Hi [[ session.user.profile.firstName ]]

Intellectual Property

  • Search Term Families: Creating, Searching, Browsing, and Driving Analytics
    Search Term Families: Creating, Searching, Browsing, and Driving Analytics
    Neal Carter Recorded: Aug 6 2020 60 mins
    Come join us for a session on all about search term families! We’ll set up a search term family together, see how it speeds up our review in conjunction with list, browse, and map, and use Nuix Discover’s analytics tool for data analysis with search terms.
  • JOB SEARCH WORKSHOP: "How to Have Certainty in Uncertainty"
    JOB SEARCH WORKSHOP: "How to Have Certainty in Uncertainty"
    Laureen Kautt & Mary Mack Recorded: Aug 6 2020 61 mins
    LegalTech Recruiter Laureen Kautt is joined by EDRM's CEO Mary Mack introducing the first in a series of workshops designed to help the global community seeking employment in a pandemic. New tools and a shift in mindset are needed to navigate the changing currents.
  • Antibody patents: maximising value in Europe and beyond
    Antibody patents: maximising value in Europe and beyond
    Tom Leonard (Kilburn & Strode), Alison Care (Kilburn & Strode), Dave Wortley (Kilburn & Strode), Tom Phillips (WIPR) Recorded: Aug 5 2020 60 mins
    Antibody Patents: Maximising value in Europe and beyond

    Join antibody experts and European Patent Attorneys Tom Leonard, Alison Care and Dave Wortley of Kilburn & Strode for a 60 minute webinar discussion on the latest developments in antibody patenting on Wednesday 5th August 2020 at 4.30pm BST (8.30am West Coast, 11.30am East Coast, 5.30pm Central European Time).

    Drawing on both private practice and in-house experience, this in-depth webinar has been specifically curated for those working in the antibody field, including private practice attorneys, in-house counsel and others involved in the development and marketing of antibodies. We will explore best practice for:

    · Drafting applications, including how to maximise potential claim scope where possible and what data to include to support your claims

    · Patent filing and IP strategies, including when and where to file

    · Prosecution of global portfolios, taking into account how different patent offices examine applications relating to antibodies

    · The preparation of freedom-to-operate and landscaping opinions to best inform the business or to prepare yourself for third-party due diligence

    This webinar will run for 1 hour.
  • 5 Steps to Integrate SAST into the DevSecOps Pipeline
    5 Steps to Integrate SAST into the DevSecOps Pipeline
    Meera Rao, Senior Director Product Management, Synopsys Recorded: Aug 5 2020 60 mins
    Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t have the resources to perform code reviews and provide remediation guidance on the entire application portfolio. Static analysis, also known as static application security testing (SAST), is an automated way to find bugs, back doors, and other code-based vulnerabilities so the team can mitigate those risks.

    First, though, you must choose a static analysis model that fits your needs. You might have questions such as these:
    - How do I manage false positives?
    - How do I triage the results?
    - What happens to new issues identified?
    - My scan takes hours to complete. How can I use this tool in my DevSecOps pipeline?
    - What is a “baseline scan”?

    Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we’ve helped other organizations with this process.
  • Masterclass: The Current and Future State of the Legal Technology Job Market
    Masterclass: The Current and Future State of the Legal Technology Job Market
    Jared Coseglia, Mary Mack & Kaylee Walstad Recorded: Aug 4 2020 64 mins
    TRU Founder and CEO Jared Coseglia sits down with EDRM's Mary Mack and Kaylee Walstad to deliver an update on where the e-discovery, cybersecurity, and privacy job markets are today as they adapt to the ongoing pandemic while keeping up with the ever-evolving legal tech landscape. Jared will break down where the hiring is now and where it will be later in Q3 and into Q4, how legal tech pros can leverage certification and training to stay at the forefront of the industry in response to new questions about data management and protection, and the larger trends that will define the rest of 2020
  • [Podcast] Musings with Marc & Mary:
    [Podcast] Musings with Marc & Mary:
    Marc Zamsky, COO, Compliance, Mary Mack, CEO, EDRM & Drew Yoder, Citgo Recorded: Jul 30 2020 24 mins
    Monthly musing on the happenings in eDiscovery and beyond with guest Drew Yoder, Citgo
  • Transitioning Federal Agencies to the Cloud: Finding the Right Functionality Fit
    Transitioning Federal Agencies to the Cloud: Finding the Right Functionality Fit
    Angela Kovach, Senior Federal Solutions Architect; Caitlin Reinmuth, Product Marketing Manager Recorded: Jul 30 2020 29 mins
    When the Coronavirus Aid, Relief, and Economic Security Act or the CARES Act was passed into law on March 27, 2020, the package included significant funds for Federal agencies to expand bandwidth capabilities and make new technology procurements. The pandemic has highlighted the fact that long-term mission continuity is only possible through rapid modernization and workforce adaptation.

