Hi [[ session.user.profile.firstName ]]

e-Discovery

  • The Lawyer's Guide to Slack Discovery
    The Lawyer's Guide to Slack Discovery Michael Simon, David Slarskey, and others Recorded: Oct 16 2018 63 mins
    Slack, the massively popular file sharing and messaging platform, is changing communications and discovery as we know them. That's because Slack, and similar tools, are fastly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.

    Join this webinar for a dive into how Slack is changing communications and discovery--and how you can take advantage of this new source of data.

    Register now to learn:
    - How Slack is changing discovery and investigations
    - Why Slack could hold key data for your case
    - The unique challenges Slack data poses
    - How creative legal teams are leveraging Slack data during the discovery process
    - Best practices for dealing with Slack data and overcoming objections, from those who’ve done it
  • How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology
    How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology Mike Fowler, CISSP, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs, Recorded: Oct 16 2018 52 mins
    Increased workload coupled with an industry-wide shortage of skilled responders is a common challenge heavily impacting operational performance in Security Operations Centers globally. An integral part of the solution is formulating a methodology to ensure that crucial knowledge is held and transferred between incident responders at all levels and overall retained within the organization.

    By utilizing Security Orchestration, Automation and Response (SOAR) technology, security teams can combine traditional methods of knowledge transfer with more modern techniques and technologies by incorporating machine learning and artificial intelligence capabilities.

    Join this webinar to learn about the benefits of implementing a SOAR solution, such as IncMan SOAR from DFLabs, and see how we can help to ensure that your organization’s knowledge is consistently and accurately retained, used and transferred, while simultaneously contributing to the efficiency and effectiveness of your entire incident response process.

    Key Takeaways:

    - The benefits of using SOAR technology
    - How to overcome the shortage of skilled security operations staff
    - How security orchestration and automation can facilitate knowledge transfer
    - How a SOAR solution can improve your overall security program performance
  • Debunking the Top Ten Myths of Document Review
    Debunking the Top Ten Myths of Document Review Michael Dalewitz, President (ReviewRight) Recorded: Oct 3 2018 62 mins
    Representing the largest expenditure in the eDiscovery task continuum, the review phase of legal discovery consumes almost 70% of each dollar spent on eDiscovery. Understanding budgetary constraints routinely are a top concern for eDiscovery professionals, legal departments and law firms are continually seeking ways to become more time effective and cost efficient during document reviews. But are these professionals making sourcing decisions based on facts or assumptions? This expert presentation will highlight ten of the most common myths associated with attorney document reviews and present approaches for avoiding decisions based on myths.

    Key Presentation Topics Include:

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Presentation Leader: Michael Dalewitz

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model. He created one of the industry’s first managed document review models and developed the first document review metrics tracking software.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION Waterford Technologies Recorded: Oct 3 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • CloudNine Training Snapshot: Concordance Desktop Updating Image Bases
    CloudNine Training Snapshot: Concordance Desktop Updating Image Bases Travis Ballenger, Solutions Consultant Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of the process required to update an image base within Concordance Desktop.

    Some of the various ways in which to update a Concordance Desktop image base are renaming media paths and folders, editing or deleting media keys and calculating and updating the page count for an image base. Use Concordance Desktop’s Image Base Management feature to accomplish each of these tasks.
  • CloudNine Electronic Discovery Loader Settings Overview
    CloudNine Electronic Discovery Loader Settings Overview Terry Leang, CloudNine Solutions Consultant Recorded: Oct 1 2018 8 mins
    An overview of the configurable settings in the LAW PreDiscovery Electronic Discovery Loader, that are specific to the type of source you’re importing. Based on policies and project specifications, the settings tab is used to determine how specific file types will be handled during the import process, such as extracting the contents of an archive or detecting duplicate files, as well as how the files will be organized in the folder view of LAW PreDiscovery.
  • Law Prediscovery Electronic Discovery Loader
    Law Prediscovery Electronic Discovery Loader Terry Leang, CloudNine Solutions Architect Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of an introduction to the LAW PreDiscovery Electronic Discovery Loader.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES Waterford Technologies Recorded: Oct 1 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • Drone Forensics
    Drone Forensics Rob Attoe, CEO, Spyder Forensics Recorded: Sep 28 2018 63 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • Preparing for Litigation Before it Happens
    Preparing for Litigation Before it Happens Doug Austin and Tom O'Connor Recorded: Sep 26 2018 62 mins
    Information Governance (IG) has always been part of the eDiscovery landscape and it has always been important for reducing the population of potentially responsive electronically stored information (ESI) that might be subject to litigation by helping organizations adopt best practices for keeping their information “house in order”. But now with an increased concentration on the two-fold concerns of privacy and security, IG has become more important than ever. This CLE-approved* webcast will explore the implementation of Information Governance best practices to help organizations better prepare for litigation before it happens. Topics include:

