In my more than 20 years in this specialised field I have found that the greater majority of cases that are compromised, tend to be damaged as a result of the First Responder's choices and actions. As you know electronic evidence and the discovery of it (e-discovery) is often transient, easily
In my more than 20 years in this specialised field I have found that the greater majority of cases that are compromised, tend to be damaged as a result of the First Responder's choices and actions. As you know electronic evidence and the discovery of it (e-discovery) is often transient, easily obliterated or compromised, and devilishly hard to appreciate for the uninitiated. You never have an e-discovery expert when you need one and business must go on. The result is usually an uphill battle for the e-discovery expert when they are finally brought in.
As this Scene of Crime is often the first that is known about the problem and the discoverer is rarely able to adequately deal with the issues at hand.
In my webcast I would like to guide the participants through the process and around the pitfalls so that more choices are available to the victims and the quality of the evidence is preserved.
RecordedDec 10 2009
Your place is confirmed, we'll send you email reminders
When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.
* M. James Daley, Senior Counsel, Seyfarth Shaw LLP
* Emily R. Fedeles, Associate, BakerHostetler
* Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations
Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.
In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.
* William F. Auther, Partner, Bowman and Brooke LLP
* Melinda L. McLellan, Counsel, BakerHostetler
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:
Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.
* Krista Fuller, Director of Product Management, LexisNexis
* Ryan Bilbrey, Managing Director, OmniVere
* George Socha, Co-Founder, EDRM
* Tom Gelbmann, Co-Founder, EDRM
Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?
Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.
Discovery has moved from the time of paper, to the on-premise era, and now to the cloud age. Join our speakers as they discuss the attributes of true e-discovery cloud solutions; compare the benefits and shortcomings of cloud versus more traditional approaches; and help corporate personnel understand how to catch that waving, moving their e-discovery to true cloud solutions.
* Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems
* Jeremy Schaper, Chief Technology Officer, BlueStar Case Solutions
* Barry C. O’Melia, Chief Operations Officer, Digital WarRoom
George Socha, Co-Founder, EDRM
Tom Gelbmann, Co-Founder, EDRM
Discover what attorneys and litigation support managers are high-fiving about. They’re excited about Thomson Reuters’ new, and dare to say revolutionary ediscovery platform: eDiscovery Point. A new ediscovery platform that allows users simultaneously upload and process data; access that data within minutes; achieve accurate search results within seconds of performing a complex search query; as well as several other time and costs saving functionalities like advanced data analysis and predictive coding. Attend this webinar to see how eDiscovery Point will make ediscovery easier for you.
The protection of your organization's trade secrets, collected PII data, and confidential matters are your top priority. The same is an attractive asset for thousands of hackers around the world looking to profit or gain a competitive advantage that could damage the integrity and success of your organization’s objectives.
In this webinar, join three seasoned cybersecurity experts as they present the trends in cyberespionage and discuss:
• What makes organizations vulnerable to cyberespionage
• Why cyberespionage activity can vary across industries based on hacking drivers
• How a combined security approach that focuses not just on external threat actors but also privileged insiders can help identify spying activity in the enterprise
It’s universally accepted that technology assisted review (TAR) speeds review and reduces costs, but many attorneys are still loathe to use it. In the eDJ Group’s recently released 2015 PC-TAR survey, nearly 40% of respondents say they are using TAR less than 5% of the time on their cases. While a majority of respondents say they have tried it, it’s clear that TAR hasn’t crossed the chasm as a go to tool for the legal community yet. Join Greg Buckles, eDJ co-founder and Tammy Doss, VP of Business Operations at Ipro, as they dig into what the survey and interview findings show for analytics and TAR usage and trends as we move into 2016.
Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.
Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.
While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.
How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?
Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
Everything you do is case driven, deadlines are everything and end user experience with data whether it’s uploading or analyzing is critical. All of these things mean the business value of data is in constant flux, but data storage treat all data equally forcing you to choose between staying in budget or meeting end user service level expectations. Join Chris McCall, SVP Marketing of NexGen Storage to discuss new value-driven data management capabilities designed to help Legal Service IT providers deliver a best-in-class end user experience.
