Hi [[ session.user.profile.firstName ]]

e-Discovery

  • ACEDS Webinar: On Premise, Off Premise, or Both? Factors Affecting eDiscovery
    ACEDS Webinar: On Premise, Off Premise, or Both? Factors Affecting eDiscovery Doug Austin Recorded: Nov 15 2017 62 mins
    Many say that the cloud is revolutionizing eDiscovery as we know it, while others still prefer the control of the on-premise eDiscovery solutions they’re used to using. So, what factors should you consider when selecting your own eDiscovery solution? This presentation and technology demonstration led by eDiscovery Daily Blog author and eDiscovery expert Doug Austin will provide attendees with an overview of the different approaches and how both approaches could fit into the workflow of an organization.
  • eDiscovery Case Law Update Webinar
    eDiscovery Case Law Update Webinar Robert Hilson Recorded: Nov 15 2017 60 mins
    Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.

    Featured cases include:

    Fischer v. Forrest - Boilerplate objections create havoc
    Morgan Hill Concerned Parents Ass'n - If at first you don't produce correctly, try try again.
    Harleysville Ins. Co. v. Holding Funeral Home - Hitting 'reply all' to the entire internet = privilege waiver
    Solo v. UPS Co. - Proportionality is here, finally.
    Shawe v. Elting - Bad conduct draws bad sanctions...
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Recorded: Nov 6 2017 28 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • Lessons Learned from Recent eDiscovery Disasters
    Lessons Learned from Recent eDiscovery Disasters Doug Austin and Tom O'Connor Recorded: Oct 25 2017 63 mins
    The recent eDiscovery failures at Wells Fargo and at the Department of Justice show that eDiscovery mistakes and failures happen even at the largest corporations and government agencies. This CLE-approved* webcast will discuss the various issues that occurred in these high-profile cases and what to do to avoid them in your own cases. Topics include:

    + Attorney Duty of Competence
    + Managing Communications: Attorney Responsibilities
    + Managing Communications: Vendor Responsibilities
    + Recommended Workflows for Tracking Review
    + Common Redaction Mistakes and How to Avoid Them
    + Checking for Personally Identifiable Information (PII)
    + Key Takeaways for Better eDiscovery Project Management

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • 2017 In-House E-Discovery Trends Analysis
    2017 In-House E-Discovery Trends Analysis George Socha (BDO and EDRM), Jim Waldron (EDRM), Joe Mulenex (Exterro) Recorded: Oct 17 2017 62 mins
    The year is almost over, but before we start looking ahead to 2018 it's important to look back and clearly understand how your e-discovery and legal processes stack up against those of your peers. In this upcoming webcast, learn how in-house legal departments are trying to become more productive and reduce legal spend. We'll review new legal research conducted by EDRM/Duke, Exterro and BDO Consulting to examine trends, what's working, and what's not.
  • ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security
    ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security Doug Austin and Tom O'Connor Recorded: Oct 11 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • Holy ****, The Case is Filed!  What Do I Do Now?
    Holy ****, The Case is Filed! What Do I Do Now? Doug Austin and Tom O'Connor Recorded: Sep 27 2017 66 mins
    The first days after a complaint is filed are critical to managing the eDiscovery requirements of the case efficiently and cost-effectively. With a scheduling order required within 120 days of the complaint and a Rule 26(f) “meet and confer” conference required at least 21 days before that, there’s a lot to do and a short time to do it. Where do you begin? This CLE-approved* webcast will discuss the various issues to consider and decisions to be made to help you meet your discovery obligations in an efficient and proportional manner. Topics include:

    + What You Should Consider Doing before a Case is Even Filed
    + Scoping the Discovery Effort
    + Identifying Employees Likely to Have Potentially Responsive ESI
    + Mapping Data within the Organization
    + Timing and Execution of the Litigation Hold
    + Handling of Inaccessible Data
    + Guidelines for Interviewing Custodians
    + Managing ESI Collection and Chain of Custody
    + Search Considerations and Preparation
    + Handling and Clawback of Privileged and Confidential Materials
    + Determining Required Format(s) for Production
    + Timing of Discovery Deliverables and Phased Discovery
    + Identifying eDiscovery Liaison and 30(b)(6) Witnesses
    + Available Resources and Checklists