    One of the fastest routes to IT modernization lies in the adoption of cloud computing technology. By leveraging cloud technology, agencies can rapidly implement new technologies while also saving costs that used to be allocated to data center maintenance. But perhaps most importantly, cloud technology empowers federal employees to access mission critical resources from wherever they may be working. Everlaw is a cloud-native ediscovery solution, optimized for self-service and instant deployment. Already equipped to support the federal government’s IT transformation, Everlaw expedites procurement for quicker access to an integrated, modern ediscovery solution.

    This webinar series will focus on the considerations of federal agencies as they make the transition to the cloud, with the focus being on finding the right functionality fit. In this webinar we will discuss:

    - Features vs. Functionality - what’s the difference and why does it matter?
    - How to prioritize the functionality that matters most for mission performance.
    - Balance cost with technical requirements - how to find a balance between budgetary constraints and a technically acceptable solution.
  • Your Developers Aren’t Security Experts - But They Can Be With the Right Tools
    Your Developers Aren’t Security Experts - But They Can Be With the Right Tools
    Patrick Carey, Director Product Marketing, Synopsys and Sandy Carielli, Principal Analyst, Forrester Research, Inc. Recorded: Jul 30 2020 51 mins
    Securing your applications is critical, but maintaining release velocity and developer productivity is just as important. Let’s face it: Developers aren’t security experts. They unwittingly introduce security weaknesses and vulnerable open source components into your applications, and they’re ultimately responsible for fixing any issues that surface. But what if you could equip developers with the tools and information they need to prevent security issues from ever making it into your codebase, without creating unnecessary friction or slowing them down?

    Join guest presenter Sandy Carielli, Principal Analyst, Forrester Research, Inc., and Patrick Carey, Synopsys, as they discuss the benefits of IDE-based security testing and the role developers can play in securing your applications.
  • When to use conditional coding
    When to use conditional coding
    Emily Tice Recorded: Jul 30 2020 46 mins
    Nuix Discover Power User Webinar Series

    Nuix Discover’s Conditional Coding streamlines the coding process to reduce reviewer fatigue, improve consistency, and increase scalability. It also produces a much richer set of coding decisions, which can help legal teams develop more nuanced case strategies. During this webinar we will show you when and how to use this important addition to Nuix Discover’s review experience.
  • Ethical Considerations and Use of AI to Identify Personal Health Information
    Ethical Considerations and Use of AI to Identify Personal Health Information
    Mallory Acheson – Head of Analytics & Lucie Cohen – Partner Nelson Mullins Recorded: Jul 29 2020 55 mins
    On trend with the recent uptick in the use of artificial intelligence (AI) in the legal industry and the rise in privacy concerns, we will address ethical duties surrounding the use of AI, specifically for identifying personal information within a dataset. The legal-tech community has seen a rise in technologies designed to not only identify PHI and PII within a data set, but claiming to have the capability to automatically redact, pseudonymize, and even create notification lists for data breaches. While these technologies offer significant efficiencies and cost savings, they raise questions regarding how much knowledge, supervision, and reliance may be given, implicating multiple ethical considerations, including MRCP Rule 1.1 regarding attorney competence (specifically comment 8 on knowledge of risks and benefits with technology), Rule 1.6 surrounding confidentiality requirements, Rule 5.1 regarding attorney duties of supervision, and ABA and other state ethics issued guidelines.
  • Redefining the Art & Science of Manual Review
    Redefining the Art & Science of Manual Review
    Ian Campbell, Mike Fedorowski and Josh Gilliland Recorded: Jul 28 2020 61 mins
    "Redefining the Art & Science of Manual Review
    6 ways to optimize efficiency in a remote world"

    Join us for a webinar focusing on the manual review feature ‘OVERSIGHT” in iCONECT’s new v10 eDiscovery platform.
    An AI-based quality control software that can be applied to any review, in-process or new, without changing or disrupting your current workflow.
    Ideal for teams that use it for quality control for linear review, to identify and correct review.

    Featuring Ian Campbell, CEO of iCONECT, Mike Fedorowski, Senior Manager of Business Development at iCONECT and Josh Gilliland.

