Hi [[ session.user.profile.firstName ]]

e-Discovery

  • eDiscovery Dirty Tricks (And How to Defeat Them)
    eDiscovery Dirty Tricks (And How to Defeat Them) Michael Simon, Brian Wolfinger, Moneet Kohli, & Rebecca Rakoski Recorded: Sep 18 2018 64 mins
    Join a panel of experts as they identify some of the most common underhanded eDiscovery tricks and teach you what you can do to defeat them.

    Document dumps, questionable denials of custody and control, meritless objections—when it comes to eDiscovery, your opposing counsel may have a few dirty tricks up his sleeve.

    Attend the webinar and learn to how to counter common situations such as:
    - When a party produces everything plus the kitchen sink
    - When counsel wields proportionality as both a shield and a sword
    - When attorneys play games with privilege claims
    - And many more!

    Featured Presenters:

    Brian Wolfinger: Chief Technology Officer at Everest Technologies, Brian Wolfinger has decades of experience in the worlds of digital forensics and electronic discovery, as founder of Wolfinger Forensics, former CISO and VP of Technology at LDiscovery, and Manager of the Emergency Response Services at ISS.

    Rebecca Rakoski: Rebecca Rakoski is the co-founder and managing partner at XPAN Law Group, a boutique law firm focusing exclusively on cybersecurity and data privacy. She is an expert on the intersection of technology and legal obligations and liabilities and has extensive experience in cybersecurity standards and guidelines.

    Moneet Kohli: An attorney and seasoned eDiscovery expert, Moneet Kohli helps legal professionals implement, manage, and simplify eDiscovery, as Senior Customer Success Manager at Logikcull. In the past, Moneet managed eDiscovery projects at multiple AmLaw 100 firms and corporations throughout the United States. She also serves as San Francisco's Chapter Director of Women in eDiscovery.

    Michael Simon: Michael Simon is an attorney and consultant with over 15 years of experience in the eDiscovery industry, during which he’s seen more than his fair share of dirty tricks. Principal at Seventh Samurai and adjunct professor of law, he regularly writes and presents on pressing eDiscovery issues throughout the country.
  • Corporate compliance in Latin America: main challenges and opportunities
    Corporate compliance in Latin America: main challenges and opportunities Leila Szwarc & Paola Fonseca, TMF Group and Yoab Bitran, LRN Recorded: Sep 18 2018 61 mins
    Meeting the global challenge of evolving corporate compliance.

    Issues to be discussed include:

    1.An overview of the Compliance Complexity Index 2018 (CCI 2018) - Key global trends and the most and least complex countries.

    2. Insights about the main challenges in Latin America:
    - Which are the most complex countries in the Americas (from CCI 2018)
    - Compliance and main regulatory developments in Latin America

    3. How companies should prepare to meet these challenges
  • You've been breached: now what?
    You've been breached: now what? Keith Lockhart, VP Strategic Programs, Access Data Recorded: Sep 14 2018 30 mins
    Do you know where to begin if your organization is impacted by a breach? Learn about best practices for post-breach analysis and response.
  • How to Evaluate & Improve Your E-Discovery Process
    How to Evaluate & Improve Your E-Discovery Process EDRM and Exterro Recorded: Sep 13 2018 63 mins
    No two e-discovery processes are alike. But that doesn’t mean there aren’t universal principles and tools to evaluate and take steps to improve your e-discovery processes.

    Register for this webinar and learn from three e-discovery practitioners about how they have assessed and mended gaps in their e-discovery processes, including:
    -Tips and tools for evaluating your own e-discovery process
    -How to get buy-in across departments for real change
    -Learn more about what mature e-discovery operations look like
  • Aviation Law News European Drone Law
    Aviation Law News European Drone Law Airbus, Bird & Bird, Monard Law, LS Lexjus Sinacta, DLA Piper Recorded: Sep 13 2018 64 mins
    Recent months have seen the European Parliament back EU-wide safety regulations and registries for drones, which could mean large fines for manufacturers and operators, as well as recommendations by the European Aviation Safety Agency for new rules on the use of electronic identification systems and geo-awareness technology in drones.

    Against this backdrop, our panel will provide detailed insight on the current legislative state of play, taking in such topics as the transition from national to EU-wide drone laws; the timeline and implementation of the new regulations; practical challenges for regulators; and the categorisation and certification requirements for drones.