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Protecting Client Data in the Age of Cybercrime
    Protecting Client Data in the Age of Cybercrime Brian Focht, Eli Walk, Joe Marquette Recorded: Sep 22 2017 61 mins
    If you're practicing law in 2017, you're squarely in the crosshairs of one of the biggest threats the profession has ever faced. Law firms, by the nature of their business, are possessors of their clients' most sensitive trade secrets, IP and electronic records. And hackers know it. Earlier this year, this threat came home to roost in a big way: The Panama-based law firm Mossack Fonseca fell prey to what Edward Snowden described as the "biggest leak in the history of data journalism" -- where hackers accessed the firms IT framework and leaked more than 11.5 million documents across the web.
  • Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives
    Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives Sponsored by Dechert LLP; hosted by Jim Waldron, director of EDRM. Recorded: Sep 19 2017 60 mins
    Join us for a discussion of the E.U. General Data Protection Regulation and the new People’s Republic of China data privacy law and the potential impact on e-discovery in litigation. We'll also discuss how changing technologies in cloud computing might impact preservation and collection in e-discovery, including cross-border data sharing. Presenters include experienced attorneys from Dechert LLP based in the U.S., Asia and the E.U. The session will conclude with a Q&A.

    Moderator: Jim Waldron – Director, EDRM
    Speakers:
    Timothy C. Blank – Partner, Boston
    Hilary Bonaccorsi – Associate, Boston
    Dr. Olaf Fasshauer – National Partner, Munich
    Philip Kwok – Associate, Hong Kong
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin and Tom O'Connor Recorded: Sep 13 2017 66 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This free and CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017.

    Presentation Highlights

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Webinar Presenters

    Doug Austin: VP of Operations and Professional Services, CloudNine
    At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor: eDiscovery Expert and Special Consultant to CloudNine
    Tom is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.
  • Social Media and the Law
    Social Media and the Law John Isaza, Eric Goldman, Aryan Kushan Recorded: Sep 6 2017 65 mins
    There are more than three billion active social media users across the world today. That’s almost half the global population, regularly tweeting about the news, sharing updates about their work, and, yes, uploading pictures of their lunch. But social media isn’t just changing the way we interact with each other; it’s changing the way we practice law.

    The rise of social media has significant and novel implications for legal professionals. How are social media messages accessed and preserved for litigation? What are the information governance implications, and potential liabilities, that can stem from a company’s Twitter account or an employee’s Facebook usage? And how are attorneys supposed to make sense of a or a , when emojis are working their way into more and more communication, on social networks and off?
  • Automation as a Force Multiplier in Cyber Incident Response
    Automation as a Force Multiplier in Cyber Incident Response Mike Fowler (CISSP, EnCE), VP of Professional Services at DFLabs Recorded: Sep 6 2017 33 mins
    Four Best Practices to eliminate Security Analyst Alert Fatigue

    Join us in this webinar to learn industry best practices to improve your security analyst’s effectiveness by eliminating Alert Fatigue.

    By 2019, ISACA predicts a shortage of 2 million cyber security professionals. This scarcity of skilled labor and a security alert false positive rate of over 52% means that your security team is overstretched and overwhelmed.

    Security Analysts are subjected to such a volume and frequency of alerts that they become desensitized to the information they are meant to analyze, resulting in critical alerts being disregarded or missed.

    When responding to tens of thousands of security alarms a month, how can you reliably distinguish what's important from what's just a noise in the background?

