Intellectual property law is crucial to ensuring that you or your organization have exclusive rights to that assets that you’ve created. The BrightTALK intellectual property community has thousands of professionals focused on learning and exchanging information about intellectual property management, intellectual property software and how to protect intellectual property. Join the community for access to free, interactive presentations or attend live webinars to have your questions answered by IP lawyers and industry experts.
Come join us for a session on all about search term families! We’ll set up a search term family together, see how it speeds up our review in conjunction with list, browse, and map, and use Nuix Discover’s analytics tool for data analysis with search terms.
Laureen Kautt & Mary MackRecorded: Aug 6 202061 mins
LegalTech Recruiter Laureen Kautt is joined by EDRM's CEO Mary Mack introducing the first in a series of workshops designed to help the global community seeking employment in a pandemic. New tools and a shift in mindset are needed to navigate the changing currents.
Tom Leonard (Kilburn & Strode), Alison Care (Kilburn & Strode), Dave Wortley (Kilburn & Strode), Tom Phillips (WIPR)Recorded: Aug 5 202060 mins
Antibody Patents: Maximising value in Europe and beyond
Join antibody experts and European Patent Attorneys Tom Leonard, Alison Care and Dave Wortley of Kilburn & Strode for a 60 minute webinar discussion on the latest developments in antibody patenting on Wednesday 5th August 2020 at 4.30pm BST (8.30am West Coast, 11.30am East Coast, 5.30pm Central European Time).
Drawing on both private practice and in-house experience, this in-depth webinar has been specifically curated for those working in the antibody field, including private practice attorneys, in-house counsel and others involved in the development and marketing of antibodies. We will explore best practice for:
· Drafting applications, including how to maximise potential claim scope where possible and what data to include to support your claims
· Patent filing and IP strategies, including when and where to file
· Prosecution of global portfolios, taking into account how different patent offices examine applications relating to antibodies
· The preparation of freedom-to-operate and landscaping opinions to best inform the business or to prepare yourself for third-party due diligence
Meera Rao, Senior Director Product Management, SynopsysRecorded: Aug 5 202060 mins
Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t have the resources to perform code reviews and provide remediation guidance on the entire application portfolio. Static analysis, also known as static application security testing (SAST), is an automated way to find bugs, back doors, and other code-based vulnerabilities so the team can mitigate those risks.
First, though, you must choose a static analysis model that fits your needs. You might have questions such as these:
- How do I manage false positives?
- How do I triage the results?
- What happens to new issues identified?
- My scan takes hours to complete. How can I use this tool in my DevSecOps pipeline?
- What is a “baseline scan”?
Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we’ve helped other organizations with this process.
Jared Coseglia, Mary Mack & Kaylee WalstadRecorded: Aug 4 202064 mins
TRU Founder and CEO Jared Coseglia sits down with EDRM's Mary Mack and Kaylee Walstad to deliver an update on where the e-discovery, cybersecurity, and privacy job markets are today as they adapt to the ongoing pandemic while keeping up with the ever-evolving legal tech landscape. Jared will break down where the hiring is now and where it will be later in Q3 and into Q4, how legal tech pros can leverage certification and training to stay at the forefront of the industry in response to new questions about data management and protection, and the larger trends that will define the rest of 2020
Angela Kovach, Senior Federal Solutions Architect; Caitlin Reinmuth, Product Marketing ManagerRecorded: Jul 30 202029 mins
When the Coronavirus Aid, Relief, and Economic Security Act or the CARES Act was passed into law on March 27, 2020, the package included significant funds for Federal agencies to expand bandwidth capabilities and make new technology procurements. The pandemic has highlighted the fact that long-term mission continuity is only possible through rapid modernization and workforce adaptation.
One of the fastest routes to IT modernization lies in the adoption of cloud computing technology. By leveraging cloud technology, agencies can rapidly implement new technologies while also saving costs that used to be allocated to data center maintenance. But perhaps most importantly, cloud technology empowers federal employees to access mission critical resources from wherever they may be working. Everlaw is a cloud-native ediscovery solution, optimized for self-service and instant deployment. Already equipped to support the federal government’s IT transformation, Everlaw expedites procurement for quicker access to an integrated, modern ediscovery solution.
