Hi [[ session.user.profile.firstName ]]

e-Discovery

  • 2019 eDiscovery Year in Review
    2019 eDiscovery Year in Review
    Doug Austin and Tom O'Connor Recorded: Dec 11 2019 65 mins
    2019 was a busy year for eDiscovery, cybersecurity and data privacy. In data privacy, we've seen everything from the first significant fines for GDPR and organizations preparing for CCPA to litigation over biometric fingerprint capture. Cybersecurity challenged a lawyer’s notification duty toward data breaches and we’ve seen the American Bar Association question if lawyers are “failing” at cybersecurity. And in eDiscovery, escalating challenges from mobile device preservation lead to inadvertent disclosures of privileged information and #metoo in the workplace. This CLE-approved* webcast reviews key events and trends in 2019 and predictions for 2020, including:

    + How Much Data is Transmitted Every Minute on the Internet in 2019
    + What is a Lawyer's Notification Duty When a Data Breach Occurs
    + General Data Protection Regulation (GDPR) and Data Privacy Fines
    + Biometric Security and Data Privacy Litigation
    + Cell Phone Passwords and the Fifth Amendment
    + How Organizations Are Complying with the California Consumer Privacy Act (CCPA)
    + Social Media and Judges Accepting "Friend" Requests from Litigants
    + How #metoo and Investigations Impact eDiscovery within Organizations
    + Whether Emojis Are the Next eDiscovery Challenge
    + Challenge to Obtain Significant Spoliation Sanctions under Rule 37(e)
    + Are Lawyers "Failing" at Cybersecurity?
    + Outside Hackers vs. Internal Employees As Cybersecurity Threat
    + Sanctions Resulting from Inadvertent Disclosure of Privileged Information

    Presentation Leaders:
    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience in legal technology and is the editor of the CloudNine sponsored eDiscovery Daily blog, a trusted resource for eDiscovery news and analysis.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • If You're Not Reviewing Slack Data, You're Missing Half the Conversation
    If You're Not Reviewing Slack Data, You're Missing Half the Conversation
    David Slarskey, Matthew Dodge, Casey Sullivan Recorded: Dec 5 2019 61 mins
    Slack, the massively popular workplace messaging platform, is changing communications and discovery as we know them. That's because Slack is quickly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.

    Join us for an upcoming webinar on how Slack is changing communications and discovery--and why your discovery and investigations process needs to catch up.

    Register now to learn:

    How Slack is changing discovery and investigations
    Why Slack could hold key data for your case
    The unique challenges Slack data poses
    How creative legal teams are leveraging Slack data during the discovery process
    Best practices for dealing with Slack data, from those who’ve done it

    Featured Presenters:


    David Slarskey
    Founder, Slarskey LLC
    David Slarskey is the founder of Slarskey LLC and an experienced commercial litigator with more than a decade of experience in litigation, trial, arbitration, and appellate practice. He has represented a wide range of individual and corporate clients, including entrepreneurs, large health care and pharmaceutical companies, financial guarantors and hedge funds, real estate developers, media, energy, and international interests. Prior to founding Slarskey LLC, he was Counsel in the litigation department of Patterson Belknap Webb & Tyler LLP, and associated with Friedman Kaplan Seiler & Adelman LLP. For four years running, David Slarskey has been recognized by Super Lawyers as a Rising Star of Business Litigation in the New York Metro Area.