Antonio Rega, Managing Director, FTI Consulting; Scott Giordano, Esq. Corporate Technology Counsel, Exterro
The status of employees constantly changes within an organization. They go on leave, move to new positions/locations, take assignments with different business units or subsidiaries, or depart the organization altogether. Annually organizations will have 12-15% of their workforce leave their company. While employee movements are a routine element of modern business life, they take on critical significance in the context of e-discovery, where failing to properly track employees can very easily result in data spoliation and severe sanctions.
In this webcast, e-discovery experts will discuss:
- The legal ramifications of data that is deleted as a result of employees leaving or changing roles at an organization
- The proper workflows/protocols to prevent employee data from being deleted
- Importance of briefing new employees of existing legal hold obligations
- How technology can aid in preventing unwanted data deletion (a short demonstration of Exterro Fusion® will be provided)
Edwin Lee, Esq., Alvarez & Marsal; Michael Gibbons, Alvarez & Marsal; Scott Giordano, Esq., Exterro
Organizations collect data related to legal matters for a myriad of reasons, from conducting internal audits to meeting litigation/regulatory obligations to responding to serious criminal allegations. Many IT professionals falsely conflate data collection with the process of creating a bitstream image – or exact bit-by-bit copy – of a targeted data repository, creating unnecessary costs for IT and legal. In reality, each collection scenario comes with a specific set of requirements that should dictate how the data is handled and ultimately extracted.
In this webcast, legal and forensic experts will look at different types of data collections and explore the methods and technologies that support each one. They will also offer best practices for bolstering cross-departmental collaboration so that collection projects don’t place too much strain on IT resources.
Dave Packer, Director of Product Marketing, Druva; Neil Etheridge, Vice President of Product Marketing, Recommind
The dramatic shift towards mobile devices in the enterprise means that everyone today is in some form a mobile worker. Along with this comes the startling statistic that nearly 30% of enterprise data is being solely stored on these devices, decreasing visibility and increasing company data risks. When an impending litigation happens, will you know how to collect and preserve your mobile data? How will you manage this data through the handoff to processing and review without compromising data integrity? With eDiscovery costs continuing to rise, getting on top of your mobile data will be key to lowering expenses and keeping ahead of data risks.
In this session you will hear about:
- How the new frontier of mobility is altering approaches to data governance
- New ways to extend enterprise visibility to data, without disrupting productivity
- The technologies and partnerships forging to address eDiscovery for mobile data
Weisen Li, Sr. Business Development Manager, Box; Roger Angarita, Sr. Product Management, Guidance Software
Corporations around the globe are adopting cloud solutions as a secure way to store and share information. At the same time, their legal and IT departments are challenged to develop a comprehensive e-discovery strategy for ongoing litigation, arbitration, and internal regulatory investigations.
In this one-hour webinar, Guidance Software and Box® team up to present the integration that enables streamlined, defensible discovery of ESI stored on Box with EnCase® eDiscovery. The webinar will cover:
-Goals and requirements for secure cloud storage
-Complexities associated with e-discovery collection from the cloud
-How to deploy an EnCase eDiscovery/Box integrated solution
-A case study on an organizations currently using this integrated solution
Calvin Zito, Storage and Social Media Expert, HP; David Scott, SVP and GM HP Storage; Jason Buffington, Sr Analyst, ESG
In a recent report, 39% of storage professionals said that data backup and recovery is a business challenge and 27% said it is a top IT priority. As the volume, variety, and velocity of data growth continues, legacy Backup, Recovery and Archiving (BURA) solutions are failing to keep pace.
As the cost and complexity of protecting data continues to rise, more data is at risk. Join @HPStorage Guy Calvin Zito and a panel of experts as they discuss how BURA must be transformed to fit the New Style of IT.