    Joshua Gilliland - Twitter: @bowtielaw Josh@bowtielaw.com

    Joshua Gilliland is a California attorney creator of the eDiscovery blog Bow Tie Law and has presented at over 400 eDiscovery seminars and webinars. Josh is co-creator of The Legal Geeks blog and podcast, which has made the ABA Journal as one of the top 100 blogs for lawyers from 2013 to 2018. Josh grew up in Silicon Valley and is a graduate of UC Davis with a degree in Political Science and earned his law degree from McGeorge School of Law, University of the Pacific. Josh enjoys organizing panels and mock trials at comic conventions, photography, and volunteering in Scouting.
  • How to Deal with Bad Faith Trademark Registrations in China
    How to Deal with Bad Faith Trademark Registrations in China
    Jason Yao (Wanhuida IP), Mingming Yang (Wanhuida IP), Tom Phillips (WIPR) Recorded: Jul 28 2020 60 mins
    It’s extremely frustrating for brand owners, especially small and medium-sized enterprises, to realise when they plan to launch their products into the China market that their trademarks have been registered by someone else.

    This frustration is understandable, and in this webinar, we hear from those who have been vigorously pushing the Chinese legislative authorities to reform the trademark registration regulations, reforms that have recently come to fruition with many positive changes to the Trademark Office, as well as to the Trademark Law.

    This webinar will bring you the most up-to-date changes to the trademark registration system and laws in order to deal with bad faith trademark applications. We will also share with you first-hand experiences and strategies in dealing with bad faith registrations, including:

    The latest changes to the Trademark Law in China;

    How to deal with bad faith trademark registration: opposition; invalidation; cancellation; civil litigations; administrative enforcement actions; and Case study and Q&A.
  • Secure your "Dev" and "Ops" Pipeline with Synopsys and Red Hat
    Secure your "Dev" and "Ops" Pipeline with Synopsys and Red Hat
    Gautam Baghel, Global Technical Alliances, Synopsys and Dave Meurer, Partner Solutions Architect Recorded: Jul 28 2020 57 mins
    Synopsys and Red Hat team up once again to bring you the best in class solution to secure your "Dev" & "Ops" pipeline without compromising speed. Red Hat Openshift's secure-by-design platform provides operations teams with an out of the box secure Kubernetes deployment and Synopsys application security tools ensure development teams build secure applications and images with high quality. Combining the capabilities of Red Hat and Synopsys together is key in making sure that deployed applications are less susceptible to attacks.

    Join the experts from Red Hat and Synopsys as they present and demonstrate:
    * Augmenting Red Hat's secure-by-design OpenShift platform
    * Consolidating Containerized Application Security Perspectives
    * Integrating Synopsys’ Application Security testing (AST) solutions into Tekton-based OpenShift Pipelines
    * Application and Host Container Security with CoreOS, Quay & Black Duck
    * Reducing false positives by combining Security feeds with OVAL, RHSA and BDSA
  • Connected Innovation Intelligence Tours
    Connected Innovation Intelligence Tours
    Vik Pant Recorded: Jul 27 2020 57 mins
    Join this webinar and listen to experts discussing how AI has impacted their field and the ways in which their organizations are using AI technologies to develop IP strategies that enhance data driven approaches through closer collaboration, accurate benchmarking and competitor tracking.
  • East Meets West
    East Meets West
    Poh-Kam Wong, Tony Trippe, Robert Sobel, Andy Xiang and Cloud Lei Recorded: Jul 24 2020 52 mins
    Join this webinar with industry experts from Europe, North America and Asia to understand how they are innovating in the new world and how IP, R&D and Innovation professionals can better equip their companies and teams to innovate faster, smarter and better despite the challenges of these unprecedented times.
  • Crafting Reps and Warranties to Reduce Open Source Risk in M&A Transactions
    Crafting Reps and Warranties to Reduce Open Source Risk in M&A Transactions
    Danny Ogburn & Matt Jacobs at Synopsys Recorded: Jul 23 2020 46 mins
    Synopsys is an active acquirer with more than 80 deals over the last 33 years. In addition to having a thorough tech due diligence process, we structure our M&A agreements to minimizing license, security, and code quality risks in the software we’re acquiring. We’re offering a peek at our approach.

