Hi [[ session.user.profile.firstName ]]

e-Discovery

  • Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase)
    Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase) Doug Austin Recorded: May 11 2017 61 mins
    This on-demand webcast provides an overview and demonstration of three CloudNine software offerings designed to extend and enhance legal discovery efforts of law firms and legal departments.

    Webcast Overview:

    The acceleration of data creation in today’s business world coupled with the requirement to understand, manage, and act on information throughout its lifecycle presents a challenge to information governance and legal discovery professionals seeking to balance process, products, and outcomes. This presentation and technology demonstration led by eDiscovery Daily Blog author and eDiscovery expert Doug Austin will provide attendees with an overview of data discovery and legal discovery and help them frame the lifecycle of data through the lens of data and legal discovery objectives, tasks, and tools.

    Presentation Highlights

    + The Objectives of Data Discovery and Legal Discovery
    + A Framework for Approaching Discovery
    + Tasks and Tools For Effective Discovery

    Demonstration Highlights

    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + NEW: Outpost from CloudNine: Data Transfer into Relativity
    + NEW: CloudNine Legal Hold Notification

    Webinar Presenter

    Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    To learn more about CloudNine, visit eDiscovery.co.
  • A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security
    A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security Bill Bonney (CISA) Vice President, Product Management, TechVision Research and Dario Forte, CEO, and Founder of DFLabs Recorded: May 10 2017 52 mins
    Cyber Security requires organizations to analyze and correlate data derived from the measurement of the right metrics. Every CISO is searching for the best practices for turning metrics and reporting into meaningful data for 3 important data sharing levels within organizations. Managing metrics and reporting for Security Operations and Incident Response can be a time consuming and costly project.

    In this webinar, our speakers will discuss how to strengthen and empower a security team’s ability to quickly assess and remediate security Incidents and data breaches.

    Including:
    • Review CISO’s guide for sharing SecOps and IR data with C-level, VPs, and Directors.
    • Discover true priorities in breach reporting.
    • Learn what organizations can do to improve the automated analysis of incidents.
    • Understand the trends and benchmarks in security automation and orchestration to include metrics and reporting.
    • How to orchestrate and automate processes and machine actions in order to mitigate damages.

    Hear from:
    Bill Bonney, a co-author of the seminal book for new CISOs, the CISO Desk Reference Guide – A Practical Guide for CISOs. Along with his co-authors, Bill has established the standard “go to” reference for setting up an effective Information Security program. Along with Dario Forte, CEO, and Founder of DFLabs who will also be presenting on orchestrate and automate processes. Dario Forte started his career in Incident response as a member of the Italian police. In that role, he has worked with United States governmental agencies including the National Aeronautics and Space Administration (NASA). He is Co-Editor of several ISO Standards within the 27000 series and holds the CFE, CISM and CGEIT certifications. The author of over 50 books and scientific papers, Dario has an MBA from the University of Liverpool and has completed select executive curriculum at the Harvard Business School.
  • Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations
    Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Matt Axelrod (Partner, D.C.) Satindar Dogra (Partner, London) and Adam Lurie (Partner, D.C.), Linklaters LLP Recorded: May 3 2017 61 mins
    With cross-border enforcement on the rise, companies must consider what information, if any, to provide to various regulators. But that’s only the start of the challenge. Having decided to provide information, companies must carefully consider how to protect their privileged and otherwise protected information, including information subject to data protection law.