This webinar series will focus on the considerations of federal agencies as they make the transition to the cloud, with the focus being on finding the right functionality fit. In this webinar we will discuss:
- Features vs. Functionality - what’s the difference and why does it matter?
- How to prioritize the functionality that matters most for mission performance.
- Balance cost with technical requirements - how to find a balance between budgetary constraints and a technically acceptable solution.
Patrick Carey, Director Product Marketing, Synopsys and Sandy Carielli, Principal Analyst, Forrester Research, Inc.Recorded: Jul 30 202051 mins
Securing your applications is critical, but maintaining release velocity and developer productivity is just as important. Let’s face it: Developers aren’t security experts. They unwittingly introduce security weaknesses and vulnerable open source components into your applications, and they’re ultimately responsible for fixing any issues that surface. But what if you could equip developers with the tools and information they need to prevent security issues from ever making it into your codebase, without creating unnecessary friction or slowing them down?
Join guest presenter Sandy Carielli, Principal Analyst, Forrester Research, Inc., and Patrick Carey, Synopsys, as they discuss the benefits of IDE-based security testing and the role developers can play in securing your applications.
Nuix Discover’s Conditional Coding streamlines the coding process to reduce reviewer fatigue, improve consistency, and increase scalability. It also produces a much richer set of coding decisions, which can help legal teams develop more nuanced case strategies. During this webinar we will show you when and how to use this important addition to Nuix Discover’s review experience.
Mallory Acheson – Head of Analytics & Lucie Cohen – Partner Nelson MullinsRecorded: Jul 29 202055 mins
On trend with the recent uptick in the use of artificial intelligence (AI) in the legal industry and the rise in privacy concerns, we will address ethical duties surrounding the use of AI, specifically for identifying personal information within a dataset. The legal-tech community has seen a rise in technologies designed to not only identify PHI and PII within a data set, but claiming to have the capability to automatically redact, pseudonymize, and even create notification lists for data breaches. While these technologies offer significant efficiencies and cost savings, they raise questions regarding how much knowledge, supervision, and reliance may be given, implicating multiple ethical considerations, including MRCP Rule 1.1 regarding attorney competence (specifically comment 8 on knowledge of risks and benefits with technology), Rule 1.6 surrounding confidentiality requirements, Rule 5.1 regarding attorney duties of supervision, and ABA and other state ethics issued guidelines.
Ian Campbell, Mike Fedorowski and Josh GillilandRecorded: Jul 28 202061 mins
"Redefining the Art & Science of Manual Review
6 ways to optimize efficiency in a remote world"
Join us for a webinar focusing on the manual review feature ‘OVERSIGHT” in iCONECT’s new v10 eDiscovery platform.
An AI-based quality control software that can be applied to any review, in-process or new, without changing or disrupting your current workflow.
Ideal for teams that use it for quality control for linear review, to identify and correct review.
Featuring Ian Campbell, CEO of iCONECT, Mike Fedorowski, Senior Manager of Business Development at iCONECT and Josh Gilliland.
Joshua Gilliland is a California attorney creator of the eDiscovery blog Bow Tie Law and has presented at over 400 eDiscovery seminars and webinars. Josh is co-creator of The Legal Geeks blog and podcast, which has made the ABA Journal as one of the top 100 blogs for lawyers from 2013 to 2018. Josh grew up in Silicon Valley and is a graduate of UC Davis with a degree in Political Science and earned his law degree from McGeorge School of Law, University of the Pacific. Josh enjoys organizing panels and mock trials at comic conventions, photography, and volunteering in Scouting.
Jason Yao (Wanhuida IP), Mingming Yang (Wanhuida IP), Tom Phillips (WIPR)Recorded: Jul 28 202060 mins
It’s extremely frustrating for brand owners, especially small and medium-sized enterprises, to realise when they plan to launch their products into the China market that their trademarks have been registered by someone else.
This frustration is understandable, and in this webinar, we hear from those who have been vigorously pushing the Chinese legislative authorities to reform the trademark registration regulations, reforms that have recently come to fruition with many positive changes to the Trademark Office, as well as to the Trademark Law.
This webinar will bring you the most up-to-date changes to the trademark registration system and laws in order to deal with bad faith trademark applications. We will also share with you first-hand experiences and strategies in dealing with bad faith registrations, including:
The latest changes to the Trademark Law in China;
How to deal with bad faith trademark registration: opposition; invalidation; cancellation; civil litigations; administrative enforcement actions; and Case study and Q&A.