    Join us for this live webinar as we talk through how to minimize risk and maximize value with every transaction. We’ll cover:

    · The use of open source in targets’ offerings

    · Ensuring intellectual property value

    · Protecting against known vulnerabilities in open source components

    · Other elements of security and code quality

    · How software audits help inform reps and warranties

    Don’t miss this informational webinar. Register today.
  • Practical, Proportional Privacy in Discovery
    Practical, Proportional Privacy in Discovery
    Robert Keeling, Partner and Ray Mangum, Sr Litigation Associate of Sidley Austin Recorded: Jul 23 2020 60 mins
    Addressing Privacy Concerns in eDiscovery Under the Existing Proportionality Framework

    Robert Keeling, Partner and Ray Mangum, Sr Litigation Associate of Sidley Austin point to an emerging consensus of courts and commentators that privacy may—indeed, should—be considered as part of the proportionality analysis required under Rule 26(b)(1). Drawing from their recently published article, The Burden of Privacy, Robert and Ray offer some practical tips for litigators and eDiscovery professionals to consider as a consequence.
  • Important eDiscovery Case Law Decisions for July 2020
    Important eDiscovery Case Law Decisions for July 2020
    Doug Austin, Tom O'Connor & Mary Mack Recorded: Jul 22 2020 63 mins
    The COVID-19 pandemic hasn’t stopped the flow of important and impactful eDiscovery and data privacy related case law decisions! Our inaugural monthly webinar of cases covered by the eDiscovery Today blog discusses key cases related to potential sanctions for spoliation of electronically stored information (ESI), as well as key cases related to data privacy and rights of litigants in civil and criminal cases.

    Join Doug Austin, Editor of eDiscovery Today, Mary Mack, CEO of EDRM and Tom O’Connor, Director of Gulf Legal Technology Center as they discuss important rulings that may impact how you conduct discovery in the future. Topics to be addressed include:

    + How GDPR can affect your personal social media posts
    + Fourth Amendment protection of mobile device examination by law enforcement
    + GDPR protection for litigants in responding to discovery requests
    + Discretion of courts to impose sanctions for spoliation of ESI
    + Whether form of production and spoliation sanctions can interrelate
    + How a court order can impact imposition of spoliation sanctions

    Expert Presenters:
    Doug Austin, Editor, eDiscovery Today
    Mary Mack, CEO and Chief Legal Technologist, EDRM
    Tom O’Connor, Director, Gulf Legal Technology Center
  • Implementing SAST into your SDLC: What to look for & what to consider
    Implementing SAST into your SDLC: What to look for & what to consider
    Rob Haines, Senior Sales Engineer, Synopsys Recorded: Jul 22 2020 51 mins
    So you’ve decided (or been told) that you need to implement SAST in your software development process. But SAST is not a one-size-fits-all solution, and implementation often requires a compromise between technology, time, process, and people—especially people. In this webinar, we’ll look at common objections and pitfalls that you might encounter along the way.

    We'll cover:
    • What you should look for in a tool
    • Considerations for implementing SAST
    • Importance of the process (getting a good return on your investment)
    • High-quality and more secure software
  • Investigations Using Nuix Analytics & Artificial Intelligence
    Investigations Using Nuix Analytics & Artificial Intelligence
    Enzo Lisciotto & Josh Mehlman Recorded: Jul 22 2020 43 mins
    In a story plucked from the headlines, a financial institution needed to investigate claims that its employees had made illegal insider trades - with 2.7 million documents of potential evidence and just ten weeks to find an answer. Join Nuix APAC eDiscovery lead Enzo Lisciotto to learn how the investigative team:
    • Applied analytics and artificial intelligence to reduce millions of items to just a few thousand that needed human review
    • Used linguistic clues to find evidence that keyword searches would never have identified
    • Caught the bad guys within the deadline.

    Enzo will demonstrate Nuix Discover® analytics techniques used in this investigation including Mines, Document Maps, Communication Networks and Continuous Active Learning.
  • Assessing your Data Maps in a Newly Distributed World
    Assessing your Data Maps in a Newly Distributed World
    Deanna Blomquist, Ryan Zilm, Charisse Fletcher & Dan Nichols Recorded: Jul 21 2020 61 mins
    Understanding all of the systems being used across your company has been a growing challenge for many years, with many companies just starting to get a handle managing a data map of all the applications that are in use. Now, in light of the "new normal" of distributed teams, it's time to reassess. Did you have to add virtual access systems for sensitive on premises data? What collaboration and conferencing tools have had to be added? We'll discuss this and areas you may not have yet considered with an eye toward information governance best practices and regulatory compliance.