    This GIR Live webinar will break down these challenges as well as looking at various strategies that companies can take to protect that which is privileged or protected when interacting with regulators around the world.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:
    •How to protect privilege and data privacy during an internal investigation in response to a regulator.
    •How to interact with regulators while preserving privilege and data protection rules.
    • How do legal privileges and data privacy protections vary between key jurisdictions?
    •How does increasing cross-jurisdictional cooperation between regulators impact these considerations?
    •What recent developments should practitioners should be aware of?
  • Applying Records Retention and IG to Office 365
    Applying Records Retention and IG to Office 365 Greg Forest, CTO, Contoural Recorded: May 2 2017 58 mins
    One day, the decision is made to move the company’s messaging to Microsoft’s Office 365 cloud platform. While this may make it easier and less expensive to manage email and messaging, it raises a number of questions: How should we configure Office 365? What electronic records do we have, how do we manage them, and does Office 365 have the required functionality to support our policy? How much legacy email should we migrate to the new system? Do we want to just take advantage of the messaging and client features or should we move our documents to SharePoint Online and OneDrive for Business as well? How do we train our employees on the new system? How do we migrate our information to the new system? How many of these questions do we need to answer now, or can we just figure them out along the way? Office 365 adoption raises a host of Information Governance questions. In this webinar industry expert Greg Forest from Contoural will address:
    • Office 365 deployment options (cloud only and hybrid)
    • Implementing governance policies for Office 365 components
    • Office 365 migration and employee behavior change management strategies
    • Creating an Office 365-specific Information Governance roadmap
  • Building a Real Business Case for Information Governance
    Building a Real Business Case for Information Governance Mark Diamond, CEO, Contoural Recorded: May 2 2017 56 mins
    How do we take such a diverse program such as Information Governance, that can reduce risk, cost, and in many cases move the business forward, and leverage it in a way so that the organization can figure out what value it has and build a business case for senior management?
  • Protecting Against a Panama Papers Breach
    Protecting Against a Panama Papers Breach Mark Diamond, Contoural CEO Recorded: May 2 2017 57 mins
    A Panama law firm suffered a massive data leak exposing offshore holdings of government officials across the world and companies should take notice. While the media has focused on the politicians involved, this breach also points to a more insidious trend: A new normal has come into place whereby it’s seemingly OK to breach information and the media’s “right to know” appears to trump companies and law firms’ rights to keep their confidential, sensitive and even privileged documents and data private. Traditional privacy and cybersecurity efforts are often ineffective against these types of attacks, and new, smarter approaches are needed.
    In this webinar we will discuss:
     How the “Panama Papers” and other similar attacks represent a new type of risk
     Where traditional information security approaches often fall short
     Key steps companies can take to protect themselves
  • Applying Records Retention and Deletion to Structured Data
    Applying Records Retention and Deletion to Structured Data Greg Forest, CTO, Contoural Recorded: May 2 2017 59 mins
    Historically, records retention programs have focused on hardcopy paper records in addition to semi structured electronic information like email, and unstructured information such as files and images. Yet surveys indicate that up to 75% of most data reside in structured systems – relational and other types of databases that house application data. These systems contain records, privacy information and other content subject to legal and regulatory requirements. Most organizations, however, rarely apply retention deletion and other governance policies to this structured data, creating both non-compliance and risk.
  • Is It Time for Your Records Retention Schedule to Grow Up and Become Useful
    Is It Time for Your Records Retention Schedule to Grow Up and Become Useful Tom Mighell, VP of Service Delivery, Contoural Inc. Recorded: May 2 2017 60 mins
    We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your information governance foundation. Many organizations consider records retention as something that they have to do, but feel handcuffed because they have no way of enforcing a policy. This webinar covers the different ideas to get your records retention schedule “off the couch” and become something useful to your organization.
  • Files, Files Everywhere, Nor Any to Delete: Quick IG Cleanup Wins
    Files, Files Everywhere, Nor Any to Delete: Quick IG Cleanup Wins Tom Mighell, VP of Service Delivery, Contoural Recorded: May 2 2017 60 mins
    You’ve got a lot of Redundant, Obsolete and Trivial (ROT) files in file shares, desktops, SharePoint and other silos all over the company. There are just too many copies and too much ROT content dragging down your storage systems, making discovery much harder, and making it difficult to comply with your record policies. But while it sounds easy, hitting the delete button can be trickier than it sounds. A smart and quick ROT file deletion project that cleans up your digital house can work to lower costs and reduce risks. In this session we discuss practical and tactical real world approaches to get rid of the ROT both quickly and defensibly.
  • Using Metrics to Measure an Information Governance Program
    Using Metrics to Measure an Information Governance Program Dan Elam, VP and Consultant, Contoural, Inc. Recorded: May 2 2017 56 mins
    Information Governance programs often involve a number of moving parts across an enterprise. But how do you know if your program is working? Likewise, how do you demonstrate to senior management as well as courts and regulators that you have an effective program? Existing frameworks often do little to measure program effectiveness in key areas, and can serve as target benchmarks moving forward. Join Dan Elam from Contoural as we discuss real-world strategies for applying metrics.
  • Applying ROI Models to Information Governance
    Applying ROI Models to Information Governance Dan Elam, VP and Consultant, Contoural, Inc. Recorded: May 2 2017 60 mins
    Before committing to Information Governance programs, many senior executives want to know the bottom-line impact: If we invest in this program how much will we save? What’s the overall return on investment, and how long will it take to achieve it? There is a lot of money to be saved in Information Governance, and increasingly companies are finding that this is not only something they have to do, but also should do to save significant amounts of money. Join us as we discuss developing effective Information Governance ROI models and how to use this information to help sell your program.
  • Pitfalls and Potholes to Avoid in Your eDiscovery Projects
    Pitfalls and Potholes to Avoid in Your eDiscovery Projects Doug Austin and Karen DeSouza, Esq. Recorded: Apr 27 2017 58 mins
    If you’ve conducted discovery for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” could occur that can derail your project. These issues can add considerable cost to your discovery effort through unexpected rework and also cause you to miss important deadlines or even incur the wrath of a judge for not following accepted rules and principles for discovery. This webcast* will discuss some of the most common “pitfalls” and “potholes” that you can encounter during the discovery life cycle and how to address them to keep your discovery project on track.