Gautam Baghel, Global Technical Alliances, Synopsys and Dave Meurer, Partner Solutions ArchitectRecorded: Jul 28 202057 mins
Synopsys and Red Hat team up once again to bring you the best in class solution to secure your "Dev" & "Ops" pipeline without compromising speed. Red Hat Openshift's secure-by-design platform provides operations teams with an out of the box secure Kubernetes deployment and Synopsys application security tools ensure development teams build secure applications and images with high quality. Combining the capabilities of Red Hat and Synopsys together is key in making sure that deployed applications are less susceptible to attacks.
Join the experts from Red Hat and Synopsys as they present and demonstrate:
* Augmenting Red Hat's secure-by-design OpenShift platform
* Consolidating Containerized Application Security Perspectives
* Integrating Synopsys’ Application Security testing (AST) solutions into Tekton-based OpenShift Pipelines
* Application and Host Container Security with CoreOS, Quay & Black Duck
* Reducing false positives by combining Security feeds with OVAL, RHSA and BDSA
Join this webinar and listen to experts discussing how AI has impacted their field and the ways in which their organizations are using AI technologies to develop IP strategies that enhance data driven approaches through closer collaboration, accurate benchmarking and competitor tracking.
Poh-Kam Wong, Tony Trippe, Robert Sobel, Andy Xiang and Cloud LeiRecorded: Jul 24 202052 mins
Join this webinar with industry experts from Europe, North America and Asia to understand how they are innovating in the new world and how IP, R&D and Innovation professionals can better equip their companies and teams to innovate faster, smarter and better despite the challenges of these unprecedented times.
Danny Ogburn & Matt Jacobs at SynopsysRecorded: Jul 23 202046 mins
Synopsys is an active acquirer with more than 80 deals over the last 33 years. In addition to having a thorough tech due diligence process, we structure our M&A agreements to minimizing license, security, and code quality risks in the software we’re acquiring. We’re offering a peek at our approach.
Join us for this live webinar as we talk through how to minimize risk and maximize value with every transaction. We’ll cover:
· The use of open source in targets’ offerings
· Ensuring intellectual property value
· Protecting against known vulnerabilities in open source components
· Other elements of security and code quality
· How software audits help inform reps and warranties
Don’t miss this informational webinar. Register today.
Robert Keeling, Partner and Ray Mangum, Sr Litigation Associate of Sidley AustinRecorded: Jul 23 202060 mins
Addressing Privacy Concerns in eDiscovery Under the Existing Proportionality Framework
Robert Keeling, Partner and Ray Mangum, Sr Litigation Associate of Sidley Austin point to an emerging consensus of courts and commentators that privacy may—indeed, should—be considered as part of the proportionality analysis required under Rule 26(b)(1). Drawing from their recently published article, The Burden of Privacy, Robert and Ray offer some practical tips for litigators and eDiscovery professionals to consider as a consequence.
Doug Austin, Tom O'Connor & Mary MackRecorded: Jul 22 202063 mins
The COVID-19 pandemic hasn’t stopped the flow of important and impactful eDiscovery and data privacy related case law decisions! Our inaugural monthly webinar of cases covered by the eDiscovery Today blog discusses key cases related to potential sanctions for spoliation of electronically stored information (ESI), as well as key cases related to data privacy and rights of litigants in civil and criminal cases.
Join Doug Austin, Editor of eDiscovery Today, Mary Mack, CEO of EDRM and Tom O’Connor, Director of Gulf Legal Technology Center as they discuss important rulings that may impact how you conduct discovery in the future. Topics to be addressed include:
+ How GDPR can affect your personal social media posts
+ Fourth Amendment protection of mobile device examination by law enforcement
+ GDPR protection for litigants in responding to discovery requests
+ Discretion of courts to impose sanctions for spoliation of ESI
+ Whether form of production and spoliation sanctions can interrelate
+ How a court order can impact imposition of spoliation sanctions
Doug Austin, Editor, eDiscovery Today
Mary Mack, CEO and Chief Legal Technologist, EDRM
Tom O’Connor, Director, Gulf Legal Technology Center
Rob Haines, Senior Sales Engineer, SynopsysRecorded: Jul 22 202051 mins
So you’ve decided (or been told) that you need to implement SAST in your software development process. But SAST is not a one-size-fits-all solution, and implementation often requires a compromise between technology, time, process, and people—especially people. In this webinar, we’ll look at common objections and pitfalls that you might encounter along the way.