    Deanna Blomquist
    Title: Sr. Manager of IT-eDiscovery
    Company: Dish Network

    Charisse Fletcher
    JPMorgan Chase
    Assistant Vice President – Discovery Operations Team Lead

    Ryan M. Zilm
    Title: Director of Information Lifecycle Management
    Company: USAA
    Dan Nichols
    Title: Partner
    Company: Redgrave, LLP
  • Remote Security Testing & Training: Busting Myths and Offering Solutions
    Remote Security Testing & Training: Busting Myths and Offering Solutions
    Sandesh Mysore Anand, Managing Consultant at Synopsys and Rakshitha R Rao, Security Consultant at Synopsys Recorded: Jul 15 2020 62 mins
    While digital transformation and BYOD have allowed many IT activities to occur remotely, many enterprises still prefer to perform security testing on-site. Concerns about data security, network/application accessibility, assessment quality and project management have discouraged teams from making the leap. In this webinar, we leverage lessons learned from many years of delivering Managed Application Security Services to provide guidelines on addressing these concerns and offer solutions on how to conduct remote security testing and security training.
  • Secure Automotive Software Development in the Age of ISO/SAE 21434
    Secure Automotive Software Development in the Age of ISO/SAE 21434
    Dr. Dennis Kengo Oka, Principal Automotive Security Strategist, Synopsys Recorded: Jul 15 2020 72 mins
    Modern vehicles run on software containing more than 150 million lines of code. As a result of more advanced safety-relevant functionality, such as ADAS and autonomous driving, as well as new communication interfaces, mobile apps, and back-end servers based on connected car use cases, the need for developing secure systems in the automotive industry is higher than ever. A draft of the new cyber security standard ISO/SAE 21434 was recently released to help automotive companies address cyber security for the entire vehicle life cycle.

    This talk presents cyber security activities in the software development process based on ISO/SAE 21434 to help automotive companies develop more secure systems. We’ll provide examples of what is required from a resources and tools perspective to ensure an efficient and practical implementation of the various cyber security steps in the development process.
  • Brand Abuse: Fighting bad actors during the pandemic
    Brand Abuse: Fighting bad actors during the pandemic
    Fred Felman (Appdetex), Fabricio Vayra (Perkins Coie), Peter Scott (WIPR) Recorded: Jul 14 2020 65 mins
    The first half of 2020 has brought dramatic changes to how we work and live, with sharp increases in remote work arrangements and use of e-commerce and mobile apps.

    Bad actors, poised to take advantage of any rising trend in business and consumer behaviour, are capitalising on the pandemic across multiple vectors as digital channels grow in importance.

    What are the implications for intellectual property and brand protection professionals, and will those implications extend beyond this crisis period? Did the recent ICANN meeting identify any changes to the availability of WHOIS or other relief for brand protection professionals?

    This webinar examines trends in online brand abuse, describing the latest scams and statistics, and recommending how you can best position your online brand protection strategy to mitigate the effects of abuse.

    Trusted brands have never been more important. This webinar will provide insight and practical guidelines so you can elevate the security posture of your brand during this period of rapid shifts and heightened risk.
  • Remote E-Discovery in 2020
    Remote E-Discovery in 2020
    John Martin (Partner, Nelson Mullins Encompass), Travis Bustamante (Partner, Nelson Mullins Encompass), Mallory Acheson Recorded: Jul 14 2020 60 mins
    The COVID pandemic has affected all aspects of our lives, both at home and at work, and this is true for e-discovery as well. This session will present different e-discovery challenges facing companies with remote work in 2020, including issues relating to rapid deployment, information governance, preservation, collection, and security, and provide suggestions for how attorneys and clients can navigate these e-discovery issues during these uncertain times.

    Speakers: John Martin (Partner, Nelson Mullins Encompass), Travis Bustamante (Partner, Nelson Mullins Encompass), Mallory Acheson (Head of Analytics, Nelson Mullins Encompass)
  • Disruption as an Enabler for Change: Transforming Ediscovery in the Cloud
    Disruption as an Enabler for Change: Transforming Ediscovery in the Cloud
    Caitlin Reinmuth, Product Marketing Manager; Chris Rauen, Solutions Architect Aug 11 2020 5:00 pm UTC 53 mins
    Technology modernization in the legal world has evolved from upgrading operating systems and adopting modern word processors, to moving critical workflows like ediscovery to the cloud. However, according to the 2019 ILTA Technology Survey, only 33% of law firms had a cloud-based ediscovery solution, with 15% looking to move to the cloud in the next 12 months. Recent global events like the coronavirus pandemic are forcing law firms and their IT teams to accelerate the transition to modern, cloud-based ediscovery platforms for their remote teams.