    Matthew Dodge
    Customer Success Manager, Logikcull
    Matt is a seasoned eDiscovery expert and account manager at Logikcull where he helps law firm and enterprise customers implement efficient, defensible, and cost-effective discovery workflows. Before joining Logikcull, he worked as a director for the Association of Certified eDiscovery Specialists, responsible for training and certification for Fortune 500 companies and leading service providers.
  • "LIVE FROM TOKYO with Ricoh- How to Become an eDiscovery Business Partner"
    "LIVE FROM TOKYO with Ricoh- How to Become an eDiscovery Business Partner"
    Ricoh & EDRM- David Greetham, Mary Mack Recorded: Dec 4 2019 48 mins
    Join some of the award-winning Ricoh eDiscovery team LIVE from Japan on eDiscovery Day, as they discuss their transformation from a service provider, to a trusted business partner.
  • EDRM: Hear From the Project Trustees
    EDRM: Hear From the Project Trustees
    George Socha, Mary Mack, Jim Koziol, Derek Duarte,Kelly Atherton,Justin Scranton Recorded: Dec 4 2019 38 mins
    Please join EDRM's Project Trustees as they share exciting updates and resource needs and how to get involved or start a project!
  • Pro Bono and Diversity in the eDiscovery Industry
    Pro Bono and Diversity in the eDiscovery Industry
    Ashish Prasad, Vazantha Meyers, and Todd Haley Recorded: Dec 4 2019 46 mins
    As the eDiscovery industry has grown and matured over the past decade, eDiscovery professionals in corporate legal departments, law firms, and service providers have become more focused on pro bono service and on the promotion of diversity. In this panel, we will outline opportunities for eDiscovery professionals to utilize their skills to serve indigent clients, nonprofit organizations, and government agencies. We will also describe concrete actions that eDiscovery professionals can pursue to promote diversity in their teams and the teams that they work with. This webcast will be of particular interest to professionals having a desire to give back to their communities.

    Webcast Highlights:

    + Defining Pro Bono Service in the eDiscovery Industry
    + Lessons Learned from Leaders in Promoting Diversity in the eDiscovery Industry
    + The Business Case for Pro Bono and Diversity Promotion
    + Challenges to Achieving Greater Diversity and Strategies to Overcome those Challenges

    Presenting Experts:

    + Ashish Prasad

    As VP and GC for HaystackID, Ashish is regarded as among the leading experts on discovery in the US. He has served as Litigation Partner, Founder and Chair of the Mayer Brown LLP Electronic Discovery and Records Management Practice, Founder and CEO of Discovery Services LLC, and VP and GC of eTERA Consulting.

    + Todd Haley

    As VP of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery.

    + Vazantha Meyers, Esq.

    As Director of Review Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.
  • Top eDiscovery Celebrity Cases Mashup
    Top eDiscovery Celebrity Cases Mashup
    David Horrigan with Mary Mack moderating Recorded: Dec 4 2019 60 mins
    Presented by David Horrigan, Relativity with Mary Mack, EDRM moderating
    Description:
    From Taylor Swift to Kevin Spacey, Prince and Tom Brady – celebrities have prompted eDiscovery cases! David Horrigan presents compelling tales of how proper or not so proper handling of ESI and the processes involved with turned the tides favorably or ended up in a hurricane of trouble.
  • #eDiscoveryDay - "EDRM Updates- Top 10 Most Frequently Asked Questions"
    #eDiscoveryDay - "EDRM Updates- Top 10 Most Frequently Asked Questions"
    Mary Mack, Melinda Vaughn, George Socha and Kaylee Walstad Recorded: Dec 4 2019 63 mins
    Mary Mack and Kaylee Walstad of EDRM along with George Socha Co-Founder of the EDRM and Melinda Vaughn of Bolch Judicial Center share everything from Project updates, Vision for EDRM, What's Upcoming and Events, Ways to Plug In and Get Involved and Answer Your Questions!
  • TAR Talk Podcast - Did You Say Two-Faced, or Two-Phased Review?
    TAR Talk Podcast - Did You Say Two-Faced, or Two-Phased Review?
    JohnTredennick, Tom Gricks, Mary Mack Recorded: Nov 20 2019 26 mins
    Did You Say Two-Faced, or Two-Phased Review?

    Sure, TAR will be more efficient than a linear review -- but why stop there? Why not look at ways to make even your TAR review even more efficient. We did. And what we discovered might surprise you.

