allegations, and End-Points
    + Politics and Privacy: Agreements, Borders, and Confidentiality
    + Technologies and Techniques: Investigative Goals and Goal Posts

    Presenting Experts:

    + Jeremy Burdge

    As Litigation Practice Group Lead for Legal Project Management (LPM) for the Americas at Hogan Lovells, Jeremy leads the LPM teams that support Investigations & White Collar, International Arbitration, and Employment practice groups spanning the firm's U.S., Mexico, and Brazil offices.

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.
  • Understanding Blockchain and its Impact on Legal Technology
    Understanding Blockchain and its Impact on Legal Technology
    Presentation Leaders: Doug Austin and Tom O'Connor Mar 27 2019 5:00 pm UTC 75 mins
    If you think you’re hearing more and more about blockchain and bitcoin, you’re probably right. Blockchain is even being discussed as having potential application in legal technology and electronic discovery. But, what exactly is it? How does it work? And, how do you need to be prepared to address it as a legal professional? This CLE-approved* webcast session will discuss, define and describe blockchain and how it can apply to legal technology and eDiscovery today and in the future. Topics include:

    + History of Blockchain and Bitcoin
    + Defining Key Terms
    + How Blockchain Works
    + Advantages and Challenges of Blockchain
    + Smart Contracts and Other Use Cases for Blockchain
    + Impacts of Blockchain on Legal Technology and eDiscovery
    + Is Blockchain Really as Secure as People Think?
    + Future of Blockchain
    + Resources for More Info

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • AccessData Managed Cloud Services—a Q&A with Eide Bailly
    AccessData Managed Cloud Services—a Q&A with Eide Bailly
    Marc Cressall, Vice President of Business Development and Trent Leavitt, Manager Digital Forensics & eDiscovery Mar 28 2019 3:00 pm UTC 60 mins
    Join this 60-minute Q&A with Trent Leavitt of Eide Bailly and learn more about their recent deployment of AD Lab in the Cloud. Marc Cressall will moderate as Trent describes how the cloud has provided them with speed, collaboration, scalability, cost savings and security.
  • Dive Head First into the Endpoint (Without Hitting Your Head)
    Dive Head First into the Endpoint (Without Hitting Your Head)
    John Moran, Senior Product Manager, DFLabs and Chris Berninger, Technical Alliances Engineer, Carbon Black Apr 2 2019 4:00 pm UTC 60 mins
    Dive Head First into the Endpoint (Without Hitting Your Head): A DFLabs and Carbon Black Use Case

    The time it takes attackers to progress from initial infection to establishing multiple beachheads and beginning data exfiltration is often measured in minutes. Responding effectively under these adverse conditions requires complete network visibility, actionable intelligence and intelligent automation to augment human analysts.

    Carbon Black has long been recognized as the industry leader in endpoint detection and response, providing unmatched visibility into all endpoint activity. By incorporating actionable intelligence into their suite of tools, Carbon Black allows enterprises to respond effectively to both known and unknown threats. Carbon Black Defense brings Carbon Black’s extensive Endpoint Detection and Response (EDR) experience together with their cutting-edge next-generation antivirus technology to provide protection against even the most advanced threats.

    However, when a network event, such as a Web Application Firewall (WAF) or Intrusion Detection System (IDS) alert is the impetus for an alert, correlating endpoint data and identifying and containing the threat is largely a manual process. This allows attackers enough time to begin wreaking havoc on the network.

    In this webinar we will explore DFLabs’ Security Orchestration, Automation and Response (SOAR) solution, IncMan SOAR, and Carbon Black Defense, to show how these industry-leading solutions can work seamlessly together to automatically pivot from the network into the endpoint, automatically identifying and containing unknown threats to immediately reduce the risk to the enterprise.

    Learn how:
    - Carbon Black’s suite of products can improve your security infrastructure
    - IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    - Carbon Black and DFLabs together can reduce incident detection and response times