    Join Everlaw's Caitlin Reinmuth, Product Marketing Manager, and Chris Rauen, Solutions Architect, as they discuss how firms can transition to the cloud — piecemeal or entirely — to leverage the benefits of:

    - Empowering remote teams to collaborate on any stage, from anywhere
    - Scaling workflows based on caseloads, seamlessly
    - Recovering costs at different stages of ediscovery
    - Relying on enterprise-grade security for data protection and privacy
  • The State of Open Source with Synopsys and Red Hat
    The State of Open Source with Synopsys and Red Hat
    Tim Mackey, Principal Security Strategist at Synopsys & Gordon Haff, Technology Evangelist at Red Hat Aug 11 2020 5:00 pm UTC 60 mins
    The adoption of open source continues to grow rapidly, both in market share and in its strategic importance to businesses. Understanding how organizations use open source and do so in a way that minimizes risk is therefore essential to both an overall IT strategy and cyber security response plans. These are among the topics we’ll investigate in this joint webinar from Red Hat and Synopsys. Drawing from Red Hat’s “The State of Enterprise Open Source” report, technology evangelist Gordon Haff will explain why IT decision makers value open source so highly and the processes that commercial open source vendors put in place to protect their customers from vulnerabilities.

    At the same time, changing development practices and escalating threats mean that security remains a concern with respect to open source software, as it is for IT more broadly. Tim Mackey, Principal Security Strategist from Synopsys will walk through findings from the Synopsys “2020 Open Source Security and Risk Analysis” report with an eye on how teams can use the data to inform their overall open source governance plans.

    We’ll close with some practical advice about getting the most value from open source software while keeping your organization safe.
  • Threat Modeling: A Synopsys Approach
    Threat Modeling: A Synopsys Approach
    Chandu Ketkar, Senior Consultant and Andre Joseph, Consultant at Synopsys Aug 12 2020 1:00 pm UTC 60 mins
    Including threat modeling early in the software development process can ensure your organization is building security into your applications. For applications that are further along in development or currently launched, it can help you pinpoint the need for additional security testing.
    Threat modeling identifies the types of threats that are applicable in the context of the application and its environment. Knowledge of such threats, along with their likelihood and impact, enables us to secure our design in anticipation, identify security requirements early, and inform downstream security testing.

    There are many threat modeling approaches out there. In this webinar, we provide insights into Synopsys’ threat modeling approach, which has evolved as we’ve conducted threat assessments for various types of applications for our clients.
  • TAR Talk:  We’re back with a new episode on AI, Machine Learning and the Future
    TAR Talk: We’re back with a new episode on AI, Machine Learning and the Future
    John Tredennick, Tom Gricks, Jeremy Pickens & Mary Mack Aug 12 2020 6:00 pm UTC 60 mins
    Your favorite TAR Talk boys, John Tredennick, Founder Director of Merlin Foundation and CEO of Merlin Digital Magic and Tom Gricks, Managing Director of Professional Services at OpenText are back with a new episode, and a new regular on the porch--Dr. Jeremy Pickens, Principal Data Scientist at OpenText. Join us (but keep your social distance) on our virtual rockers as we
    talk about AI, Machine Learning, and the future of AI in legal.

    Tune in live on July 30th at 2 pm ET or catch the recorded podcast at https://www.edrm.net/events-2/webinars/ or TARTalk.org.
  • Recording and Reviewing Online Meetings for eDiscovery Professionals
    Recording and Reviewing Online Meetings for eDiscovery Professionals
    Martin Bonney (Panoram), Neil Thomas (Nuix), & Vince Neicho (Integreon) Aug 18 2020 1:00 pm UTC 60 mins
    COVID-19 has led to a huge increase in online meetings around the world, as companies large and small have been forced to adapt to remote working setups. During this webinar, we’ll look at the stats, intersections between online meetings and other data sources—notably chat and email—and some of the challenges facing legal, technical, and review teams. We’ll also talk about the parallels between audio and video along with a sample workflow for dealing with chat, audio, and video.

    If you’ve asked yourself any of the following questions recently, this webinar is for you:
    • What meetings should your organization record? Are there data privacy, HR, or other issues?
    • Where is meeting recording data stored and how is it collected or retrieved?
    • How can we optimize and standardize recordings for review?
    • How much time will it take to review recordings?
  • New Techniques for Finding Relevant Data Faster
    New Techniques for Finding Relevant Data Faster
    Tara Jones, Brett Tarr, Tiana Van Dyk & Michael Hamilton Aug 18 2020 5:00 pm UTC 75 mins
    FACT: The most expensive stage in e-discovery is document review, often accounting for 80% or more of total e-discovery costs.

    Unfortunately though, many legal departments haven't seen their document review costs decline. Attempts often fail because they don't get to the root of the problem: too much data is preserved, collected and sent to outside entities.

    In the third webcast in Exterro’s E-Discovery Masters Series, a panel of experts from Verizon Media, Ernst & Young and Epiq will discuss the best approaches for implementing Legal GRC protocols that create an efficient and cost effective e-discovery strategy.