    Join Tom and John (minus our two faces--that's why we do podcasts) as we talk about this revolutionary new workflow for optimizing a TAR 2.0 review. We will show you why a two-phase TAR protocol will minimize the total cost of review, even if you have to look at some of the documents twice! Two phased? Beats looking at our two faces every day of the week. Get the Tar Talk take on a better way to do your review.
  • Top 10 Ways to Optimize Nuix Discover
    Top 10 Ways to Optimize Nuix Discover
    Emily Tice, Jamie Inghram, JR Jenkins Recorded: Nov 19 2019 49 mins
    Legal teams tasked with eDiscovery are always looking for new ways to go faster and do more for their clients. And Nuix Discover includes many features and settings that allow teams to customize the software so that it meets their unique requirements. From creating rules and templates for processing and review workflows to optimizing the review interface and analytics features, Nuix Discover can leverage the power of process automation to help you standardize your approach to review projects. Please join us for what promises to be a very entertaining and educational session:

    This session will include:
    •Getting the most out of your SaaS, On-Premise and Hybrid deployments
    •How to create a repeatable and predictable approach to ingestion
    •How to use Search Term Families (and why they matter).
    •How to set-up and optimize review workflows
    •How to better collaborate via binders and deep links.
    •Getting the most out of workspaces
    •Click less, code more with Conditional Coding
    •Best practices for tracking review progress (and how to identify problems early)
  • DO’S and DON’TS of a 30(b)(6) Witness Deposition
    DO’S and DON’TS of a 30(b)(6) Witness Deposition
    Doug Austin and Tom O'Connor Recorded: Nov 19 2019 66 mins
    Federal Rule of Civil Procedure 30(b)(6) permits a party to notice or subpoena the deposition of an organization which then must then designate one or more individuals who consent to testify on its behalf about information “known or reasonably available to the organization.” But, how should it be conducted to maximize the discovery obtained, what are some strategies to consider to help ensure a successful deposition and what are some common mistakes to avoid? And, what are some eDiscovery related topics about which a 30(b)(6) witness should be prepared to testify? This CLE-approved* webcast session will discuss the DO'S and DON’TS of preparing for and conducting a 30(b)(6) witness deposition.

    Key topics include:

    + Initial Considerations for 30(b)(6) Witness Depositions
    + Proposed Changes to Rule 30(b)(6)
    + Potential eDiscovery Topics for Your 30(b)(6) Witnesses
    + Common Mistakes in Preparing 30(b)(6) Witnesses
    + Specific Strategies to Consider for 30(b)(6) Witness Depositions
    + Case Study: Example of a Hostile 30(b)(6) Witness Presentation
    + 39 Rules for Corporate 30(b)(6) Witness Depositions

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • EDRM Updates
    EDRM Updates
    Mary Mack, Melinda Vaughn, George Socha and Kaylee Walstad Recorded: Nov 19 2019 64 mins
    Mary Mack and Kaylee Walstad of EDRM along with George Socha Co-Founder of the EDRM and Melinda Vaughn of Bolch Judicial Center share everything from Project updates, Vision for EDRM, What's Upcoming and Events, Ways to Plug In and Get Involved and Answer Your Questions!
  • The Marriage Between SIEM and SOAR
    The Marriage Between SIEM and SOAR
    Mike Fowler, Vice President, Professional Services, DFLabs Recorded: Nov 12 2019 38 mins
    The Marriage Between SIEM and SOAR: Roles and Responsibilities in the Relationship

    With the growing number of tools and technologies being used within security operations to combat the ever-increasing number of security alerts being received, there is still much confusion about what their specific uses and purposes are in order to achieve operational efficiency and effective incident response.

    Many security professionals today still question the difference between (Security Information and Information Management (SIEM) and Security Orchestration, Automation and Response (SOAR) and often ask, “If we have a SIEM tool, do we need SOAR?”

