Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Digital Business is Here - Is your Trust Infrastructure Ready?
    Digital Business is Here - Is your Trust Infrastructure Ready? Mike Hathaway, Aaron Davis Recorded: Jul 20 2017 57 mins
    The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.

    What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.

    This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.

    * Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
    * Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
    * Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!

    About the Speakers:

    Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

    Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

    Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
  • How to Prevent Data Walking Out the Front Door
    How to Prevent Data Walking Out the Front Door Nancy Patton, Esq. (Sr. Solutions Consultant Exterro), Dave Packer (VP, Product & Alliances Marketing, Druva) Recorded: Jul 19 2017 64 mins
    With all the news surrounding data breaches and information leaks, it’s often forgotten that the number one way sensitive/confidential information illegally enters the public domain is when employees leave their organization.

    In this webcast, learn about how technology can help prevent data from walking out your front door and proactively safeguard employee data required for e‑discovery/compliance.

    Register for this webcast and learn how:

    - Data archiving software can automatically lock down and ensure data is not removed from the org
    - E-Discovery technology can automatically track employee movements and notify legal teams when key custodians leave the org
    - Leading organizations are leveraging these types of technology to be more efficient and strengthen data protection efforts
  • Success Factors in Threat Intelligence: Part 3 - Key Elements
    Success Factors in Threat Intelligence: Part 3 - Key Elements Allan Thomson, Chief Technical Officer Recorded: Jul 19 2017 49 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig into the key elements of the TI program with concrete examples, and key components of the program that must exist including the right team, process, tools, metrics and connections.
  • Analysis Paralysis: Billions of Logs to Incidents That Matter
    Analysis Paralysis: Billions of Logs to Incidents That Matter Tony Merritt, SecureWorks Managing Principal Recorded: Jul 19 2017 52 mins
    Most enterprise organizations have set up a security model that includes a first layer of security event management, responsible for capturing of logs, notification, filtering and some level of correlation. However, with the escalating number of users and logs from more and more devices, making sense of the noise and translating them into incidents that matter can be a daunting task.

    In this webcast, Tony Merritt, SecureWorks Managing Principal, will cover how to leverage logs and tactics to integrate the proper incident response. Topics covered include:

    • Sensing: The challenge of ever increasing in-bound noise and priorities
    • Improving Sensing: What logs and events matter? How do you ensure you have visibility?
    • Sense Making: Not all logs are created equal. The importance of correlation, business context, rules and use cases to determine if the incident matters.
    • Decisions Making: An event has passed a threshold of incident viability. How do you connect logs and tactics into actionable response?
  • Top AML Challenges for Banks and MSBs in 2017: FinCEN's CDD rule and Digital KYC
    Top AML Challenges for Banks and MSBs in 2017: FinCEN's CDD rule and Digital KYC Kathy Tomasofsky, MSBA - David Landsman, NMTA - David Schwartz, FIBA Recorded: Jul 19 2017 73 mins
    It’s been a busy year in the Money Transfer industry, and even though some light has been shed over the regulatory landscape; banks and money service businesses are still facing challenges in terms of regulations, examiner’s expectations, compliance and risk management obligations, and bridging the gap between brick-and-mortar and the digital environment.

    But the board is set, so it’s time for action.

    With a setting such as this, we are looking to industry experts for guidance to navigate these unchartered waters, to understand how to go about some of these challenges, and to prepare our organizations to make the best of the opportunities that will arise from them.

    Join Kathy Tomasofsky, Director at Money Service Businesses Association, David Landsman, Executive Director at National Money Transmitters Association, and David Schwartz, CEO at Florida International Bankers Association, in discussing:

    1. Compliance with FinCEN’s CDD Rule
    2. KYC Challenges in online environments
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Recorded: Jul 19 2017 56 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.

    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Integrating Threat Isolation with SWG and SMG (10:00am PT / 1:00pm ET)
    Integrating Threat Isolation with SWG and SMG (10:00am PT / 1:00pm ET) Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass Recorded: Jul 19 2017 32 mins
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Teaching Computers to Lie to Defend Themselves
    Teaching Computers to Lie to Defend Themselves Professor Mohammed Almeshekah Recorded: Jul 19 2017 54 mins
    This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
  • Insights from the 2017 Gartner Magic Quadrant for NGFW
    Insights from the 2017 Gartner Magic Quadrant for NGFW Navneet Singh, Director, Product Marketing Recorded: Jul 19 2017 40 mins
    Hear from Palo Alto Networks experts on key take aways from the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls.