    Panellists will also examine related issues for drone users and regulators – including insurance, liability and privacy – as well as looking to what developments we can expect in the future.

    Our world-class panel will be made up of:

    - Airbus in-house counsel Vincent Barbaud and Jaime Garcia-Nieto;
    - Bird & Bird of counsel Simon Phippard in London;
    - Monard Law partner Birgitta Van Itterbeek in Brussels;
    - LS Lexjus Sinacta partner Anna Masutti in Bologna; and
    - DLA Piper senior associate Camille Lallemand in Paris.
  • Seven Steps to Effective Regulatory Response
    Seven Steps to Effective Regulatory Response EDRM and Zapproved Recorded: Sep 5 2018 60 mins
    Learn the seven steps to effective regulatory response and be prepared to respond quickly to ensure compliance.

    Regulatory agencies such as the SEC and CFTC can initiate an investigation into business activity at any time, bringing challenges beyond those of typical ediscovery. Regulatory investigations often relate to unclear charges, make broad and sweeping data requests under unrealistically tight timelines, and bear severe consequences for noncompliance. Organizations need to be prepared to identify, preserve, and analyze relevant information rapidly and accurately.

    In this webinar, Zapproved will discuss seven clear, actionable steps to launch a successful regulatory response. These steps start with strategizing and preserving data before moving into assessing information, negotiating the terms of the request, creating privilege logs, and keeping the lines of communication open.

    Any organization subject to regulatory oversight could be investigated at any time. Prepare today so you can face tomorrow with confidence.
  • Theft of Trade Secrets - Forensics Best Practices
    Theft of Trade Secrets - Forensics Best Practices Dylan Wiseman, Esq. (Buchalter) and Michael Sarlo (HaystackID) Recorded: Sep 5 2018 74 mins
    Attorneys and in-house counsel need to be aware of how best to respond to the potential for loss of control of protected and trade secret information in the face of the departure of employees who may have had access to such information. Time is of the essence, but the methodology and process controls governing the forensic preservation and collection of at-risk information is critical to mounting a valid response.

    This expert presentation will cover the best practices for counsel to adopt in working to identify and forensically preserve and collect data in a sound, defensible manner. The presentation also will educate legal professionals as to the essential categories of evidence that can be recovered from smartphones and how these categories can be leveraged in not only a defensive manner but also an offensive manner in civil litigation.

    Key Presentation Topics Include:

    + Defining Trade Secrets
    + Trade Secret Violations and Theft
    + Defining When Should One Reasonably Panic
    + The Importance of Defining Wins Upfront
    + Steps to Identify Custodians of Potential Evidence
    + The Anatomy of an Investigation
    + Reasonable Forensic Analysis Triage
    + Addressing Privacy Concerns

    Presentation Experts:

    + Dylan W. Wiseman, Esq. (Buchalter)

    Based in California, Dylan is a Shareholder with Buchalter. His practice focuses upon intellectual property protection including representing employers in cases involving trade secrets, unfair competition, employee mobility disputes, non-solicitation disputes, social media, workplace privacy, BYOD devices, and eDiscovery.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA (HaystackID)

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • Digital Transformation Series Part 2: Sales Insights
    Digital Transformation Series Part 2: Sales Insights Justin Mongroo VP, Worldwide Sales Excellence at Conga, Seth Marr Demand Generation Coordinator at Conga Recorded: Aug 30 2018 30 mins
    For our 3-part webinar series on Digital Tranformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why Sales professionals should have Digital Transformation on their radar as we discuss:

    - Removing manual administrative tasks through automation
    - How to leverage data and insights to remain competitive
    - Empowering your team with better tools to remove productivity roadblocks
  • Digital Transformation Series Part 1: Legal Insights
    Digital Transformation Series Part 1: Legal Insights Mark Fowler, VP General Counsel at Conga Recorded: Aug 30 2018 42 mins
    For our 3-part webinar series on Digital Tranformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why Legal professionals should have Digital Transformation on their radar as we discuss:

    - The importance of business contracts
    - How bringing efficiency to contracting processes can greatly impact the organization's bottom line
    - The need for legal departments to maximize their efficiencies and automate whenever possible
  • Litigate or Settle? Info You Need to Make Case Decisions
    Litigate or Settle? Info You Need to Make Case Decisions Doug Austin and Tom O'Connor Recorded: Aug 29 2018 65 mins
    People say that fewer and fewer cases go to trial these days. Is that true. Regardless of whether it is or not, what information do you need to know to make an informed decision whether or not to litigate or settle the case and how do you gather that information? This CLE-approved* webcast will discuss how litigation has evolved over the years, how that impacts discovery and what you need to know to decide on the best course of action for each case. Topics include:

    + How Litigation Has Evolved
    + The Importance of Deciding Correctly
    + eDiscovery Considerations
    + Covering Your Bases While You Decide
    + Benefits of Early Data Analysis
    + How Much Each GB Can Cost You
    + Why Number of GBs Isn't All You Need to Know
    + Why You Should Test Searches Before Meet and Confer
    + Other Tips and Tricks to Know for a Successful Outcome

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Dreamforce Panel: How to Dreamforce
    Dreamforce Panel: How to Dreamforce Peter Terhune, Salesforce Evangelist at Conga, Katy Engebretson Partnership Alliances & Sales Operations Manager at Penrod Recorded: Aug 29 2018 30 mins
    Join us to learn how to get the most out of your time at Dreamforce! With 200,000+ attendees, 3,000+ educational sessions, and countless parties, the week can be a lot to tackle.

    Hear from Dreamforce vets and Salesforce MVPs their experiences identifying:

    - Can't-miss breakout sessions
    - Top social events and parties
    - Networking opportunities
  • Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues
    Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues Panelists: Matt Kelly, CEO of Radical Compliance; Catherine Castaldo, Global Chief Privacy Officer, Nuance Communications; Zo Recorded: Aug 29 2018 55 mins
    Emerging privacy issues are coming your way—are you prepared for all the change? Europe’s General Data Protection Regulation will impose significant new duties of risk assessment, data protection, breach response, and much more on companies around the world. Join us for a webinar focused on the potential impact of GDPR coming into force next spring, and how to prepare. Panelists discuss how these obligations will affect companies’ information risk management efforts, and how prepared your business needs to be for these compliance burdens coming soon.
  • Session 2 Managing Internal Investigations Swamped with Data
    Session 2 Managing Internal Investigations Swamped with Data Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Mark Antalik, Managing Director, BDO's Forensic Tec Recorded: Aug 28 2018 58 mins
    Digital forensics is critical to today’s internal investigations swamped in data. How prepared are you to manage the task? Hear panelists discuss strategies and techniques for internal investigations where data forensics is critical. They’ll answer questions such as how a company can police against insider threats, and how BYOD policy management can satisfy modern corporate life and modern information risk. They’ll also share pitfalls to avoid so companies won’t inadvertently jeopardize privacy or IP rights (their own or someone else’s) during investigations.
  • New Horizons in Data and Litigation
    New Horizons in Data and Litigation Christopher J. Adams, Martha K. Louks, and Michael Simon Recorded: Aug 28 2018 62 mins
    The amount of data available to legal professionals is expanding at a mind-boggling pace. Over 2.5 exabytes, or 75 trillion pages’ worth, of data is generated every day. And much of it isn’t the email inboxes and Office documents attorneys are used to dealing with.

    From chat messages, to IoT data, to ephemeral communications, tomorrow’s case-dispositive data can take nearly any shape.

    Join us for this webinar as we explore the ways novel data sources are reshaping the future of discovery and litigation. Topics to be covered include:

    -- Mobile data: Does BYOD, BYOA and BOYC all add up to Bring Your Own Nightmare?
    -- Redefining TL;DR with ephemeral messaging
    -- Welcome to your quantified life. BTW, it’s all discoverable
    -- The IoT isn’t SciFi. It’s here now and it’s also all discoverable

    It’s an educational, action- and acronym-packed hour you don’t want to miss.
  • Session 1 Information Risk and Compliance in the Digital Age
    Session 1 Information Risk and Compliance in the Digital Age Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Debra Farber, Privacy Consultant and former Sr. Dir Recorded: Aug 28 2018 55 mins
    Is your IT team driving information risk strategy, or is it being driven by new technology used across your organization? How do you divide and conquer risk and data governance across disparate teams and tools? How do you define information risk? In this webinar, speakers will answer these questions and more as they explore the modern challenges of information risk, and the oversight systems necessary for the enterprise-wide management of it. They’ll share insights and best practices on how to strike the balance between instituting protective measures, responding to threats and providing assurances that risk is under control.
  • New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4
    New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4 Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs Recorded: Aug 28 2018 50 mins
    Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs

    Aug 28 2018
    10:00 EDT / 15:00 BST

    The latest release of DFLabs IncMan SOAR platform v4.4 includes a range of additional and enhanced features and capabilities including:

    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - Enhanced flexibility of runbooks
    - And more...