    Although it’s still possible for some SOCs to still function without having a SIEM or SOAR solution in place, many security teams will agree that the success formula is to have both. The amount of security events being generated on a daily basis will likely be a key determining factor for implementing a SIEM tool, and the ability to respond to all of these alerts effectively will likely be a deciding factor when choosing whether to implement a SOAR solution.

    Presented by one of the pioneering leaders within the SOAR market, this webinar will illustrate the functions of SIEM and SOAR, their requirements within SecOps, and how utilizing a SOAR solution can leverage your existing SIEM tool to provide significant value to your security program.

    Key Takeaways
    - The Differences Between SIEM and SOAR
    - The Problems They Can Solve Together
    - The Role of SOAR as an Independent Platform
  • A Look Into the Black Box of eDiscovery Processing
    A Look Into the Black Box of eDiscovery Processing
    Craig Ball, Casey Sullivan Recorded: Nov 6 2019 78 mins
    Does your eDiscovery platform ignore search terms without you knowing? How do your storage options impact proportionality? And just what is a hash value anyway?

    When it comes to eDiscovery processing, what you don't know can hurt you.

    Find out what you could be missing as Logikcull and Craig Ball peer deep into this often-unexamined world.

    Join the hundreds of legal professionals who have registered for this webinar. Sign up to learn:

    - Ethical responsibilities for attorneys and the consequences of not understanding your discovery technology
    - Why most eDiscovery software can’t find ‘e-discovery’
    - Document hashing: what it is and why it matters
    - How the evolution of digital storage has changed discovery
  • Why Technology Matters: A Look at Current Trends and Top eDiscovery Technologies
    Why Technology Matters: A Look at Current Trends and Top eDiscovery Technologies
    Ashish Prasad, Vazantha Meyers, John Wilson, and Todd Haley Recorded: Oct 30 2019 64 mins
    From technologies that now allow lawyers to analyze mobile data in a reviewable format, to Office 365’s continuing growth in litigation management and document processing, to Continuous Active Learning that allows large amounts of data to be reviewed in a significantly shorter time, new eDiscovery technologies are continuing to revolutionize how data and legal discovery professionals manage data. In this expert presentation, HaystackID eDiscovery authorities will discuss which technologies seem to be taking a larger percentage of the eDiscovery market and why these technologies matter, especially to lawyers managing complex matters.

    Webcast Highlights

    + Current Legal Trends that Require the Use of Technology
    + How Leading Technology Helps with Data Management
    + Key Technology Trends that are Making eDiscovery Easier
    + Why Technology Matters

    Presenting Experts:

    + Ashish Prasad

    As VP and GC for HaystackID, Ashish is regarded as among the leading experts on discovery in the US. He has served as Litigation Partner, Founder and Chair of the Mayer Brown LLP Electronic Discovery and Records Management Practice, Founder and CEO of Discovery Services LLC, and VP and GC of eTERA Consulting.

    + John Wilson, ACE, AME, CBE

    As CISO and President of Forensics for HaystackID, John provides security leadership and consulting to help companies address matters related to eDiscovery and computer forensics.

    + Todd Haley

    As VP of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery.

    + Vazantha Meyers, Esq.

    As Director of Review Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.
  • NCSAM Part 4 of 4: Insider threats—do you know what skeletons are in your closet
    NCSAM Part 4 of 4: Insider threats—do you know what skeletons are in your closet
    Amie Taal, CEO & Founder, Stratagem Tech Solutions Limited and Paul Inman, Country Manager, AccessData Recorded: Oct 30 2019 45 mins
    According to the Verizon Data Breach Investigations Report*, insider threat incidents have been on the rise for the past 4 years, with breaches in healthcare taking the number one spot with 60% of breaches tied to inside actors. Whether breaches are intentional or unintentional, they are unlikely to be avoided despite your best efforts.