    For the sixth time, Palo Alto Networks is in the leader quadrant.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • “CRAWL / WALK / RUN” Commitment to Data Governance
    “CRAWL / WALK / RUN” Commitment to Data Governance Sanjay Sexana, SVP, Data Governance, Northern Trust Corp. & Aliye Ozcan Ergulen, Unified Governance Portfolio Mktg Mgr, IBM Recorded: Jul 19 2017 45 mins
    Northern Trust made a commitment to ensure that the highest quality data is delivered via enterprise-wide data governance strategy for the purpose of improving the efficiency, increasing the profitability and lowering the risk of the business units it serves. Join Sanjay Saxena, SVP Enterprise Data Governance at Northern Trust, who is going to share their governance implementation journey on both business insights and compliance initiatives. Some of the topics you will hear from him are:

    • Enterprise Data Governance and its value
    • The Journey Northern Trust is on
    • Data Governance Operating Model
    • Key Lessons Learned
    • The Biggest Challenge
    • How to Gain the Business Buy-in
    • And more...

    This webinar is brought to you by IBM Analytics Unified Governance team. Aliye Ergulen, global portfolio marketing lead, is going to share Unified Governance portfolio highlights and where to find additional information.
  • Demystifying Attack Simulation: Top 3 Ways to Get More From Your Security
    Demystifying Attack Simulation: Top 3 Ways to Get More From Your Security Dan Cummins, Senior Analyst, 451 Research & Chris Webber, Director of Product Marketing, SafeBreach Recorded: Jul 19 2017 48 mins
    IT security teams are busier than ever, with executives and board members taking a newfound interest thanks to headline-level breaches. With all this scrutiny, validating whether security controls are actually working is key.

    Red teams, white-hat external penetration testers, and internal scanners can provide some assurance, but with attacks and successful breaches continuing to increase, IT must find new ways to stay out of the headlines. If current market spend is any indicator, many enterprises are simply throwing more tools at the problem—but that can just add to security complexity, and open gaps in policy.

    Automated attack simulations can help IT stay ahead of attackers, and break out of the constant buying cycle, by getting more from existing security controls.

    •Extend/enhance red teams and penetration testers
    •Reduce exposure time
    •Verify that existing tools are working as expected

    Join us at 11am ET on July 19th with Dan Cummins, Senior Analyst, 451 Research and Chris Webber, Director of Product Marketing, SafeBreach as they explore breach and attack simulation technology.
  • Creating Record Retention & Data Classification Policies that Work
    Creating Record Retention & Data Classification Policies that Work Mark Diamond, CEO, Contoural Recorded: Jul 19 2017 53 mins
    Records retention and data classification policies should not be created in a vacuum and should not only provide legal statements. Rather, when created effectively, they can be used to guide and drive efforts that work well with both your employees and your technology.

    Join Contoural CEO Mark Diamond as he discusses:
    - Essential attributes of a records retention policy and schedule
    - Strategies that yield higher compliance
    - Strategies to Increase clarity and comprehensive Media Quality and Maturity
    - Steps your organization can take to make sure technology and people work together and against each other.

    About the Speaker:
    As founder and CEO of Contoural, Mark Diamond is one of the industry thought leaders in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted advisor he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management. Mark is a frequent industry speaker, presenting at numerous Legal and IT industry conferences as well as online venues. Additionally, Mark addresses more than one hundred internal corporate audiences each year.
  • Intelligente Endpunktsicherheit: mehr als nur Vorbeugung
    Intelligente Endpunktsicherheit: mehr als nur Vorbeugung Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye Recorded: Jul 19 2017 32 mins
    Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
    Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
    Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
    Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?

    Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.

    Die Themen:
    - Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
    - Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
    - Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
    - Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
    •Mehrere Engines für die Bedrohungserkennung und -abwehr
    •Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
    •Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
  • Developing Security Behaviours – 8 Practical Principles for Effective Change
    Developing Security Behaviours – 8 Practical Principles for Effective Change Sarah Janes, Managing Director, Layer8, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Jul 19 2017 44 mins
    Overwhelming evidence consistently shows that people are at the heart most data breaches. A new approach is needed, not so long ago technical attacks by hackers required technical solutions, but, as hackers find it more lucrative to target human vulnerabilities attention needs to be refocused on people.

    Discourse is shifting from awareness to culture change, however, early in its maturity, culture change lacks a universally accepted approach, and therefore people struggle to make change happen or to convince the business to invest.