    Webcast Highlights

    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Ways to Avoid Potential Data Breaches
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Techniques to Increase Review Efficiency and Effectiveness
    + Checklist of Items to Ensure a Smooth and Accurate Production

    Presenters Include:

    
Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, technical project management and software development services to numerous commercial and government clients.

    
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Texas and Florida
  • Best key practices for GDPR and utilizing IncMan™ Incident Response platform
    Best key practices for GDPR and utilizing IncMan™ Incident Response platform Mike Fowler, Vice President, Professional Services and Steve Ditmore, Senior Sales Engineer for DFLabs Recorded: Apr 26 2017 34 mins
    The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.

    Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.

    Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.

    Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:

    •Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
    •Review steps involved in a mitigating and controlling a data breach.
    •Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
    •Enhanced visibility creating a layered approach to information gathering.
    •Incident management including response prioritization.
    •How incident and notification workflows are automatically assigned to an incident.
  • How to Evaluate the Security of an E-Discovery Vendor
    How to Evaluate the Security of an E-Discovery Vendor Gavin Manes, Ph.D., CEO, Avansic; Amy Sellars, Assistant General Counsel, Walmart Recorded: Apr 25 2017 60 mins
    EDRM recently released the EDRM Security Audit Questionnaire, designed to help corporations and law firms evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services. In this webinar, two of the questionnaire’s designers will provide legal, IT, and corporate professionals with practical guidelines for conducting a security audit.

    Presenters will introduce the questionnaire and walk through key benchmarks, weighting, scoring, and best practices for using the questionnaire to evaluate providers. The questionnaire is an Excel-based tool for scoring/assessing the security strengths and weaknesses in any organization. Webinar attendees are encouraged to download and review the Security Audit Questionnaire, available on the EDRM website, prior to the event.

    Speakers will reserve time to answer audience questions about the security audit process. Jim Waldron, director of EDRM, and George Socha, cofounder of EDRM and managing director at BDO, will moderate the session.
  • Strategies for Staying Ahead of Bribery and Corruption Challenges
    Strategies for Staying Ahead of Bribery and Corruption Challenges Kevin Braine and John Arvanitis from Kroll, and Erica Salmon Byrne from Ethisphere Recorded: Apr 19 2017 74 mins
    In this interactive webinar, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.