    Join us on the eve of Halloween to hear from internationally regarded expert, Amie Taal, a former Vice President of Deutsche Bank, who currently helps companies identify and respond to technology incidents, litigation matters, information risk, data privacy issues and more.

    In this interview-style webinar, Ms. Taal will provide some stats and a brief overview of the insider threat landscape and then she will take your questions. Paul Inman, Country Manager for AccessData will moderate and provide insights into appropriate tools and technology that will assist you when investigating breaches.

    We look forward to your participation!


    *Source: https://enterprise.verizon.com/resources/reports/dbir/
  • An Overview of Nuix Discover 10
    An Overview of Nuix Discover 10
    JR Jenkins, Emily Tice Recorded: Oct 29 2019 44 mins
    Nuix Discover 10 provides legal teams with true end-to-end capabilities to manage all facets of eDiscovery with speed and accuracy. From our industry leading, integrated processing engine to revolutionary visual and predictive analytics Nuix Discover scales up and down to help legal teams solve the complex and time-pressured problems of eDiscovery. Join Emily Tice and JR Jenkins as they cover some of the latest, greatest additions to the platform as well as some recently improved features. Topics covered will include:
    •Key new features in Nuix Discover 10
    •What’s new and improved for document reviewers
    •What’s new and improved for case administrators
    •What’s new and improved for portal administrators
    •Support and training updates
  • NCSAM Part 3 of 4: Forensics and Incident Response in the Cloud
    NCSAM Part 3 of 4: Forensics and Incident Response in the Cloud
    Shon Harris, Principal Cloud Architect, AccessData Recorded: Oct 23 2019 31 mins
    Join us for part 3 of our 4-part series for Cybersecurity Awareness Month. In this webinar, we'll dig into forensics and incident response in the cloud. Why should you make the move to the cloud and how can AccessData products enable that transition? We will also discuss a few scenarios that outline why the cloud can be a cost effective and secure way to ensure your investigations are completed as fast as you need, while also ensuring the integrity of your data. Finally, we'll talk about our new RESTful API for forensic response.
  • NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Recorded: Oct 16 2019 28 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • NCSAM Part 1 of 4: After the Attack—Surviving and Thriving Post-Breach
    NCSAM Part 1 of 4: After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Recorded: Oct 9 2019 50 mins
    Join us as we kick off Part 1 of 4 in our Cybersecurity Awareness Month webinar series, with a replay of this informative webinar.

    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • Rescheduled: Understanding CCPA: Preparing for California’s New Privacy Act
    Rescheduled: Understanding CCPA: Preparing for California’s New Privacy Act
    Jessica R. Gross, Data Privacy & Security Attorney, Sheppard Mullin and Melissa Singleton, Account Executive, AccessData Recorded: Oct 2 2019 64 mins
    As spiraling data breach incidents drive heightened privacy concerns, states are turning to the law to help control how organizations handle sensitive consumer data. With the California Consumer Privacy Act (CCPA), California is the first US state to pass a comprehensive new consumer protection law, which will go in to force on January 1, 2020.

    The CCPA includes significant changes to give consumers more control over their personal data, and regulate how organizations can collect and store private information on their customers. And it’s only the beginning – in the wake of CCPA, other states are introducing their own new privacy regulations. With just a few short months until CCPA is in force, organizations should already be taking action now to prepare. But where do you begin?

    During this webinar, co-presented by AccessData and Sheppard Mullins, we’ll discuss everything related to CCPA, including:

    • What the new law means for any organization across the US that is collecting data on California residents
    • Current areas of contention in the law, the current advice on these issues and how new legislative developments are addressing these areas
    • Best practices and tips for enforcing CCPA at your organization
    • How you can leverage technology to manage data privacy
    • And more!