    This webinar will provide 8 practical principles for effective change from auditing your current security culture through to embedding security as business as usual. It will provide a cohesive approach to behavioural change that can be measured. You will gain knowledge to help build a business case for culture change and techniques to use when your program launches.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Recorded: Jul 18 2017 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • Accelerate AI and HPC Workload Delivery with Composable Cloud Infrastructure
    Accelerate AI and HPC Workload Delivery with Composable Cloud Infrastructure John Abbott, 451 Research. Chris Orlando, ScaleMatrix. Michael J. McManus PhD, Intel Recorded: Jul 18 2017 50 mins
    Join Intel, ScaleMatrix, and 451 Research for an insightful webinar covering the challenges and solutions to the adoption of Artificial Intelligence workloads: Deep Learning, Machine Learning and HPC, in the Cloud. High Performance Computing is a fundamental tool used in analytics and research; and on average, can provide an ROI as high as $515 per $1 of investment. However, HPC could deliver even greater value if we could overcome key technical barriers associated with different workloads driving separate systems with specialized hardware and software for each workload. These challenges lead to increased acquisition and management costs and are often responsible for reducing efficiency.

    Learn how ScaleMatrix’ high-density data centers and cloud delivery capabilities along with Intel’s Scalable Systems Framework have overcome these challenges with tight system integration, increased density, and balanced compute, memory, network/fabric and storage in a composable, cloud-delivered architecture, specifically designed to address the various AI and HPC requirements associated with compute intense workloads like Genomic Analytics, Molecular Dynamics, and Machine Learning.

    The ScaleMatrix Artificial Intelligence Cloud solution using Intel’s Scalable System Framework employs heterogeneous blocks of compute nodes that can be readjusted to match workload demand. It is easily scaled to meet any size customer need, offers ease of use, faster delivery times, and lower TCO by simplifying and improving core infrastructure. Technologies highlighted include the Intel® Xeon and Xeon Phi processors, Intel® Arria FPGA, Intel® SSD’s, and Intel® Omni-Path Architecture. Whether you’re focused on Image Processing, Convolutional Neural Networks, Alignment Algorithms, or DNA Sequencing, you’ll hear from Intel and ScaleMatrix experts how their joint solution can improve your HPC workload performance in an economical way. Complementary trial details will be presented.
  • Protecting Data After The Digital Disruption
    Protecting Data After The Digital Disruption Ryan Kalember, SVP Cybersecurity Strategies, Heidi Shey, Forrester Researcher Recorded: Jul 18 2017 61 mins
    Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.

    Join this lively discussion to learn:

    - Trends and implications for traditional network and endpoint DLP
    - Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
    - Strategies on how to move forward to protect your critical data
  • Why Hybrid IT is a Big Opportunity for Managed Security Service Providers
    Why Hybrid IT is a Big Opportunity for Managed Security Service Providers Aaron Sherrill, Senior Analyst & Dan Thompson, Senior Analyst Recorded: Jul 18 2017 57 mins
    The enterprise is shifting away from on–premise-only IT to a Hybrid IT model that delivers services using internal resources and/or external resources and services, often from multiple providers. While this model of IT can result in cost savings, performance optimization and greater agility, it also significantly increases the complexities of cybersecurity for the enterprise. Enterprises already struggling with cybersecurity will need help to address these concerns – concerns that many enterprises are not aware of or are unable to tackle. The Hybrid IT model does, however, present unique challenges for Managed Security Service Providers (MSSPs), as these providers will be asked to secure environments that span multiple platforms, and in some cases disparate business units. MSSPs are poised to benefit from this shift if they can deliver services to address and mitigate these threats.
  • Stop Malware in its Tracks with Security Orchestration
    Stop Malware in its Tracks with Security Orchestration Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jul 18 2017 60 mins
    Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.

    USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.

    Join us for this webcast to learn:

    -What security orchestration means, and why it has become essential for fast, efficient incident response
    -How USM Anywhere can automate incident response activities, saving valuable time
    -How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Cloud Leak: How a Verizon Partner Exposed Millions of Customer Accounts
    Cloud Leak: How a Verizon Partner Exposed Millions of Customer Accounts Dan O'Sullivan, UpGuard Analyst Recorded: Jul 18 2017 33 mins
    A misconfigured cloud-based file repository exposed names, addresses, account details, and account personal identification numbers (PINs) of as many as 14 million US customers of telecommunications carrier Verizon. UpGuard’s Cyber Risk team discovered this critical data repository was not exposed by the enterprise holding primary responsibility for the information, but by a third-party vendor to the enterprise.

    Beyond the sensitive details of customer names, addresses, and phone numbers—all of use to scammers and direct marketers—the prospect of such information being used in combination with internal Verizon account PINs to take over customer accounts is hardly implausible. Dan O’Sullivan, the analyst who first broke the story, will go through the details of the discovery and the significant impact of this cloud leak.