• What you should look for in a tool
• Considerations for implementing SAST
• Importance of the process (getting a good return on your investment)
• High-quality and more secure software
Enzo Lisciotto & Josh MehlmanRecorded: Jul 22 202043 mins
In a story plucked from the headlines, a financial institution needed to investigate claims that its employees had made illegal insider trades - with 2.7 million documents of potential evidence and just ten weeks to find an answer. Join Nuix APAC eDiscovery lead Enzo Lisciotto to learn how the investigative team:
• Applied analytics and artificial intelligence to reduce millions of items to just a few thousand that needed human review
• Used linguistic clues to find evidence that keyword searches would never have identified
• Caught the bad guys within the deadline.
Enzo will demonstrate Nuix Discover® analytics techniques used in this investigation including Mines, Document Maps, Communication Networks and Continuous Active Learning.
Deanna Blomquist, Ryan Zilm, Charisse Fletcher & Dan NicholsRecorded: Jul 21 202061 mins
Understanding all of the systems being used across your company has been a growing challenge for many years, with many companies just starting to get a handle managing a data map of all the applications that are in use. Now, in light of the "new normal" of distributed teams, it's time to reassess. Did you have to add virtual access systems for sensitive on premises data? What collaboration and conferencing tools have had to be added? We'll discuss this and areas you may not have yet considered with an eye toward information governance best practices and regulatory compliance.
Sandesh Mysore Anand, Managing Consultant at Synopsys and Rakshitha R Rao, Security Consultant at SynopsysRecorded: Jul 15 202062 mins
While digital transformation and BYOD have allowed many IT activities to occur remotely, many enterprises still prefer to perform security testing on-site. Concerns about data security, network/application accessibility, assessment quality and project management have discouraged teams from making the leap. In this webinar, we leverage lessons learned from many years of delivering Managed Application Security Services to provide guidelines on addressing these concerns and offer solutions on how to conduct remote security testing and security training.
Dr. Dennis Kengo Oka, Principal Automotive Security Strategist, SynopsysRecorded: Jul 15 202072 mins
Modern vehicles run on software containing more than 150 million lines of code. As a result of more advanced safety-relevant functionality, such as ADAS and autonomous driving, as well as new communication interfaces, mobile apps, and back-end servers based on connected car use cases, the need for developing secure systems in the automotive industry is higher than ever. A draft of the new cyber security standard ISO/SAE 21434 was recently released to help automotive companies address cyber security for the entire vehicle life cycle.
This talk presents cyber security activities in the software development process based on ISO/SAE 21434 to help automotive companies develop more secure systems. We’ll provide examples of what is required from a resources and tools perspective to ensure an efficient and practical implementation of the various cyber security steps in the development process.
Fred Felman (Appdetex), Fabricio Vayra (Perkins Coie), Peter Scott (WIPR)Recorded: Jul 14 202065 mins
The first half of 2020 has brought dramatic changes to how we work and live, with sharp increases in remote work arrangements and use of e-commerce and mobile apps.
Bad actors, poised to take advantage of any rising trend in business and consumer behaviour, are capitalising on the pandemic across multiple vectors as digital channels grow in importance.
What are the implications for intellectual property and brand protection professionals, and will those implications extend beyond this crisis period? Did the recent ICANN meeting identify any changes to the availability of WHOIS or other relief for brand protection professionals?
This webinar examines trends in online brand abuse, describing the latest scams and statistics, and recommending how you can best position your online brand protection strategy to mitigate the effects of abuse.
Trusted brands have never been more important. This webinar will provide insight and practical guidelines so you can elevate the security posture of your brand during this period of rapid shifts and heightened risk.
John Martin (Partner, Nelson Mullins Encompass), Travis Bustamante (Partner, Nelson Mullins Encompass), Mallory AchesonRecorded: Jul 14 202060 mins
The COVID pandemic has affected all aspects of our lives, both at home and at work, and this is true for e-discovery as well. This session will present different e-discovery challenges facing companies with remote work in 2020, including issues relating to rapid deployment, information governance, preservation, collection, and security, and provide suggestions for how attorneys and clients can navigate these e-discovery issues during these uncertain times.