    Join this webinar to get this unique opportunity to take a look at the new and improved IncMan SOAR platform and see first-hand one of the most exciting new features and first of its kind capability, START (Simple Triage And Rapid Treatment) Triage, in action.

    START Triage aims to dramatically reduce the number of security incidents generated from alerts and is being used in production by a major European bank to eliminate manual first line assessment of suspected fraudulent online transactions. IncMan SOAR has reduced triage time by 90% for cyber fraud events generated by its mainframe and other external systems. The flexible, open and customizable architecture of IncMan SOAR’s START Triage allows it to adapt to virtually any use case and data source, including network alerts, endpoint alerts, transaction fraud alerts, physical security events and threat intelligence alerts.
  • Leverage Your SIEM Solution Utilizing SOAR Technology
    Leverage Your SIEM Solution Utilizing SOAR Technology Mike Fowler, VP of Professional Services at DFLabs; Christian Have, Chief Product Officer at LogPoint Recorded: Aug 14 2018 43 mins
    Empower your security analysts to accelerate detection and response of cyber incidents by combining the power of SIEM and SOAR.

    Based on a new joint solution from DFLabs and LogPoint resulting from their deep two-way integration, join this webinar to see how two security operations tools can work seamlessly together fusing intelligence to improve the overall effectiveness and operational performance of your existing security program.

    While a SIEM solution delivers tons of valuable information about the security status of your IT system, a SOAR solution uses this information to automate the response needed to incoming cyber threats. Combining the two will free up valuable time and resources in any security program and make for faster, smarter detection, response, and remediation of potential incidents.

    Learn how to:

    · Respond to all security alerts
    · Automate repeatable, mundane tasks
    · Orchestrate actions across multiple security tools
    · Enrich raw data, allowing for more informed, effective decisions
    · Reduce the mean time to detection and response
    · Increase the ROI on existing security operations tools
  • Avoid Surprising Litigation Discoveries–Leveraging Tech for Complex Litigation
    Avoid Surprising Litigation Discoveries–Leveraging Tech for Complex Litigation EDRM and TCDI Recorded: Aug 7 2018 61 mins
    Complex Litigation management is no easy task and managing the growing amounts of data from different teams can seem impossible. Does your case management tool help you manage multiple cases in one dashboard? Are you able to visualize all of your data at once and create clear and persuasive charts and graphs to tell your story? Are you able to keep your law firms from duplicating efforts?

    Register for this webinar to learn how you can leverage the latest technology to link case profiles, contacts, calendar items, transcripts, exhibits, pleadings and other litigation materials together for one-click access. The panel of experts will share strategies for simplifying complex litigation management and multi-case data in one central repository to reduce time, effort and cost for all legal teams involved.
  • Mobile Device Forensics and Beyond: The New Frontier
    Mobile Device Forensics and Beyond: The New Frontier Michael Sarlo - EnCE, CBE, CCLO, RCA, CCPA Recorded: Aug 1 2018 69 mins
    With mobile phones and tablets now ubiquitous in the modern workplace, attorneys and litigation support professionals need to be prepared to forensically preserve these robust digital repositories, extract information from them, and produce extracted information in a way that displays evidence true to its original format. This expert presentation will cover best practices for handling a mobile device at the outset of a matter, provide a framework for working with custodians to ensure a smooth forensic collection process, and highlight the differences between different forensic extraction types and how they affect data retrieval.

    Key Presentation Topics Include:

    + New Matter Intake Questions and Considerations
    + Tracking Devices and Users
    + Data Types and Forensic Extractions
    + Android and iOS Considerations
    + Challenges and Solutions: Review, Production, and PII
    + Cellebrite-Relativity Integrator

    Presentation Leader: Michael Sarlo - EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.

    Michael is fluent in a wide variety of digital forensic, ECA, e-Discovery processing and hosting technologies in addition to the IT infrastructure associated with deploying and administering such tools. He is also a frequent speaker on digital forensics best practices, GDPR issues, ESI treatment methodologies, and cost containment strategies for working with massive volumes of data.