    For the original article: https://www.upguard.com/breaches/verizon-cloud-leak
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Recorded: Jul 18 2017 55 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Recorded: Jul 18 2017 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • [Webinar] Stop Pulling Your Hair about Cyber Threats
    [Webinar] Stop Pulling Your Hair about Cyber Threats Chuck Reynolds, CTO, TSI, Deepu Rathi, CMO, CypherPath, Pascal Joly, Dir Tech Partnerships, Quali Recorded: Jul 17 2017 48 mins
    You can construct & deconstruct your app environments and integrate security testing tools while assessing vulnerabilities before releasing to production.
    Getting anxious about cyber attacks?

    You're not alone: there’s hardly a day passing by without news of a security breach. Keeping abreast of the latest cyber threats and applying mitigation strategies to application environments seems to be a losing battle.

    In this webinar, we will go over:

    A solution to rapidly construct and deconstruct your applications environments, integrate security testing tools, and harden these environments while assessing vulnerabilities before releasing to production.

    A methodology to clone a production environment to conduct rapid cyber defense assessments, create resiliency from cyber attacks, and enable developing incident responses.

    These types of environments can also be leveraged for cyber security training of your personnel.
  • Preventing Employees From Hoarding Documents
    Preventing Employees From Hoarding Documents Kathryn Hilton, VP and Consultant, Contoural Jul 20 2017 3:00 pm UTC 60 mins
    Taking a “save everything forever” approach and employee hoarding of e-mails, files and other types of electronic documents are burying organizations under mountains of data, exposing them to privacy risks, increasing costs and risks of eDiscovery, as well as sapping productivity from employees who spend hours every week looking for information. Yet many company’s efforts at aggressively deleting electronic documents are either ineffective or worse, they have the unintended effect of driving “underground archiving” whereby employees save information in insecure locations.

    Join us as we explore smart approaches to preventing employees from hoarding documents.

    About the Speaker:
    Kathryn Hilton, Vice President of Consulting for Contoural, has more than 20 years experience in records and information management, strategy consulting, and data storage technology. As a Contoural consultant and practice manager, Kathryn has developed methodologies for Records and Information Management organization design and for Change Management strategy, process, and content.  In addition to leading Contoural teams in these areas, Kathryn assists clients with the globalization of their programs, and has visited client sites around the world for a detailed understanding of business and legal information management requirements. 
  • Law Enforcement Data On the Move: Don’t make CJI a Crime
    Law Enforcement Data On the Move: Don’t make CJI a Crime Stan Mesceda, Encryption Expert at Gemalto Jul 20 2017 3:00 pm UTC 60 mins
    Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
    Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
    “When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”

    Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
    Attendee takeaways:
    •Overview of CJIS-SP mandate
    Network vulnerabilities and how Ethernet encryption can help secure data in motion
    •Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
    •Mapping solutions to the needs of your organization

    For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091
  • Are You Ready to Respond?
    Are You Ready to Respond? Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant Jul 20 2017 3:00 pm UTC 60 mins
    “In our current state of cyber security, security breaches are inevitable.” -- Kevin Mandia, CEO, FireEye

    In 2016 there were 1,093 publicized cyber security breaches. That’s a 40% increase from 2015. Given this era’s up surge in breach activity, it’s no longer about whether you’ll be breached. It’s how you’ll respond when you are breached. Organizations with a well-designed response capability are better off.

    Join Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant, for our webinar on July 20. They will cover several topics including:

    •Six primary areas of focus for an effective response plan
    •Best practices for each of those areas
    •Examples of how deficiencies in any area reduce an organization’s ability to effectively detect and respond to a cyber security incident, whether targeted or opportunistic
  • Securing Your Public Cloud Infrastructure
    Securing Your Public Cloud Infrastructure Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza Jul 20 2017 5:00 pm UTC 60 mins
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Jul 20 2017 5:00 pm UTC 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • A New Frontier in Cloud Security: The Secure Internet Gateway
    A New Frontier in Cloud Security: The Secure Internet Gateway Dan Cummins - 451 Research & Meghan Diaz - Cisco Umbrella Jul 20 2017 5:00 pm UTC 60 mins
    Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.

    Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications.