    + Minority Report: Pre-Case for Litigation Avoidance
    + What Information Governance is and What it Isn't
    + General Principles for Information Governance
    + Who Uses Information Governance?
    + IG Considerations and Issues
    + Basic Information Governance Solutions
    + Information Governance vs. Analytics
    + How Privacy/Security Has Impacted the Importance of an IG Program
    + Recommendations for Implementing an IG Program

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach EDRM and AccessData Recorded: Sep 25 2018 57 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades Leila Szwarc & Paola Fonseca TMF Group and Yoab Bitran, LRN Recorded: Sep 25 2018 61 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Recorded: Sep 25 2018 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Recorded: Sep 25 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES Waterford Technologies Recorded: Sep 19 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • WATERFORD TECHNOLOGIES | OVERVIEW
    WATERFORD TECHNOLOGIES | OVERVIEW Waterford Technologies Recorded: Sep 19 2018 2 mins
    Waterford Technologies are experts in Compliance Technology and Unstructured Data (Email & File) Management. We enable organisations to achieve a clear overview of their data, enabling informed business decisions to prepare for legislation such as GDPR and MiFID II. We simplify data oversight by providing cutting edge technology and unlimited unrivalled support.
  • Email and File Compliance Solution for GDPR
    Email and File Compliance Solution for GDPR Waterford Technologies Recorded: Sep 19 2018 3 mins
    ComplyKEY from Waterford Technologies has been developed to help organizations address their unstructured Email and File Data to meet new compliance regulations such as GDPR.

    Talk to us today about how our Data Management experts can help your compliance needs.

    https://www.waterfordtechnologies.com...

    Call us today for a FREE Data Strategy Review
    EMEA: +353 (0) 51 334 967
    UK: 0845 378 0935
    USA: +1 (949) 428 9300
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION Waterford Technologies Recorded: Sep 19 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • eDiscovery Dirty Tricks (And How to Defeat Them)
    eDiscovery Dirty Tricks (And How to Defeat Them) Michael Simon, Brian Wolfinger, Moneet Kohli, & Rebecca Rakoski Recorded: Sep 18 2018 64 mins
    Join a panel of experts as they identify some of the most common underhanded eDiscovery tricks and teach you what you can do to defeat them.

    Document dumps, questionable denials of custody and control, meritless objections—when it comes to eDiscovery, your opposing counsel may have a few dirty tricks up his sleeve.

    Attend the webinar and learn to how to counter common situations such as:
    - When a party produces everything plus the kitchen sink
    - When counsel wields proportionality as both a shield and a sword
    - When attorneys play games with privilege claims
    - And many more!

    Featured Presenters:

    Brian Wolfinger: Chief Technology Officer at Everest Technologies, Brian Wolfinger has decades of experience in the worlds of digital forensics and electronic discovery, as founder of Wolfinger Forensics, former CISO and VP of Technology at LDiscovery, and Manager of the Emergency Response Services at ISS.

    Rebecca Rakoski: Rebecca Rakoski is the co-founder and managing partner at XPAN Law Group, a boutique law firm focusing exclusively on cybersecurity and data privacy. She is an expert on the intersection of technology and legal obligations and liabilities and has extensive experience in cybersecurity standards and guidelines.

    Moneet Kohli: An attorney and seasoned eDiscovery expert, Moneet Kohli helps legal professionals implement, manage, and simplify eDiscovery, as Senior Customer Success Manager at Logikcull. In the past, Moneet managed eDiscovery projects at multiple AmLaw 100 firms and corporations throughout the United States. She also serves as San Francisco's Chapter Director of Women in eDiscovery.

    Michael Simon: Michael Simon is an attorney and consultant with over 15 years of experience in the eDiscovery industry, during which he’s seen more than his fair share of dirty tricks. Principal at Seventh Samurai and adjunct professor of law, he regularly writes and presents on pressing eDiscovery issues throughout the country.
  • Corporate compliance in Latin America: main challenges and opportunities
    Corporate compliance in Latin America: main challenges and opportunities Leila Szwarc & Paola Fonseca, TMF Group and Yoab Bitran, LRN Recorded: Sep 18 2018 61 mins
    Meeting the global challenge of evolving corporate compliance.

    Issues to be discussed include:

    1.An overview of the Compliance Complexity Index 2018 (CCI 2018) - Key global trends and the most and least complex countries.

