Just when corporations began to stabilize their IT services, an explosion of new technologies emerge--economically compelling, but presenting general counsel with new legal complexities. This program outlines key strategies for managing the legal risks of doing business “in the cloud” as privacy and e-discovery collide with “unified communications“, VoIP, email-to-voice mail, etc.
E-discovery presents new challenges when discovery procedures collide against legal privacy requirements and the increased use of cloud computing solutions. Learn what these challenges are, and emerging business and technology solutions for achieving compliance
E-Discovery is creating enormous new forces upon limited corporate resources, yet vendors, law firms and consultants continue to resist delivering functional, responsive solutions to the real problems inside companies. This provocative keynote reveals 10 critical truths regarding the current market, and how companies must respond in order to truly gain control of their organizations and their information.
Unified communications challenge companies to navigate an increasing portfolio of laws governing content, monitoring and interception of communications and accessing stored records. Courts are also challenging the use of effective security on new UC solutions. Learn more in this valuable webcast.
E-Discovery is proving to be the litmus test for evaluating whether IT governance is actually working. Learn the critical questions that e-discovery requires to be answered, and how to leverage e-discovery to launch and improve IT governance projects and programs.
Security professionals are squarely on the firing line as courts increasingly demand that digital evidence--including e-mail--be authentic and reliable in order to be admitted into the court. THIS PROGRAM HAS BEEN RESCHEDULED FROM FEBRUARY 10 DUE TO PERSONAL ILLNESS.
Echelon One CEO Bob West interviews Jeffrey Ritter, Esq., the author of a new book on the critical e-discovery questions, and uncovers the critical defensive strategies to be employed.
Until now, no tools have emerged that allow lawyers, IT professionals, records managers and e-discovery specialists to literally see their challenges--and plan their success! THIS BROADCAST IS BEING RESCHEDULED TO FEB. 20 DUE TO PERSONAL ILLNESS
This webcast introduces the CastleQuest Discovery Maps and how they are being used to transform the strategies and battle plans of today's e-discovery challenges.
Learn from Jeffrey Ritter, the creator of the CastleQuest Discovery Library, 10 winning strategies for how the CastleQuest Maps can deliver the path forward.
Understanding the critical business impacts of e-discovery is vital -- this program enables information security professionals to learn how to show new value for their programs and reduce e-discovery risks.
As the pressure for organizations to become PCI compliant increases, there are a number of common myths and mistakes around this process.
Brian Serra, Accuvant’s PCI Program Manager, will identify these myths and mistakes and how to address them.
Topics of discussion include:
• Understanding the 12 major requirements
• The complexity of PCI compliance
• The enforcement of PCI compliance
• PCI policy and standards requirements
• Significant control sets
Based on the nationally recognized best-seller, this program surveys the critical importance of evaluating the e-discovery capabilities of outside law firms and the economic risks of making the wrong choice. 13 key topics to investigate through dialogue and competitive bidding are reviewed. Extensive audience questions are encouraged!
Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.
In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.
Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:
Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.
Three reasons why you join us on July 15
1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
“Shift Left”- A New Age of eDiscovery – Analytics and ECA
Sponsored by LexisNexis
More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:
· Strategies on performing an ECA risk/benefit analysis;
· A new way of thinking: employing analytics in ECA?
· How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?
In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.
Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.
* M. James Daley, Senior Counsel, Seyfarth Shaw LLP
* Emily R. Fedeles, Associate, BakerHostetler
* Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.
Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations
Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.
In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.
* William F. Auther, Partner, Bowman and Brooke LLP
* Melinda L. McLellan, Counsel, BakerHostetler
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:
Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.
* Krista Fuller, Director of Product Management, LexisNexis
* Ryan Bilbrey, Managing Director, OmniVere
* George Socha, Co-Founder, EDRM
* Tom Gelbmann, Co-Founder, EDRM
Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?
Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.