    This activity has been approved for Minimum Continuing Legal Education credit by the State Bar of California. Sheppard Mullin Richter & Hampton LLP certifies that this activity conforms to the standards for approved education activities prescribed by the rules and regulations of the State Bar of California governing minimum continuing legal education.
  • Debunking the Top Ten Myths of Document Review (ILTA Update)
    Debunking the Top Ten Myths of Document Review (ILTA Update)
    Michael Dalewitz Recorded: Sep 25 2019 54 mins
    The review phase of legal discovery consumes almost 70% of each dollar spent on ediscovery. Budgetary constraints routinely are a top concern for ediscovery professionals seeking to more efficiently and cost-effectively plan and conduct document reviews. One of the challenges in developing a plan for a document review is the use of proper assumptions and facts in the planning process. This expert presentation will highlight ten common myths associated with document reviews and present approaches for avoiding planning decisions based on incorrect assumptions and facts.

    In this webinar, we’ll cover topics including:

    Ten of the Most Common Myths Associated with Attorney Document Reviews

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Expert Speaker

    + Michael Dalewitz – President of Review Services (ReviewRight), HaystackID

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.
  • The Evolution of SOAR: Meeting and Exceeding Gartner’s Expectations with DFLabs
    The Evolution of SOAR: Meeting and Exceeding Gartner’s Expectations with DFLabs
    Mike Fowler - VP of Professional Services, DFLabs, and John Moran - Senior Product Manager, DFLabs Recorded: Sep 24 2019 50 mins
    Security Orchestration, Automation and Response (SOAR) today is more than simply a buzzword. For many organizations, it is becoming a primary focus for their SOCs and/or CSIRTs as a solution for addressing the numerous daily security operations challenges they face, as well as a means to improve their operational effectiveness and efficiency, and more importantly their incident response capabilities.

    The evolution of SOAR is in full motion, moving from the product funneling stage to now seeing the strongest vendors and solutions continue to evolve their SOAR capabilities, while others fall by the wayside or get swallowed up by larger companies.

    Watch this webinar to learn about the evolution of SOAR, what a SOAR solution should include according to Gartner, and how DFLabs and its innovative and award-winning IncMan SOAR platform meets and exceeds Gartner’s SOAR criteria, and the industry's evolving expectations with its unique features and capabilities.

    Key Takeaways:

    - Unravel the key customer pain points, challenges and evolving expectations
    - Discover the key requirements a SOAR solution must meet
    - Review Gartner’s recommendations when implementing a full SOAR solution
    - Examine how DFLabs meets and exceeds Gartner’s SOAR criteria
    - And more
  • Thinking Like a Millennial in eDiscovery
    Thinking Like a Millennial in eDiscovery
    Doug Austin and Tom O'Connor Recorded: Sep 18 2019 62 mins
    eDiscovery isn’t just about emails and Office documents anymore. Newer sources of electronically stored information (ESI) and newer devices from which those sources are accessed are causing an explosion of data volumes and a proliferation of data sources that is unprecedented. And, millennials’ use of technology is a primary driver in the proliferation of these newer sources and devices, changing the paradigm of where potentially responsive ESI may need to be identified, preserved and collected. This CLE-approved* webcast session will discuss how evolving technology trends are impacting eDiscovery today and how to think like a millennial to stay on top of those developing trends. Key topics include:

    + Understanding Millennials and How They Differ from Previous Generations
    + Drivers for Millennials’ Thinking Today
    + How Litigation Support and eDiscovery Has Evolved Over the Years
    + Challenges Posed by BIG Data and Variety of Data Sources
    + Ethical Duties and Rules for Understanding Technology
    + Impact of Millennials on Legal Technology and eDiscovery
    + Your Clients May Have More ESI Than You Think
    + Recommendations for Addressing Today and Future Technology Challenges

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • The California Consumer Privacy Act: Preparing for the CCPA
    The California Consumer Privacy Act: Preparing for the CCPA
    Eric Goldman, Emily Yu, Christian Auty, and Casey Sullivan Recorded: Sep 11 2019 70 mins
    Some of the greatest discovery challenges today aren’t arising from litigation, but from a new regime of privacy laws. The latest—and in some ways most challenging—of those laws is the California Consumer Privacy Act, or CCPA.