    Join in the conversation with Kevin Braine, Joe Spinelli and John Arvanitis from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concern over third party and reputation risk.

    All participants will receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
  • Legal Hold Notifications from CloudNine
    Legal Hold Notifications from CloudNine Brian Kelly, Customer Success Manager, CloudNine Recorded: Apr 18 2017 3 mins
    Legal Hold Notifications from CloudNine empower legal and information professionals by enabling them to quickly and comprehensively develop, send, track, and manage legal hold notices to key custodians with the goal of protecting data integrity for potential or current investigations or litigation.

    Delivered as an advanced, integrated, and automated option in CloudNine’s cloud-based, Software-as-a-Service delivered simplified eDiscovery automation software, Legal Hold Notifications improve the ability of legal and compliance teams to implement legal holds by providing them with an intuitive and secure tool for marshaling the data preservation process to reduce ESI related exposure and risk while increasing data and process defensibility. To learn more about Legal Hold Notifications, visit eDiscovery.co.
  • What Every Attorney Should Know About eDiscovery in 2017 (ACEDS Update)
    What Every Attorney Should Know About eDiscovery in 2017 (ACEDS Update) Doug Austin and Karen DeSouza, Esq. Recorded: Apr 13 2017 64 mins
    UPDATED PRESENTATION (ACEDS - April 13, 2017)

    Managing discovery is more complicated and expensive than ever, with more data and documents to manage, new sources and types of data to consider, and changing Federal and State rules. As an attorney, what do you need to know today to stay on top of it all? This CLE-approved* webcast session will cover key terms, rules, duties, and case law to give you the tools and resources necessary to efficiently and effectively meet the challenging discovery obligations that attorneys will face in 2017.

    Webcast Highlights

    + Key Terms
    + Phases of the EDRM
    + Rules Regarding Electronically Stored Information (ESI)
    + Competency Ethical Duties of Attorneys Regarding eDiscovery
    + Top Ten Important Cases in the Evolution of eDiscovery Best Practices
    + Useful Resources for eDiscovery Continued Education

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    *Approved for MCLE in TX and FL
  • How will GDPR Impact Incident Response and Data Breach Management?
    How will GDPR Impact Incident Response and Data Breach Management? Rebecca Herold, President, SIMBUS360 and CEO, The Privacy Professor, and Dario Forte, CEO, and Founder of DFLabs Recorded: Apr 12 2017 62 mins
    Prior to May 2018, global companies operating by any means in the EU are required to be compliant with the new General Data Protection Regulations (GDPR). Non-compliance will result in an expensive alternative compounding the situation with fines, penalties, and legal fees.

    Join Rebecca Herold, President, SIMBUS360 and CEO, The Privacy Professor, and Dario Forte, CEO, and Founder of DFLabs an expert on incident response and data breach management.

    This session will cover key GDPR compliances and how they impact Incident Response and Data Breach Management, wrapping up with a Question & Answer.
    • Understand the 1st steps for personal data protection compliance
    • Anonymizing collected data to protect privacy under GDPR requirements
    • Learn how to broaden Cybersecurity Plans with Incident Response Platform
    • Recommended steps for evaluating requirements for a complete Incident Response management plan
  • EDRM at Duke: What's changed, what's next?
    EDRM at Duke: What's changed, what's next? James Waldron, director, EDRM, and George Socha, co-founder, EDRM Recorded: Apr 4 2017 59 mins
    EDRM has been acquired by Duke Law School’s Center for Judicial Studies. How will this new partnership change EDRM? Where is e-discovery headed in 2017, and how will EDRM maintain and amplify its leadership as a resource for insight and educational tools in e-discovery?