    Michael is an expert witness and holds certifications around several forensic tools including Cellebrite, EnCase, and BlackLight. He is also a Relativity Certified Administrator (RCA).
  • Inside BDO’s eDiscovery & Beyond Survey: Lessons for Inside Counsel and Law Firm
    Inside BDO’s eDiscovery & Beyond Survey: Lessons for Inside Counsel and Law Firm EDRM and BDO Recorded: Jul 31 2018 61 mins
    BDO’s fourth annual Inside E-Discovery & Beyond survey examines the opinions and insights of more than 100 senior in-house counsel about changes in their approaches to e-discovery and other data and information related topics. In an interactive session with George Socha (EDRM Co-Founder and BDO Managing Director) along with other guests, this inside look at our survey will examine:

    •Why technophobic lawyers are an endangered species
    •How effective use of experienced personnel and advanced technologies can prevent e-discovery from being a profit drain
    •How GDPR and other data privacy rules and regulations affect e-discovery
    •Realigning your needs and e-discovery practices
  • Intelligent Automation for Financial Services
    Intelligent Automation for Financial Services Jason Gabrieli Investor Coach at HFM Investment Advisors, Dominic Ionadi Salesforce Consultant, Kimber Spradlin VP, Cogna Recorded: Jul 31 2018 58 mins
    Financial Services is built on customer service, strong client relationships and trust. However, financial professionals are spending hours each week on manual, administrative tasks that could be better spent serving their clients.

    Watch to learn the modern challenges faced by financial services professionals and how automation technology is disrupting the industry by shifting time from document generation to client relationships while keeping client information safe, secure and reducing human error.

    Hear stories from two industry experts who transformed their business processes with intelligent automation.
  • Key eDiscovery Case Law Review for First Half of 2018
    Key eDiscovery Case Law Review for First Half of 2018 Doug Austin and Tom O'Connor Recorded: Jul 25 2018 61 mins
    Legal precedents set by past case law decisions remain one of the best ways to guide lawyers on how to do their job, especially when it relates to eDiscovery best practices. Case law examples help lawyers avoid mistakes made by others, as well as saving time and money for their clients. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2018 to enable lawyers to learn from these cases. Key topics include:

    + Is there a template for how parties should cooperate in a Technology Assisted document review?
    + Should a plaintiff be allowed to email all defendant employees to see if they have responsive documents?
    + Will fabrication of text messages result in sanctions post Rule 37(e)?
    + Can Twitter be compelled to produce direct messages between their own employees?
    + Can an individual be compelled to produce private Facebook photos by the opposing party?
    + How have proportionality considerations in the 2015 Federal rules affected scope of discovery?
    + Should a receiving party be granted a quick peek at privileged documents to resolve privilege disputes?
    + Should border searches of electronic devices require a warrant?
    + Can you be sanctioned for discovery violations even after a jury verdict?

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. 

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Scaling for the future: Evolving your intelligence-driven digital investigations
    Scaling for the future: Evolving your intelligence-driven digital investigations Stuart Clarke, Global Head of Security & Intelligence Recorded: Jul 23 2018 49 mins
    Investigative teams are under increasing pressure to respond to challenges caused by greater volumes of data and a more diverse range of digital devices.

    Key facts are often spread across multiple evidence sources, making it difficult to understand the bigger picture and often requiring an investigator to manually correlate their findings and identify connections. This places an increasing burden on overstretched teams, who need to respond faster and with more accuracy.

    Join Stuart Clarke, Global Head Security & Intelligence at Nuix who will introduce collaborative and intelligence driven investigations that can augment human investigative skills and expose the hidden relationships across people, objects, locations and events.

    Key takeaways:

    • Learn how a single pane of glass can help expose hidden relationships in the data
    • Understand the importance of efficient workflows that can make best use of technology
    • Find out how the latest technology can augment your investigative teams to enable you to make timely and informed decisions

    The presenter: Stuart Clarke, Global Head of Security & Intelligence Solutions

    Stuart is an internationally respected information security expert who is responsible for the overall security and intelligence strategy and delivery at Nuix. During his time at the company, Stuart has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams. He led the development of Nuix Investigation & Response, an innovative investigative tool used to delve into the causes and scope of data breaches.
  • Anatomy of a Hack: Learning From Successful Law Firm Cyberattacks
    Anatomy of a Hack: Learning From Successful Law Firm Cyberattacks Jake Bernstein, Eli Wald, Kip Boyle Recorded: Jul 18 2018 61 mins
    Law firms are increasingly a high-value target for hackers, a “one stop shop” for sensitive data. And as dozen of examples show, the hackers are often successful. How do these cybercriminals infiltrate law firms and what can be done to prevent them?