Chad Thibodeau, Director of Alliances, Cleversafe; Sebastian Zangaro, Storage Architect, HP
Big data is not only changing the way organizations store data but archive it as well. Attend this webinar to learn:
- how big data is driving requirements for big archives
- how SNIA and CDMI supports a standardized interface for cloud storage
- how to best deploy and implement a big data archive with cloud storage providers
- why using public cloud storage providers can result in tremendous cost savings, while ensuring security and availability
Mark L. Olsen, Senior Product Marketing Manager, Symantec
Join us to learn how Symantec can help with archiving and eDiscovery cloud initiatives. Depending on your strategic IT initiatives, Symantec can offer your organization either cloud based or on-premise solutions to meet your archiving and eDiscovery requirements. Learn about the options available to you from Amazon.com and Symantec to meet these important challenges with solutions from the #1 archiving and eDiscovery vendor.
Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:
* What’s the ideal reporting structure?
* Are CIOs an endangered species?
* How is IT perceived by CXOs and the business units?
* What and who drive technology innovation?
* How do new technologies impact the evolving relationship?
Register now – and bring questions for our panelists to address during the Q&A.
With over 4 million users worldwide, Adobe EchoSign is the leading electronic signature provider, delivering efficiency and security to your the signing process for any document, contract or form. For operations such as finance, HR or legal, EchoSign enables streamlined operations, and for sales EchoSign offers accelerated revenue acquisition and improved customer satisfaction. See how EchoSign has transformed brand name companies from all industries - Aetna, Cigna, Facebook, Google, Time Warner Cable -- as well as thousands of small and medium businesses.
Barry Murphy, Co-Founder & Principal Analyst, eDiscoveryJournal & David Bayer, Dir. eDiscovery Solutions Marketing, Autonomy
When confronted with fast-moving, large complex matters, or a series of internal investigations, the corporate legal department must move quickly to identify and collect potentially relevant information, assess the company’s position and attendant risks, and if required proceed to a cost-effective document review.
This webinar will explore how organizations can leverage proactive governance policies and analytics-based early case assessment capabilities to take better control of discovery. Attorneys must efficiently identify, collect and process large volumes of information, slice and dice the data set to assess the merits, potential liabilities and costs of a matter, and filter the reviewable document set to minimize the cost of document review. And document review itself needs to leverage advanced technologies and methodologies to drive efficient and high-productivity review.
In this webinar attendees will learn:
• How to leverage information governance policies to drive efficient early case assessment
• How a meaning-based computing platform intelligently integrates data from disparate sources to help minimize risk and reduce costs
• How to use different analytical technologies to accelerate legal decision-making
• How archives and legal repositories can efficiently manage large data volumes and multiple data formats while accelerating data identification and collection for fast-moving investigations
• How an integrated, unified discovery platform can facilitate collaboration between Legal, IT, Compliance, and Records Management
Bridget Charles, Information Management, HP & Josef Elliott, Managing Director, Oyster IMS
You create it and store it. You manage it and retrieve it. You buy it and sell it. Information is the fuel that drives your business: it’s one of your greatest assets. But it can also be a liability. Having a records management solution in place, that spans electronic records and emails as well as physical records helps all organizations to not only reduce the risks they are exposed to, but to improve staff productivity while managing their records consistently and efficiently.
Why does this matter? Well, not least because of the frequency with which poor information management and bad record-keeping practices are cited by regulators such as the FSA in the prosecution of their member firms. And not only that but the Information Commissioner now has the power to fine any business up to £500,000 in relation to poor information management practices – and the fines have already begun. Having a consistent, relevant and compliant records and information management infrastructure can not only mitigate these risks but also help improve process quality, increase efficiency and recognize significant cost savings at an operational level.
But with real concerns on how to seamlessly (and consistently) integrate data from multiple sources and how to ensure that this data is integrated and embedded into business process, organizations are often confused as to how they can move towards an infrastructure-led approach to managing all corporate information.
Attend this Webinar and you will hear:
• How to plan and implement an RM solution that spans physical and electronic records
• The steps to take to ensure a solution that has the ability to provide consistent, organization-wide RM
• How other organizations have embraced RM to provide real business benefits
Eric J. Sinrod; Partner, Duane Morris & Co-Host of TechLaw10 Podcasts
The target of discovery in civil litigation now is electronic data. The failure to respond effectively to electronic discovery demands can lead to significant monetary sanctions, adverse case results, and even jail time. The failure to have one’s electronic discovery house in order can mean that efforts to respond to electronic discovery demands can be extremely burdensome and expensive as repeat fire drills. This presentation will explain the current state of the law and technology when it comes to electronic discovery and will provide guidance on how best to effectively handle electronic discovery in civil litigation to minimize expense and to optimize case results.