    In the webinar we will discuss:

    - The changing cloud security landscape
    - The emergence of the Secure Internet Gateway
    - Important buying considerations for companies looking to add these capabilities
  • Ensuring Data Protection with NIST Cybersecurity Framework
    Ensuring Data Protection with NIST Cybersecurity Framework Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Jul 20 2017 6:00 pm UTC 30 mins
    When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

    Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

    Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

    • Identify sensitive data, where it is and who is accessing it

    • Protect that data by establishing policies which prevent exposure

    • Detect threats to which could extrapolate data by several means

    • Respond to threats with automated actions

    • Recover after a threat to produce reports to prove compliance

    Register Today
  • Get Ready for DFARS - A CloudCheckr Workshop
    Get Ready for DFARS - A CloudCheckr Workshop Patrick Gartlan, CloudCheckr CTO Jeff Bennett, Allgress President/COO Tim Sandage, AWS Sr. Security Partner Strategist Jul 20 2017 6:00 pm UTC 60 mins
    The clock is ticking on the latest cloud compliance mandate: NIST Special Publication 800-171, otherwise known as DFARS (Defense Federal Acquisition Regulation Supplement). Any organization or contractor that holds or processes unclassified Department of Defense (DoD) data must ensure that they comply with the new DFARS clause.

    December 31, 2017 is the ultimate deadline by which to prove compliance, so action is recommended as soon as possible.

    In this webinar, Patrick Gartlan (CloudCheckr CTO), Jeff Bennett (Allgress President/COO), and Tim Sandage (AWS Sr. Security Partner Strategist) will lead an interactive workshop on what DFARS regulation means for your business, specifically:

    ✔ Specific requirements of the DFARS regulation

    ✔ Key controls that CloudCheckr provides to help you meet DFARS requirements

    ✔ Tools from Allgress that map DFARS requirements to CloudCheckr features
  • Challenges with Fintech Compliance, and Cybersecurity to the Rescue
    Challenges with Fintech Compliance, and Cybersecurity to the Rescue Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks Jul 20 2017 7:00 pm UTC 45 mins
    In this webinar we are going to:
    - explore top cyber threats that fintech companies face
    - identify the monitoring and detection compliance requirements common to Federal and State Regulations

    We will be talking to Angelo Purugganan, Chief Information Security Officer, at Arctic Wolf Networks, to get his perspective on the how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    Most fintech transactions today happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Jul 20 2017 9:00 pm UTC 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 24 2017 5:00 pm UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Mega Breaches: How to mitigate your risks using Data-Centric Security?
    Mega Breaches: How to mitigate your risks using Data-Centric Security? Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec Jul 25 2017 5:00 am UTC 60 mins
    What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.

    Get advice on preventing data breaches from these industry experts:

    • Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.

    • Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.

    Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Jul 25 2017 9:00 am UTC 45 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Does your data security create more pain than it solves? 5 steps to get it right
    Does your data security create more pain than it solves? 5 steps to get it right Raju Verranna, Pre Sales Engineer Jul 25 2017 9:30 am UTC 45 mins
    Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?

    Key learning:
    1. Increase security and compliance, while maintaining user-friendliness
    2. Deploy encryption without interrupting normal business processes
    3. Ease the daily burden of your data security administration
  • GDPR and Open Source: Best Practices for Security and Data Protection
    GDPR and Open Source: Best Practices for Security and Data Protection Daniel Hedley, Partner, Irwin Mitchell; Matt Jacobs, VP and General Counsel, Black Duck Software Jul 25 2017 2:00 pm UTC 60 mins
    Legislators in Europe continue to expand the scope of the laws governing information security and personal data protection. As a result, organizations serving consumers and businesses in the region need to understand the implications these laws will have on their use of open source to build software applications.

    During this educational webinar led by Dan Hedley, Partner, IT and Commercial from Irwin Mitchell, we’ll provide guidance on the General Data Protection Regulation (GDPR) and why a comprehensive approach to open source security management is essential for GDPR observance. In addition, we’ll review open source management best practices in context of other industry-specific developments like the Network and Information Services Directive and the Electronic Identification Regulation.
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Jul 25 2017 3:00 pm UTC 60 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
     
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Jul 25 2017 3:00 pm UTC 60 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Jul 25 2017 5:00 pm UTC 60 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
    The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Jul 25 2017 11:00 pm UTC 60 mins
    SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

    • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
    • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
    • New requirements around Certificate Transparency that are being introduced in October, 2017
    • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
    • Certificate Authority Authorization and how this can be used to protect your organization against fraud
  • Prevent Major Data Breaches with Threat Lifecycle Management
    Prevent Major Data Breaches with Threat Lifecycle Management Seth Goldhammer, Senior Director of Product Management Jul 26 2017 12:00 am UTC 60 mins
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Jul 26 2017 5:00 pm UTC 60 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Jul 26 2017 5:00 pm UTC 75 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • Public Sector Cloud Guide
    Public Sector Cloud Guide TBD Jul 26 2017 6:00 pm UTC 60 mins
    A guide for public sector organizations looking to embrace the cloud, including:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?