    Register for this upcoming webcast and learn:
    - Practices for identifying responsive data at the earliest stages in the matter
    - Why a Legal GRC strategy is a must have to streamline data requests that legal must manage
    - How to update and modify your information governance and e-discovery preservation / collection processes to see immediate benefits
    - Tara Jones, Legal Services Manager, Verizon Media (https://www.linkedin.com/in/tara-jones-mba-1aaaa43/)
    - Brett Tarr, IG & Legal Operations, Ernst & Young (https://www.linkedin.com/in/bretttarr/)
    - Tiana Van Dyk, Director of Client Solutions, Epiq (https://www.linkedin.com/in/tianavandyk/)
  • OpenChain - Reducing Risk and Friction in the Supply Chain
    OpenChain - Reducing Risk and Friction in the Supply Chain
    Andrew Katz, Moorcrofts & Matt Jacobs, Synopsys Aug 20 2020 4:00 pm UTC 60 mins
    OpenChain standardizes license compliance requirements around the use of open source software in the supply chain. Customers purchasing from an OpenChain compliant company know that the software has been developed in line with a set of documented and tested procedures and that all the relevant meta data (SBOMs and compliance notices) is available. So what does that mean for you?

    Join us for a live webinar to learn why companies like Scania (Volkswagen group), Cisco, ARM, Facebook, Uber, Google, Microsoft, Sony and Qualcomm rely on OpenChain. We’ll cover:

    •The history of OpenChain, steps to compliance and overall benefits
    •How OpenChain scales, and works for companies large and small
    •What happens when the 2.1 specification becomes an ISO standard in September 2020

    Don’t miss this informative webinar. Register today.
  • Stop Your IP From Walking out the Door: Insider Threat Prevention with Nuix
    Stop Your IP From Walking out the Door: Insider Threat Prevention with Nuix
    Alex Chatzistamatis and Hoke Smith Aug 20 2020 5:00 pm UTC 60 mins
    Many enterprises struggle with identifying, planning, and implementing the core capabilities needed to prevent insider threats within the organization. Executive-level questions and concerns about whether the investments required for enterprise-scale tools are justified by insider threat risk alone make it a strategically tricky initiative to sufficiently fund and fully execute.
    Join this webinar with Nuix solution experts to learn:
    • Why your insider threat tools and software need to address three core insider threat capabilities: threat detection, triage, and investigation
    • How these capabilities work together to prevent insider theft of intellectual property
    • The additional areas of risk these core capabilities support.
  • Why SAST and SCA Together Are Better, Faster, Stronger
    Why SAST and SCA Together Are Better, Faster, Stronger
    Utsav Sanghani, Senior Product Manager, Staff, Synopsys Aug 25 2020 6:00 am UTC 42 mins
    Static application security testing (SAST) is critical for uncovering and eliminating issues in proprietary code. However, over 60% of the code in an average application today is composed of open source components. SAST isn’t designed to find open source vulnerabilities (CVEs) or identify open source licenses. And manually maintaining a repository of approved open source components for developers is inefficient and time consuming. That’s where software composition analysis (SCA) comes in.

    Join Utsav Sanghani, product manager, as he explores the benefits of bringing SAST and SCA together. He’ll explain why using an SCA tool to scan open source dependencies is as imperative to a software development strategy as using SAST to test proprietary code. He’ll also demonstrate how developers, by combining SAST and SCA analysis in the IDE, can address issues holistically as they code, saving time and increasing productivity so they can deliver secure, high-quality software faster.
  • Secure, Efficient, Remote Review: Organization Administration Made Easy
    Secure, Efficient, Remote Review: Organization Administration Made Easy
    Jennifer Roberts, Product Marketing Manager; Isabela Reid, Product Marketing Manager Aug 25 2020 5:00 pm UTC 45 mins
    Managing multiple matters while safeguarding client data is undeniably difficult. With the recent shift to remote work, litigation support managers and other administrators now have the extra responsibilities of maintaining data security and ensuring ediscovery teams have access to the right documents and cloud-based tools. Additionally, complex matters require strict information governance and adherence to compliance guidelines. Security is more of a pressing issue now than ever before, but legal budgets and timelines remain tight. The right ediscovery solution must ensure that secure workflows go hand in hand with efficient workflows.