    2. Insights about the main challenges in Latin America:
    - Which are the most complex countries in the Americas (from CCI 2018)
    - Compliance and main regulatory developments in Latin America

    3. How companies should prepare to meet these challenges
  • You've been breached: now what?
    You've been breached: now what? Keith Lockhart, VP Strategic Programs, Access Data Recorded: Sep 14 2018 30 mins
    Do you know where to begin if your organization is impacted by a breach? Learn about best practices for post-breach analysis and response.
  • How to Evaluate & Improve Your E-Discovery Process
    How to Evaluate & Improve Your E-Discovery Process EDRM and Exterro Recorded: Sep 13 2018 63 mins
    No two e-discovery processes are alike. But that doesn’t mean there aren’t universal principles and tools to evaluate and take steps to improve your e-discovery processes.

    Register for this webinar and learn from three e-discovery practitioners about how they have assessed and mended gaps in their e-discovery processes, including:
    -Tips and tools for evaluating your own e-discovery process
    -How to get buy-in across departments for real change
    -Learn more about what mature e-discovery operations look like
  • Aviation Law News European Drone Law
    Aviation Law News European Drone Law Airbus, Bird & Bird, Monard Law, LS Lexjus Sinacta, DLA Piper Recorded: Sep 13 2018 64 mins
    Recent months have seen the European Parliament back EU-wide safety regulations and registries for drones, which could mean large fines for manufacturers and operators, as well as recommendations by the European Aviation Safety Agency for new rules on the use of electronic identification systems and geo-awareness technology in drones.

    Against this backdrop, our panel will provide detailed insight on the current legislative state of play, taking in such topics as the transition from national to EU-wide drone laws; the timeline and implementation of the new regulations; practical challenges for regulators; and the categorisation and certification requirements for drones.

    Panellists will also examine related issues for drone users and regulators – including insurance, liability and privacy – as well as looking to what developments we can expect in the future.
  • Being Future Ready in a Transformative Digital Economy
    Being Future Ready in a Transformative Digital Economy Doug Rybacki, Chief Product Officer, Conga & Sheryl Kingstone, Research Director, 451 Research Oct 23 2018 5:00 pm UTC 48 mins
    In today’s digital economy, companies are competing for customers like never before as price and product are no longer the only drivers of business. The value of delivering an engaging customer experience is on the rise, and businesses are increasingly turning to software and digitized processes to accommodate this trend. In fact, 80 percent of businesses are either planning or formally engaged in digital transformation initiatives to improve their overall customer experience.

    Join us to understand:

    -The importance of Digital Transformation
    -Why businesses must respond to the pace of change
    -The tools for Digital Transformation success
  • Cybersecurity and Your Ethical Duties
    Cybersecurity and Your Ethical Duties Eli Wald and Casey Sullivan Oct 25 2018 6:00 pm UTC 60 mins
    In the eyes of cybercriminals, legal professionals are an easy—and lucrative—target. Law firms are often a one-stop shop for incredibly sensitive information and you might not be doing enough to protect the data in your possession.

    So if a breach occurs, what potential ethics violations may result? Join us for an upcoming webinar as we delve into this question.

    Watch to learn:
    + How not to get hacked and how to respond when you do
    + Where professional responsibility and cybersecurity intersect
    + What steps attorneys must take to protect client data
    + How the "reasonableness" of cybersecurity protections is determined
    And more!

    Featuring Eli Wald, Professor, Sturm College of Law

    A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli was one of the first academics to investigate the ethical implications of law firm cybersecurity, or, as he terms it, “legal ethics’ next frontier.”

    A frequent author and speaker on ethics and professional responsibility, his work has appeared in leading journals such as the Fordham, Stanford, University of Colorado and Wisconsin law reviews, and the Georgetown Journal of Legal Ethics. Eli’s articles have also been cited in ABA ethics opinions and excerpted in legal ethics casebooks.
  • Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations
    Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations Dr Nick Sharples Oct 30 2018 11:00 am UTC 45 mins
    Our latest release is designed to give eDiscovery professionals, legal operations, lawyers, investigators, information governance professionals, and law enforcement additional freedom and functionality to automate and simplify their workflows.

    Users will find it easier to add, organize, and share information within and across cases, incorporate social media into investigations, and load and process files with additional data inputs, bulk load capabilities, and workflow templates.
  • Using Threat Intelligence Effectively in Security Automation and Orchestration
    Using Threat Intelligence Effectively in Security Automation and Orchestration John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Oct 30 2018 3:00 pm UTC 60 mins
    Using Threat Intelligence Effectively in Security Automation and Orchestration: A DFLabs and Cisco Use Case.

    Actionable intelligence is critical to responding efficiently and effectively to a potential security incident. Inaccurate or incomplete intelligence can lead to threats dwelling on the network, resulting in increased financial losses and irreparable damage to reputation. Once a threat has been discovered, decisive action must be taken to contain the threat.

    Cisco’s suite of detection, intelligence and response products, including Email Security Appliance, Threat Grid, Umbrella and Umbrella Investigate; offer security practitioners an unparalleled suite of tools, to address all phases of the incident response lifecycle.