    For organizations with even slight connections to California, and for those law firms advising them, the CCPA can create pressing new obstacles for compliance and data access.

    Join Logikcull and an expert-packed panel for an upcoming webinar on the CCPA, the responsibilities it creates, and strategies to reduce the burden of compliance.

    Featuring:
    Eric Goldman, Professor, Santa Clara University School of Law
    Emily Yu, Privacy, Policy and Compliance Director, Roblox
    Christian Auty, Counsel, Bryan Cave Leighton Paisner LLP
  • IncMan SOAR: Developing Next-Generation Security Operations
    IncMan SOAR: Developing Next-Generation Security Operations
    John Moran - Senior Product Manager, DFLabs and Heather Hixon - Senior Solutions Architect, DFLabs Recorded: Sep 5 2019 57 mins
    Efficiency and effectiveness are key when it comes to security operations and incident response in terms of both humans and the tools being used. Having the ability to identify and investigate alerts, reduce false positives and respond to the threats that need action in the fastest possible time frame is crucial.

    With increasing numbers of cyber attacks affecting today’s organizations, security analysts are continuously bogged down with a seemingly never-ending stream of alerts that need to be investigated. At DFLabs we believe security teams shouldn't have to sift through this plethora of alerts, wasting precious time and effort with mundane and repetitive tasks to gather the important information they need to identify if the threat is legitimate or a false positive, before then responding to those that need further action in order to be mitigated.

    By utilizing a sophisticated Security Orchestration, Automation and Response (SOAR) solution, such as IncMan SOAR from DFLabs, providing end-to-end incident management with customizable systems and flexibility, automated incident response, dual mode orchestration and more, security operations teams are able to respond more effectively to all alerts, freeing up valuable analyst time which can be used to proactively investigate and hunt for more complex threats.

    Join this webinar to learn what SOAR really is, the key benefits it has to offer, the pain points it can help to resolve, as well as how the unique features and capabilities of DFLabs’ solution can transform your security operations and incident response programs regardless of their size or maturity to keep up with the next-generation cyber attacks affecting our organizations.


    Key Takeaways:

    - The Key Components of SOAR
    - SecOps Challenges SOAR Can Solve
    - The DFLabs Difference
    - An Insight into IncMan SOAR in Action
  • New Data Types and eDiscovery: From Social Media and Slack to the Cloud
    New Data Types and eDiscovery: From Social Media and Slack to the Cloud
    Michael Sarlo and John Wilson Jan 15 2020 5:00 pm UTC 75 mins
    While the collection phase of legal discovery only consumes between 8-12% of each dollar spent on eDiscovery, it is increasingly becoming the most critical and complex task in the eDiscovery lifecycle based on the accelerating introduction of new data types along with new input and storage technologies. From the expanding universe of social media applications such as Twitter and Tic-Tok to modern productivity tools ranging from Slack to Office 365, eDiscovery professionals continually are challenged with identifying and understanding new types of data. In this expert presentation, computer forensics and eDiscovery authorities Michael Sarlo and John Wilson will share an overview of critical considerations, proven protocols, and best practices for discovering and dealing with new types of data. Presentation highlights include:

    Emerging Types of Data

    + GSuite: Collection, Processing, and Review Considerations
    + O365: Collection, Processing, and Review Considerations
    + Slack and Other Web-Based Collaboration Platforms: Fundamentals and Collection Considerations

    Web-Based Collections

    + Considering APIs: Definition and Description
    + Two Major Methods of Cloud Collection: Data+Metadata and Web Imaging
    + From Calculable Websites to Stealth Collections

    Expert Speakers

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael Sarlo is a Partner and Executive Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.

    + John Wilson, ACE, AME, CBE

    As Chief Information Security Officer and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and information technology veteran with more than two decades of experience working with the US Government and both public and private companies.