Speakers: John Martin (Partner, Nelson Mullins Encompass), Travis Bustamante (Partner, Nelson Mullins Encompass), Mallory Acheson (Head of Analytics, Nelson Mullins Encompass)
Caitlin Reinmuth, Product Marketing Manager; Chris Rauen, Solutions ArchitectAug 11 20205:00 pmUTC53 mins
Technology modernization in the legal world has evolved from upgrading operating systems and adopting modern word processors, to moving critical workflows like ediscovery to the cloud. However, according to the 2019 ILTA Technology Survey, only 33% of law firms had a cloud-based ediscovery solution, with 15% looking to move to the cloud in the next 12 months. Recent global events like the coronavirus pandemic are forcing law firms and their IT teams to accelerate the transition to modern, cloud-based ediscovery platforms for their remote teams.
Join Everlaw's Caitlin Reinmuth, Product Marketing Manager, and Chris Rauen, Solutions Architect, as they discuss how firms can transition to the cloud — piecemeal or entirely — to leverage the benefits of:
- Empowering remote teams to collaborate on any stage, from anywhere
- Scaling workflows based on caseloads, seamlessly
- Recovering costs at different stages of ediscovery
- Relying on enterprise-grade security for data protection and privacy
Tim Mackey, Principal Security Strategist at Synopsys & Gordon Haff, Technology Evangelist at Red HatAug 11 20205:00 pmUTC60 mins
The adoption of open source continues to grow rapidly, both in market share and in its strategic importance to businesses. Understanding how organizations use open source and do so in a way that minimizes risk is therefore essential to both an overall IT strategy and cyber security response plans. These are among the topics we’ll investigate in this joint webinar from Red Hat and Synopsys. Drawing from Red Hat’s “The State of Enterprise Open Source” report, technology evangelist Gordon Haff will explain why IT decision makers value open source so highly and the processes that commercial open source vendors put in place to protect their customers from vulnerabilities.
At the same time, changing development practices and escalating threats mean that security remains a concern with respect to open source software, as it is for IT more broadly. Tim Mackey, Principal Security Strategist from Synopsys will walk through findings from the Synopsys “2020 Open Source Security and Risk Analysis” report with an eye on how teams can use the data to inform their overall open source governance plans.
We’ll close with some practical advice about getting the most value from open source software while keeping your organization safe.
Chandu Ketkar, Senior Consultant and Andre Joseph, Consultant at SynopsysAug 12 20201:00 pmUTC60 mins
Including threat modeling early in the software development process can ensure your organization is building security into your applications. For applications that are further along in development or currently launched, it can help you pinpoint the need for additional security testing.
Threat modeling identifies the types of threats that are applicable in the context of the application and its environment. Knowledge of such threats, along with their likelihood and impact, enables us to secure our design in anticipation, identify security requirements early, and inform downstream security testing.
There are many threat modeling approaches out there. In this webinar, we provide insights into Synopsys’ threat modeling approach, which has evolved as we’ve conducted threat assessments for various types of applications for our clients.
John Tredennick, Tom Gricks, Jeremy Pickens & Mary MackAug 12 20206:00 pmUTC60 mins
Your favorite TAR Talk boys, John Tredennick, Founder Director of Merlin Foundation and CEO of Merlin Digital Magic and Tom Gricks, Managing Director of Professional Services at OpenText are back with a new episode, and a new regular on the porch--Dr. Jeremy Pickens, Principal Data Scientist at OpenText. Join us (but keep your social distance) on our virtual rockers as we
talk about AI, Machine Learning, and the future of AI in legal.
Tune in live on July 30th at 2 pm ET or catch the recorded podcast at https://www.edrm.net/events-2/webinars/ or TARTalk.org.
Martin Bonney (Panoram), Neil Thomas (Nuix), & Vince Neicho (Integreon)Aug 18 20201:00 pmUTC60 mins
COVID-19 has led to a huge increase in online meetings around the world, as companies large and small have been forced to adapt to remote working setups. During this webinar, we’ll look at the stats, intersections between online meetings and other data sources—notably chat and email—and some of the challenges facing legal, technical, and review teams. We’ll also talk about the parallels between audio and video along with a sample workflow for dealing with chat, audio, and video.