Sharon D. Nelson; Esq. and John W. Simek; Sensei Enterprises Inc., President and Vice President
The use of social media evidence in electronic discovery has escalated dramatically in the last year. There are indeed “nuggets of gold” in social media evidence, but you don’t necessarily mine them without peril. There’s a way to do it correctly and a way to get yourself in trouble, perhaps by inadvertently doing something unethical or perhaps by simply not knowing how to obtain the evidence appropriately. Our experts will discuss the role of the Electronic Communications Privacy Act and the Stored Communications Act in dealing with social media evidence and they will also help you understand when to go to the social media provider and when to go to the user to procure your evidence. Case law is new in this area, but recent cases are instructive, and this session will discuss a few of the most noteworthy cases.
Browning E. Marean; DLA Piper LLP (US) & William Kellermann; Wilson Sonsini Goodrich & Rosati
A litigation hold is a process used by companies to advise their employees of pending or anticipated litigation and of their obligation to preserve relevant records . Recent case law and changes to Federal and State rules highlight the critical importance of these litigation holds. This webinar will focus on the design, implementation and maintenance of effective holds, all steps in avoiding evidence spoliation and foreclosing the possibility of punitive sanctions.
Robert Bond, Partner, Speechly Bircham (UK);
Julie Lewis, President, CEO and Founder, Digital Mountain (US);
James Moeskops, Managing Director, Legal Support Services, Millnet International (UK
Katey Wood, Research Associate, Information Management, the 451 Group
•How to take a strategic approach to developing and enacting defensible retention policies and litigation hold procedures
•How to efficiently implement retention/destruction policies and litigation holds using archives and automated data identification and collection technologies
•How to quickly identify potentially relevant discovery and compliance data with early case assessment technology that works hand-in-hand with custodian repositories, collection mechanisms and automated policies
•How to provide outside counsel secure access to the review data set in an easy-to-use, scalable, hosted review platform that supports multiple matters, multiple project teams and automated workflow to accelerate review.
hiFred is Associate Director of Consulting for Iron Mountain Digital. In this capacity, he advises corporations and law firms on electronic discovery process creation, risk mitigation, and litigation and regulatory readiness related to information management and complex eDiscovery challenges. To prepare for litigation and regulatory needs, Fred works with clients to develop and implement programs designed to promote efficient, effective and defensible litigation response and eDiscovery best practices.
Prior to joining Iron Mountain Digital, Fred was Senior Counsel for Repligen Corporation, a publicly-traded biopharmaceutical company, concentrating on the development of novel therapeutics for neurological disorders. As in-house counsel for Repligen, Fred handled several patent and commercial disputes of significant consequence for the Company. Most recently, Fred worked with and oversaw outside counsel on two large patent lawsuits that both resulted in highly successful settlements for Repligen. In the course of those and other litigations, Fred developed and managed all aspects of Repligen’s litigation readiness and eDiscovery program.
The risks associated with spoliation of evidence are causing organizations everywhere to examine their procedures for evidence preservation. This seminar will offer step by step guidance for instituting and maintaining effective legal holds. Participants will gain a timely foundation for policy changes through the review of recent court decisions.
Sean Regan; Symantec, Director of Product Marketing, Information Management
Join this session to learn how one organization responded to an E-Discovery request in 20 minutes while dramatically reducing costs. Hear how a sound information management strategy can help organizations delete with confidence and discover efficiently. Topics covered include, backup, archiving, e-discovery, review and export.
David Stevens; Carnegie Mellon University, Storage Manager/Team Lead
Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe. With the update to the Federal Rules of Civil Procedure (FRCP) a storage professional now has even more pressure to potentially know the content inside those files. This session helps the storage professional understand the changes to the Federal Rules of Civil Procedure (FRCP). We will also look at an e-Discovery request from the perspective of a storage professional. Finally, we will provide some recommendations on how to prepare for an e-Discovery request.