    Join Everlaw's Product Marketing Managers, Jennifer Roberts and Isabela Reid, as they show how the platform enables review administrators to accelerate the process of getting new cases up and running, increase control over their databases, and collaborate securely in a remote work environment.
  • Special Masters in Litigation
    Special Masters in Litigation
    Maura Grossman, Hon. Ira Warshawsky, Hon. Frank Maas, Hon. Kristen L. Mix Aug 25 2020 5:00 pm UTC 75 mins
    In January 2019, the ABA published a new set of guidelines concerning the use of special masters. Despite their contribution to "just, speedy and inexpensive" resolution of issues, the use of special masters remains an underutilized form of dispute resolution. Join this all-star panel as they explore the pros and cons and share their thoughts on best practices to maximize benefits while mitigating the potential downsides.

    Maura R. Grossman
    Research Professor
    University of Waterloo
    Maura R. Grossman, J.D., Ph.D., is a Research Professor in the School of Computer Science at the University of Waterloo and an Adjunct Professor at Osgoode Hall Law School of York University, both in Ontario, Canada. She also is Principal at Maura Grossman Law, an eDiscovery law and consulting firm in Buffalo, N.Y.

    Hon. Frank Maas
    Mediator/Arbitrator/Special Master
    JAMS, Inc.
    Judge Maas is a United States Magistrate Judge for the Southern District of New York.

    Hon. Ira B. Warshawsky
    Of Counsel
    Meyer Suozzi
    Justice Ira B. Warshawsky, ret. is Of Counsel in the Litigation and Alternative Dispute Resolution practices at Meyer, Suozzi, English & Klein, P.C. in Garden City, Long Island, N.Y.

    Hon. Kristen L. Mix
    Magistrate Judge
    U.S. District Court, District of Colorado
    Kristen L. Mix graduated from Middlebury College, cum laude, with a degree in English. She obtained her J.D. from the University of Colorado School of Law and practiced law in Denver until 2007, when she was appointed to the federal bench. Magistrate Judge Mix's expertise prior to her appointment was in labor and employment law. Magistrate Judge Mix serves on the Judicial Conference of the United States' Committee on the Administration of the Magistrate Judge System and on the United States District Court for the District of Colorado's Local Rules Committee.
  • Using dashboards for greater efficiency
    Using dashboards for greater efficiency
    Emily Tice Aug 27 2020 1:00 am UTC 60 mins
    Nuix Discover power user webinar series

    Nuix Discover employs cutting edge user experience design to help users easily understand complex data sets immediately. Whether viewing reviewer progress, case metrics, or portal metrics, Nuix Discover has a dashboard to help you better understand and share the critical eDiscovery metrics that legal teams need to succeed. In this session we focus on several key dashboards and how you can use them drive review efficiency with Nuix Discover.
  • Old Dogs, Same Tricks - Nuix Veterans Share Their Favorites
    Old Dogs, Same Tricks - Nuix Veterans Share Their Favorites
    Andy Ward, Matthew Geaghan, Alex Chatzistamatis, & John Bargiel Sep 15 2020 2:30 pm UTC 60 mins
    Our software has evolved over the years, but many of its core features and functions remain largely unchanged. Because of that, there are some long-standing tips and tricks that Nuix veterans use that have stood the test of time and make every use case in Nuix easier to complete.

    If you’re new to Nuix or a long-time user, you can benefit from these pro tips, many of which aren’t as widely known as they should be. This will be a must-watch as Nuix veterans Matthew Geaghan, Andy Ward, Alex Chatzistamatis, and John Bargiel challenge each other with their knowledge of the software and welcome questions from the audience.
  • Free and Open Source License Enforcement and Compliance
    Free and Open Source License Enforcement and Compliance
    Miriam Ballhausen, Bird & Bird & Matt Jacobs, Synopsys Sep 30 2020 4:00 pm UTC 60 mins
    Free and Open Source Licenses are enforced by copyright owners globally, but by far most frequently in Germany. Overall, approximately 100 enforcement claims are initiated against companies. Global players may be targeted just as likely as SMEs. But how is that even possible, if Free and Open Source Licenses allow everyone to do everything with the code they apply to? And what does enforcement mean in practice? This talk will give a brief overview over the legal background to set the scene for a look into how enforcement works (at least in Germany). It will then lay out the aspects that companies should look out for, how tooling may help both on the claimant’s and the defendant’s side and how companies may protect themselves against enforcement.
  • Using Nuix Workstation for eDiscovery
    Using Nuix Workstation for eDiscovery
    Jessica Solano Oct 1 2020 3:00 pm UTC 60 mins
    Using Nuix Workstation for eDiscovery

    In this short overview, we will take a quick look at a few of the concepts and analytics that will be discussed in Nuix Training to mimic a Nuix eDiscovery workflow from beginning to end. In training, we will explore what happens when you receive data, how to get it into Nuix, and how we can use techniques in Nuix to analyze, search, and cull data all the way to a production and legal export.