If you’ve asked yourself any of the following questions recently, this webinar is for you:
• What meetings should your organization record? Are there data privacy, HR, or other issues?
• Where is meeting recording data stored and how is it collected or retrieved?
• How can we optimize and standardize recordings for review?
• How much time will it take to review recordings?
Tara Jones, Brett Tarr, Tiana Van Dyk & Michael HamiltonAug 18 20205:00 pmUTC75 mins
FACT: The most expensive stage in e-discovery is document review, often accounting for 80% or more of total e-discovery costs.
Unfortunately though, many legal departments haven't seen their document review costs decline. Attempts often fail because they don't get to the root of the problem: too much data is preserved, collected and sent to outside entities.
In the third webcast in Exterro’s E-Discovery Masters Series, a panel of experts from Verizon Media, Ernst & Young and Epiq will discuss the best approaches for implementing Legal GRC protocols that create an efficient and cost effective e-discovery strategy.
Register for this upcoming webcast and learn:
- Practices for identifying responsive data at the earliest stages in the matter
- Why a Legal GRC strategy is a must have to streamline data requests that legal must manage
- How to update and modify your information governance and e-discovery preservation / collection processes to see immediate benefits
- Tara Jones, Legal Services Manager, Verizon Media (https://www.linkedin.com/in/tara-jones-mba-1aaaa43/)
- Brett Tarr, IG & Legal Operations, Ernst & Young (https://www.linkedin.com/in/bretttarr/)
- Tiana Van Dyk, Director of Client Solutions, Epiq (https://www.linkedin.com/in/tianavandyk/)
Andrew Katz, Moorcrofts & Matt Jacobs, SynopsysAug 20 20204:00 pmUTC60 mins
OpenChain standardizes license compliance requirements around the use of open source software in the supply chain. Customers purchasing from an OpenChain compliant company know that the software has been developed in line with a set of documented and tested procedures and that all the relevant meta data (SBOMs and compliance notices) is available. So what does that mean for you?
Join us for a live webinar to learn why companies like Scania (Volkswagen group), Cisco, ARM, Facebook, Uber, Google, Microsoft, Sony and Qualcomm rely on OpenChain. We’ll cover:
•The history of OpenChain, steps to compliance and overall benefits
•How OpenChain scales, and works for companies large and small
•What happens when the 2.1 specification becomes an ISO standard in September 2020
Don’t miss this informative webinar. Register today.
Alex Chatzistamatis and Hoke SmithAug 20 20205:00 pmUTC60 mins
Many enterprises struggle with identifying, planning, and implementing the core capabilities needed to prevent insider threats within the organization. Executive-level questions and concerns about whether the investments required for enterprise-scale tools are justified by insider threat risk alone make it a strategically tricky initiative to sufficiently fund and fully execute.
Join this webinar with Nuix solution experts to learn:
• Why your insider threat tools and software need to address three core insider threat capabilities: threat detection, triage, and investigation
• How these capabilities work together to prevent insider theft of intellectual property
• The additional areas of risk these core capabilities support.
Static application security testing (SAST) is critical for uncovering and eliminating issues in proprietary code. However, over 60% of the code in an average application today is composed of open source components. SAST isn’t designed to find open source vulnerabilities (CVEs) or identify open source licenses. And manually maintaining a repository of approved open source components for developers is inefficient and time consuming. That’s where software composition analysis (SCA) comes in.
Join Utsav Sanghani, product manager, as he explores the benefits of bringing SAST and SCA together. He’ll explain why using an SCA tool to scan open source dependencies is as imperative to a software development strategy as using SAST to test proprietary code. He’ll also demonstrate how developers, by combining SAST and SCA analysis in the IDE, can address issues holistically as they code, saving time and increasing productivity so they can deliver secure, high-quality software faster.
Jennifer Roberts, Product Marketing Manager; Isabela Reid, Product Marketing ManagerAug 25 20205:00 pmUTC45 mins
Managing multiple matters while safeguarding client data is undeniably difficult. With the recent shift to remote work, litigation support managers and other administrators now have the extra responsibilities of maintaining data security and ensuring ediscovery teams have access to the right documents and cloud-based tools. Additionally, complex matters require strict information governance and adherence to compliance guidelines. Security is more of a pressing issue now than ever before, but legal budgets and timelines remain tight. The right ediscovery solution must ensure that secure workflows go hand in hand with efficient workflows.