    Join us in this webinar and learn how you can help your overwhelmed cyber response team to "SOAR" above the noise when responding to incidents. Mike Fowler will present proven best practices to reduce and avoid alert fatigue:

    ● What is “Alert/Alarm Fatigue” and why should you care?
    ● What is the impact of alert fatigue on Security Operations and Incident Response?
    ● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
    ● How to reinforce the front line
    ● How to leverage automation capabilities to act as a Force Multiplier through Incident Automation and Orchestration

    Our webinar presenter, Mike Fowler (CISSP, EnCE), is the Vice President of Professional Services at DFLabs and has over two decades of experience in incident response and forensic investigations.
  • On Premise or Off Premise? A Look at Security Approaches to eDiscovery
    On Premise or Off Premise? A Look at Security Approaches to eDiscovery Doug Austin and Tom O'Connor Recorded: Aug 30 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • Practical Tips for a Successful First TAR Project
    Practical Tips for a Successful First TAR Project George Socha, Kelly Atherton, and Sam Merritt Recorded: Aug 8 2017 63 mins
    Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.
  • Technology Assisted Review: What You Need to Know, Ask, and Expect
    Technology Assisted Review: What You Need to Know, Ask, and Expect George Socha, Bonnie Kennedy, Avi Benayoun, Adam Strayer Recorded: Aug 3 2017 63 mins
    Join George Socha, co-creator of the EDRM, as he moderates a conversation with Bonnie Kennedy of Delta Air Lines, Avi Benayoun of Greenberg Traurig and Adam Strayer of BDO. They will discuss the TAR workflow and the importance of open communication between and among the client, the law firm, and the service provider. These three litigation and ediscovery experts will talk about expectations, transparency, and some of the information black holes that can develop during the predictive coding process.
  • Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
    Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Olga Mack, Brian Focht Recorded: Jul 27 2017 47 mins
    In June, a massive cyberattack brought down one of the country's biggest law firms. DLA Piper, its systems ravaged by the Petya ransomware program, was forced to shut down its phones service, email, and internal computer network--potentially costing millions in lost income. Weeks later, the firm was still digging itself out.

    Such attacks are increasingly an existential threat to firms of all sizes: the difference between being billing and nothingness. Join us as we discuss this urgent issue.

    Attendees will learn:

    -The recent history of cyberattacks against law firms large and small
    -The potential consequences of a successful attack
    -Cybersecurity protections GCs demand from their outside counsel
    -Ways attorneys can protect themselves against ransomware and other cyberattacks
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Recorded: Jul 26 2017 72 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Recorded: Jul 20 2017 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Recorded: Jul 20 2017 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!

    About the Speakers:

    Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

    Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

    Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Recorded: Jul 19 2017 56 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.

    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Recorded: Jul 18 2017 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Recorded: Jul 18 2017 55 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Recorded: Jul 18 2017 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms
    How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms Doug Austin and Karen DeSouza, Esq. Recorded: Jun 28 2017 63 mins
    Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. This webcast* will discuss how SaaS automation technology has revolutionized eDiscovery for solo and small firms today.

    Webcast Highlights:

    + How Automation and the Cloud is Affecting All Industries, including eDiscovery
    + Drivers for the eDiscovery Automation Revolution
    + The Impact of Automation and the Cloud on the Lawyer Job Market
    + The Evolution of eDiscovery Technology
    + Whip Me, Beat Me, Call Me EDna: Two Challenges, Seven Years Apart
    + Key Components of a SaaS eDiscovery Automation Solution
    + Cost Alternatives for SaaS eDiscovery Automation Solutions
    + Can Automation Really Disrupt the eDiscovery Industry?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Exec Nov 27 2017 3:00 pm UTC 45 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • Is It Time for Your Retention Schedule to Grow Up and Become Something Useful?
    Is It Time for Your Retention Schedule to Grow Up and Become Something Useful? Mark Diamond, CEO, Contoural Dec 1 2017 4:00 pm UTC 60 mins
    We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your e-discovery and information governance foundations. Many organizations consider records retention as something that they have to do, but feel handcuffed because they have no way of enforcing a policy.