    Join us for this webinar to meet the new EDRM team at Duke Law School and hear from Jim Waldron, director, and George Socha, co-founder, on the future of EDRM at Duke, new priority projects, and e-discovery predictions for 2017.
  • Key eDiscovery Trends and Case Law for 2017
    Key eDiscovery Trends and Case Law for 2017 Doug Austin and Julia Romero Peter, Esq. Recorded: Mar 30 2017 72 mins
    2016 was an important year in eDiscovery.  Did you catch all of the important events and developments that occurred over the course of the year?  If you didn’t, here is your chance to catch up!  This webcast will cover key events, trends, and developments that occurred over the course of last year and how they impact those in the eDiscovery community.  Examples of trends being covered are:

    + Evolution of eDiscovery Technology
    + Privacy Trends in the US and Internationally
    + Key Trends in Cybersecurity and Data Breaches
    + Continued Evolution of Artificial Intelligence in the Legal Space
    + What Happens Every Minute on the Internet
    + Proliferation of Rules Regarding Attorney Technical Competence
    + Important Cases in Technology Assisted Review
    + Key 2015 Federal Rules Changes and How They Impacted Case Law
     
    “Doug Austin’s presentation Key Discovery Trends and Case Law in 2016 at the February meeting of Houston Association of Litigation Support Managers was insightful and thought provoking. The overview of relevant 2016 case law clearly demonstrates how the 2015 changes to the FRCP are directly impacting decisions from the bench.”

    Patti Zerwas, Discovery Project Manager | Haynes and Boone LLP

    Presenters Include:
     
    Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.
     
    Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. At CloudNine she leads the sales team and has extensive experience in information governance, data discovery and legal discovery. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.
  • Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study
    Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Michel Gahard, General Counsel, Nancy Gillespie, Solution Specialist, Microsoft, Niranjan Umarane, GM Product, Icertis Recorded: Mar 23 2017 59 mins
    Join us for this upcoming live webinar to find out how your Contract Lifecycle Management system could be working harder for you. The webinar details Microsoft’s experience in moving from a ‘patchwork’ of third-party and internal solutions, to a scalable, streamlined solution from Icertis.

    About the speakers and what you will learn:

    Michel Gahard, Associate General Counsel & General Manager, Microsoft

    Hear first-hand from Michel about the challenges Microsoft faced and the solutions and implementation best practices they followed for a successful adoption of a NexGen Contract Management system and how implementing the Icertis Contract Management platform resulted in:

    - Increased contract compliance
    - 60% increase in contract speed
    - About 40% decrease in cost

    Niranjan Umarane, General Manager of Product Management, Icertis

    Niranjan will highlight implementation best practices for a large enterprise-wide initiative and discuss what is so unique about the Icertis Contract Management platform, including:

    - Configurable Business Rules Management for a globally dynamic environment
    - NextGen, easy-to-use interface
    - Quickly get up-and-running in 4-5 months
    - Scalability and flexibility based on the cloud-native architecture
  • Contract Management 2020: Out of the Trenches and Into a New Digital Era
    Contract Management 2020: Out of the Trenches and Into a New Digital Era Pierre Mitchell, Chief Research Officer, Spend Matters and Samir Bodas, CEO of Icertis Recorded: Mar 15 2017 33 mins
    Digital transformation is rapidly changing and improving the way we do business. From IT to business operations, essentially every aspect of every industry is being touched and transformed. Enterprise Contract Management and contract management systems are no exception to this rule, and can be complex with different expectations from Product, Legal, Finance, Procurement and Sales – each with specific needs.

    Join this dynamic discussion with Pierre Mitchell, Chief Research Officer, Spend Matters and Samir Bodas, CEO and Co-Founder, Icertis to learn how you can make sense of it all with the right enterprise software and digital tools to meet and exceed today's demands.
  • Best Practices for Effective eDiscovery Searching
    Best Practices for Effective eDiscovery Searching Doug Austin and Karen DeSouza, Esq. Recorded: Feb 28 2017 63 mins
    With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.