Join Everlaw's Product Marketing Managers, Jennifer Roberts and Isabela Reid, as they show how the platform enables review administrators to accelerate the process of getting new cases up and running, increase control over their databases, and collaborate securely in a remote work environment.
Maura Grossman, Hon. Ira Warshawsky, Hon. Frank Maas, Hon. Kristen L. MixAug 25 20205:00 pmUTC75 mins
In January 2019, the ABA published a new set of guidelines concerning the use of special masters. Despite their contribution to "just, speedy and inexpensive" resolution of issues, the use of special masters remains an underutilized form of dispute resolution. Join this all-star panel as they explore the pros and cons and share their thoughts on best practices to maximize benefits while mitigating the potential downsides.
Maura R. Grossman
University of Waterloo
Maura R. Grossman, J.D., Ph.D., is a Research Professor in the School of Computer Science at the University of Waterloo and an Adjunct Professor at Osgoode Hall Law School of York University, both in Ontario, Canada. She also is Principal at Maura Grossman Law, an eDiscovery law and consulting firm in Buffalo, N.Y.
Hon. Frank Maas
Judge Maas is a United States Magistrate Judge for the Southern District of New York.
Hon. Ira B. Warshawsky
Justice Ira B. Warshawsky, ret. is Of Counsel in the Litigation and Alternative Dispute Resolution practices at Meyer, Suozzi, English & Klein, P.C. in Garden City, Long Island, N.Y.
Hon. Kristen L. Mix
U.S. District Court, District of Colorado
Kristen L. Mix graduated from Middlebury College, cum laude, with a degree in English. She obtained her J.D. from the University of Colorado School of Law and practiced law in Denver until 2007, when she was appointed to the federal bench. Magistrate Judge Mix's expertise prior to her appointment was in labor and employment law. Magistrate Judge Mix serves on the Judicial Conference of the United States' Committee on the Administration of the Magistrate Judge System and on the United States District Court for the District of Colorado's Local Rules Committee.
Nuix Discover employs cutting edge user experience design to help users easily understand complex data sets immediately. Whether viewing reviewer progress, case metrics, or portal metrics, Nuix Discover has a dashboard to help you better understand and share the critical eDiscovery metrics that legal teams need to succeed. In this session we focus on several key dashboards and how you can use them drive review efficiency with Nuix Discover.
Andy Ward, Matthew Geaghan, Alex Chatzistamatis, & John BargielSep 15 20202:30 pmUTC60 mins
Our software has evolved over the years, but many of its core features and functions remain largely unchanged. Because of that, there are some long-standing tips and tricks that Nuix veterans use that have stood the test of time and make every use case in Nuix easier to complete.
If you’re new to Nuix or a long-time user, you can benefit from these pro tips, many of which aren’t as widely known as they should be. This will be a must-watch as Nuix veterans Matthew Geaghan, Andy Ward, Alex Chatzistamatis, and John Bargiel challenge each other with their knowledge of the software and welcome questions from the audience.
Miriam Ballhausen, Bird & Bird & Matt Jacobs, SynopsysSep 30 20204:00 pmUTC60 mins
Free and Open Source Licenses are enforced by copyright owners globally, but by far most frequently in Germany. Overall, approximately 100 enforcement claims are initiated against companies. Global players may be targeted just as likely as SMEs. But how is that even possible, if Free and Open Source Licenses allow everyone to do everything with the code they apply to? And what does enforcement mean in practice? This talk will give a brief overview over the legal background to set the scene for a look into how enforcement works (at least in Germany). It will then lay out the aspects that companies should look out for, how tooling may help both on the claimant’s and the defendant’s side and how companies may protect themselves against enforcement.
In this short overview, we will take a quick look at a few of the concepts and analytics that will be discussed in Nuix Training to mimic a Nuix eDiscovery workflow from beginning to end. In training, we will explore what happens when you receive data, how to get it into Nuix, and how we can use techniques in Nuix to analyze, search, and cull data all the way to a production and legal export.