    Join this webcast to learn more about:
    • Creating a modern, compliant and useful records retention schedule
    • Applying a schedule to reduce risks and costs in future discovery
    • Addressing both legal and regulatory requirements as well as business needs
  • Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong
    Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong Doug Austin and Tom O'Connor Dec 1 2017 6:00 pm UTC 75 mins
    As data complexity, discovery costs, and regulatory challenges increase in volume and impact, the pulse rate of publicly highlighted eDiscovery mistakes continues to build. While these mistakes are unfortunate for those who experienced them, they can be beneficial to the rest of us in highlighting mistakes you can avoid in your own cases. During this free, one-hour, CLE* presentation, eDiscovery experts Doug Austin and Tom O'Connor will discuss examples of recent eDiscovery disasters and highlight the common characteristics of those disasters and what can be done to avoid them in your own cases. Topics include but are not limited to:

    + Attorney Duty of Competence
    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching and Redaction Mistakes and How to Avoid Them
    + Checklist of Items to Ensure a Smooth and Accurate Production
    + Managing Communications: Attorney and Vendor Responsibilities

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Creating an In-House Discovery Response Plan
    Creating an In-House Discovery Response Plan Tom Mighell, Esq., VP of Delivery Services, Contoural Dec 1 2017 6:00 pm UTC 60 mins
    Like most companies, you probably have a process for responding to discovery requests in litigation or regulatory matters. But is that process documented? If the staff in charge of discovery left today, or if that big class action finally hit, would you be prepared? Sometimes, having a consistent, repeatable process in place can help to protect you from surprise, sanction, or high discovery costs - especially if your company has a low litigation profile.

    This webcast will cover:
    • How to create a discovery response plan, no matter your company size
    • Understanding how good information governance practices can improve your litigation readiness
    • Best practices for legal holds
    • The role technology plays in eDiscovery, whether you should invest in it, or use outsourced technology services
    • eDiscovery when your company stores records in the cloud
  • Creating an Information Governance Roadmap
    Creating an Information Governance Roadmap Mark Diamond, CEO, Contoural Dec 1 2017 8:00 pm UTC 60 mins
    A well-designed Information Governance roadmap with appropriate milestones and metrics can drive a successful program forward. Join this webcast to learn more about:
    • Key elements for launching an Information Governance Program
    • How to incorporate these elements to meet your organization’s specific needs
    • Creating a team to help you launch your program
  • 2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation
    2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation Judge Frank Maas, Attorney Michael Simon and More Dec 7 2017 7:00 pm UTC 75 mins
    In modern legal practice, the difference between success and failure often boils down to the ability to navigate and make sense of data. To that end, the legal profession in 2017 was largely shaped by major developments in data and legal technology, from the way in which discovery sanctions were adjudicated to news-making data breaches, such as the so-called “Paradise Papers,” where the hacking of a major law firm exposed illicit tax-sheltering practices of many of the firm’s clients. Over the course of a tumultuous year, legal professionals confronted the specter of cybercrime, a shifting of judicial views on how (and how hard) evidentiary penalties should be imposed, and the fact that the demise of a client’s case -- or a fruitful career -- can arise from a simple failure to understand how modern tech works. The Supreme Court, in the high-profile Goodyear decision, even got in on the action.

    Join a panel of experts, including federal judges, as we glean practical guidance from the most important cases and developments of 2017.

    Cases reviewed include:

    Goodyear Tire & Rubber Co. v. Haeger, No. 15-1406 (U.S. Apr. 18, 2017): When does a court’s inherent power to sanction cross the line?

    Ronnie Van Zant, Inc. v. Pyle, 2017 U.S. Dist. LEXIS 138039 (S.D.N.Y. Aug. 28, 2017): Non-party sanctioned under Rule 37(e) for loss of cell phone information.

    Harleysville Insurance Co. v. Holding Funeral Home, Inc., No. 1:15cv00057 (W.D. Va. Oct. 2, 2017): Should privilege be waived due to inappropriate use of a file-sharing site?

    N.M. Oncology & Hematology Consultants v. Presbyterian Healthcare Servs., 2017 U.S. Dist. LEXIS 130959 (D.N.M. Aug. 16, 2017): Should sanctions be levied for giving employees discretion to preserve emails?

    Bailey v. Brookdale University Hospital Medical Center, No. CV 16-2195(ADS)(AKT), 2017 WL 2616957 (E.D.N.Y. June 16, 2017): Expensive discovery persuades court to split costs, and penalize counsel, in light of lopsided ESI agreement.