    Combining the vast capabilities of Cisco’s suite of security products, with the orchestration and automation power of DFLabs’ IncMan SOAR platform, allows organizations to respond to potential security incidents, with unmatched speed and accuracy.

    Key Takeaways:

    · How Cisco’s suite of security products can improve your security infrastructure
    · How IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    · How Cisco security products combined with IncMan SOAR from DFLabs can automatically respond to threats

    Presented by:
    John Moran, Senior Product Manager, DFLabs
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security
    Michael Auger, Senior Security Solutions Architect, Cisco Security

    Your registration information will be shared with DFLabs’ solution partner Cisco Security, who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Get a “Clue” Regarding Your eDiscovery Process
    Get a “Clue” Regarding Your eDiscovery Process Doug Austin, Tom O'Connor, and Mike Quartararo Oct 31 2018 5:00 pm UTC 75 mins
    As evidenced by some high-profile recent eDiscovery disasters, managing eDiscovery projects is more complex than ever. Not only have the volume and variability of ESI data sources increased dramatically, but there are often more stakeholders in eDiscovery projects today than characters on the board game Clue©. Successful eDiscovery today means not only meeting your obligations, but also making sure that each stakeholder in the process succeeds as well. This CLE-approved* webcast will discuss the various participants in the eDiscovery process, what motivates each of them, and best practices on how to avoid becoming the next high-profile eDiscovery disaster. Topics include:

    + The Process: Managing the Project from Initiation to Close
    + The Phases: Managing the Flow of ESI Before and During the Process
    + The Players: Goals and Objectives of Each eDiscovery Stakeholder
    + Whodunnit?: Lessons Learned from a Large Financial Institution’s Mistakes
    + Whodunnit?: Lessons Learned from a Government Entity’s Mistakes
    + Whodunnit?: Lessons Learned from a Medical Center’s Mistakes
    + Recommendations for Avoiding Your Own Mistakes
    + Resources for More Information

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    Mike Quartararo is the founder and managing director of eDPM Advisory Services. He is also the author of the 2016 book Project Management in Electronic Discovery, the only book to merge project management principles and best practices in electronic discovery.
  • The New World of AI - Powered Contracts
    The New World of AI - Powered Contracts Tim Cummins, IACCM President and Jason Gabbard, Head of AI, Conga Nov 6 2018 6:00 pm UTC 55 mins
    Contract management is an area that is ripe for innovation and digital transformation. Often contracting processes are bureaucratic, burdensome, and a major source of delays. Yet new technological solutions are emerging quickly, affording the opportunity for AI to manage much of the process, while freeing up people—contract management staff—to focus on more strategic tasks.

    Are you prepared for the pace of change?

    Join us live to hear from IACCM President Tim Cummins and Conga Head of AI Jason Gabbard while they chat about:

    -The essential documents and contracts to automate.
    -Driving compliance across departments and increasing collaboration.
    -Boosting efficiency by reducing errors with key AI technology and Machine Learning.
  • Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain
    Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain John Wilson, ACE, AME, CBE Nov 7 2018 5:00 pm UTC 75 mins
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Etherium, today's legal professional is behind the proverbial power curve if they do not have a basic understanding of emerging cryptocurrency and blockchain technologies. As these emerging technologies are rapidly moving from proof of concept projects to formal systems of record, it is only a matter of time until almost anyone involved in the business of law or the law of business is confronted with a situation involving these highly publicized technologies.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both blockchains and cryptocurrencies to arm attendees with essential information that will help them understand these technologies that are changing the landscape of business and law.

    Key Presentation Topics Include:

    + Understanding Cryptocurrencies
    + Why Cryptocurrencies Have Value
    + How Cryptocurrencies Work
    + Understanding Blockchain
    + Why Blockchain Is A Foundational Technology
    + How Blockchain Works
    + Use Cases for Blockchain as a Legal Technology
    + eDiscovery Considerations for Cryptocurrencies and Blockchain

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.
  • Nuix Ringtail demonstration: removing doubt from your discovery process
    Nuix Ringtail demonstration: removing doubt from your discovery process Christina Mather, Solutions Consultant, Nuix Nov 12 2018 2:00 pm UTC 45 mins
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain John Wilson, ACE, AME, CBE Dec 4 2018 5:00 pm UTC 75 mins
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as part of data discovery and legal discovery processes.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both cryptocurrencies and blockchains and provide attendees with fundamental information that will help them understand how to examine and investigate these technologies and the electronically stored information that results from their usage.

    Key Presentation Topics Include:

    + Quick Review: Cryptocurrencies and Blockchain
    + Crime, Cryptocurrencies, and Blockchain
    + Investigating Cryptocurrencies and Blockchain
    + The Physical Scene
    + The Digital Scene
    + Forensic Evidence
    + Following Transaction Trails
    + Investigation Intelligence

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.