    Join our panel of experts as they dissect the anatomy of a successful law firm cyberattack and explain how you can protect yourself, and your clients, from a similar fate.

    Attend this webinar to learn:
    -Why hackers are increasingly targeting legal professionals
    -What vulnerabilities make law firms easy prey for hackers
    -The ethical implications of law firm cybersecurity
    -How to protect yourself, your clients, and your data

    Featuring:
    - Jake Bernstein: An attorney with Newman Du Wors, Jake Bernstein’s practice focuses on counseling clients on cybersecurity issues. A former Washington State Assistant Attorney General and a frequent speaker and advisor on cybersecurity legal issues, Bernstein has significant experience with regulatory compliance, privacy, and cybersecurity law.

    - Eli Wald: A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli Wald was one of the first academics to investigate the ethical implications of law firm cybersecurity. A frequent author and speaker on ethics and professional responsibility, his work has been cited in ABA ethics opinions and excerpted in legal ethics casebooks.

    - Kip Boyle: A 20-year information security expert and founder of Cyber Risk Opportunities, Kip Boyle advises global companies in the logistics, technology and financial services industries. He is a nationally recognized analyst, lecturer and thought-leader in cyber risks and has been featured in Entrepreneur magazine, Chief Executive magazine and others.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks?
    BYOD: Do benefits of personal devices at work outweigh drawbacks? EDRM and AccessData Recorded: Jul 17 2018 63 mins
    Bring Your Own Device (BYOD) policies present many benefits for both employees and companies, but they also bring unwanted risk associated with allowing individuals to access and share company information through non-monitored personal devices.

    AccessData and Corporate Counsel Business Journal have partnered on a survey of Corporate Legal professionals to identify current BYOD trends and concerns, and understand the impact it is having on e-discovery. Join us for this one-hour webinar where we will review the findings of this exclusive survey and highlight best practices for organizations allowing personal device use for business purposes, to help ensure data is protected and accessible in the event of e-discovery.
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Sep 21 2018 3:00 pm UTC 30 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Sep 25 2018 3:00 pm UTC 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades Leila Szwarc & Paola Fonseca TMF Group and Yoab Bitran, LRN Sep 25 2018 3:00 pm UTC 60 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach EDRM and AccessData Sep 25 2018 6:00 pm UTC 60 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Preparing for Litigation Before it Happens
    Preparing for Litigation Before it Happens Doug Austin and Tom O'Connor Sep 26 2018 5:00 pm UTC 75 mins
    Information Governance (IG) has always been part of the eDiscovery landscape and it has always been important for reducing the population of potentially responsive electronically stored information (ESI) that might be subject to litigation by helping organizations adopt best practices for keeping their information “house in order”. But now with an increased concentration on the two-fold concerns of privacy and security, IG has become more important than ever. This CLE-approved* webcast will explore the implementation of Information Governance best practices to help organizations better prepare for litigation before it happens. Topics include:

    + Minority Report: Pre-Case for Litigation Avoidance
    + What Information Governance is and What it Isn't
    + General Principles for Information Governance
    + Who Uses Information Governance?
    + IG Considerations and Issues
    + Basic Information Governance Solutions
    + Information Governance vs. Analytics
    + How Privacy/Security Has Impacted the Importance of an IG Program
    + Recommendations for Implementing an IG Program

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Drone Forensics
    Drone Forensics Rob Attoe, CEO, Spyder Forensics Sep 28 2018 3:00 pm UTC 60 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activates and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • Debunking the Top Ten Myths of Document Review
    Debunking the Top Ten Myths of Document Review Michael Dalewitz, President (ReviewRight) Oct 3 2018 4:00 pm UTC 75 mins
    Representing the largest expenditure in the eDiscovery task continuum, the review phase of legal discovery consumes almost 70% of each dollar spent on eDiscovery. Understanding budgetary constraints routinely are a top concern for eDiscovery professionals, legal departments and law firms are continually seeking ways to become more time effective and cost efficient during document reviews. But are these professionals making sourcing decisions based on facts or assumptions? This expert presentation will highlight ten of the most common myths associated with attorney document reviews and present approaches for avoiding decisions based on myths.

    Key Presentation Topics Include:

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Presentation Leader: Michael Dalewitz, HaystackID

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model. He created one of the industry’s first managed document review models and developed the first document review metrics tracking software.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.