    Webcast Highlights

    + Search Fundamentals
    + Considerations Before Searching
    + Mechanisms for Culling Before and After Searching
    + Mechanisms for Improving Recall and Precision
    + Searching Considerations and Challenges
    + Using Sampling for Defensible Searching

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    * Approved in Selected States (To Be Published Prior To Webcast Delivery)
  • eDiscovery and CloudNine: A Complete Demonstration
    eDiscovery and CloudNine: A Complete Demonstration Doug Austin, VP of Ops and Professional Services, CloudNine Recorded: Feb 24 2017 17 mins
    A complete demonstration of CloudNine's SaaS-delivered eDiscovery automation software by industry expert and author Doug Austin. Used extensively by corporations and law firms to simplify legal discovery in litigation, investigations, and audits, CloudNine provides eDiscovery practitioners with a secure platform that enables the upload, review, and production of documents from a fully integrated and automated fourth-generation eDiscovery platform. For a free trial, visit eDiscovery.co.
  • Utilizing Blockchain in Contract Management - Featuring Gartner Research
    Utilizing Blockchain in Contract Management - Featuring Gartner Research Nigel Montgomery Research Director, Gartner and Monish Darda Co-founder and CTO, Icertis Recorded: Feb 22 2017 31 mins
    Contracts are the backbone of an enterprise. Blockchain technology will have important implications when it comes to contract management. Blockchain is becoming a new area of interest, from governments creating secure databases of land titles to consortiums of leading financial institutions working together to design new distributed ledger technologies.

    It is a brave new world and a lot of conversations are going on. Where will it go? What will the impact be? What will blockchain bring to contract management?

    In this webcast, we’ll answer these questions and more with two of the industry’s leading experts: Gartner Research Director, Nigel Montgomery, and Monish Darda, CTO and co-founder of Icertis.

    In the webcast, Nigel and Monish discuss:

    - The opportunity seen by enterprises, working together, to design new distributed ledger technologies

    - What will be the impact of blockhain related technologies?

    - What will blockchain bring to contract management?

    - What can you do now to prepare?
  • What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017
    What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017 Doug Austin, Julia Romero Peter, Esq., Sean Hall and Paul Cobb May 31 2017 5:00 pm UTC 75 mins
    You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.

    Webcast Highlights:

    + The State of Cybersecurity in the U.S. in 2017
    + Top Threats Facing Your Practice
    + Your Responsibility to Your Clients: The High Cost of Data Leaks
    + How to Protect Your Firm and Your Clients
    + Recent Developments in International Data Privacy
    + Criteria for Evaluating Providers in Your eDiscovery Projects
    + Ethics Considerations
    + Looking Forward: The Future of Cybersecurity in the Legal Field

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Sean Hall: Sean is the CEO of Firm Guardian, LLC. Sean has a decade of experience working with emerging start-ups from an executive level creating scalable, profitable businesses.

    Paul Cobb: Paul is the COO for Firm Guardian LLC. Paul is a business leader with twenty years of diverse experience in management, marketing, sales strategy, and operations.

    MCLE Approved in Selected States
  • GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data?
    GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data? FRA’s co-founders; Toby Duthie, Frances McLeod and Greg Mason Jun 7 2017 2:30 pm UTC 75 mins
    With Safe Harbor being invalidated and EU-US Privacy Shield and Swiss-US Privacy Shield yet to be tested, UK data privacy post Brexit an unknown, the General Data Protection Regulation coming into effect throughout the EU next year, and the Trump administration potentially poised to ride roughshod over EU surveillance concerns– the uncertainty surrounding the current regulatory environment will inevitably add complexity to the issue of data transfers, especially in the context of international investigations and disputes – and, by extension eDiscovery.

    As regulatory investigations and related processes frequently span several years, strategic decisions made today around data transfers will have important ramifications down the line.

    Do you know where your/your client’s data currently is hosted and if it is being held in accordance with the various and, at times, conflicting data privacy laws? If the answer is 'no', significant reputation and even financial implications could ensue.

    This GIR Live webinar will break down the current data protection laws and set out some considerations and practical guidelines to minimize risk exposure for companies and professional services firms dealing with cross-border investigations and litigation.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:

    • Data privacy and adequate protection
    • What you can do now to remain compliant
    • How to manage conflicts of law in a global investigation with practical tips from real life case studies