Hi [[ session.user.profile.firstName ]]

Legal

  • Effective Policies for Managing and Releasing Open Source Software
    Effective Policies for Managing and Releasing Open Source Software Mark Radcliffe, Partner, DLA Piper/General Counsel OSI; Anthony Decicco, Shareholder, GTC Law Group & Affiliates Recorded: Oct 17 2018 60 mins
    Once you get a handle on what open source your organization has in house and you're through remediating any issues that came up during your code scan, then what? How do you ensure you avoid surprises the next time around and fully leverage your investment?

    Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and General Counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss effective policies for managing and releasing open source in your company:

    - What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
    - What are key success factors for effectively releasing code as open source?
    - How does this play out in transaction due diligence and integration following an acquisition?
  • The Lawyer's Guide to Slack Discovery
    The Lawyer's Guide to Slack Discovery Michael Simon, David Slarskey, and others Recorded: Oct 16 2018 63 mins
    Slack, the massively popular file sharing and messaging platform, is changing communications and discovery as we know them. That's because Slack, and similar tools, are fastly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.

    Join this webinar for a dive into how Slack is changing communications and discovery--and how you can take advantage of this new source of data.

    Register now to learn:
    - How Slack is changing discovery and investigations
    - Why Slack could hold key data for your case
    - The unique challenges Slack data poses
    - How creative legal teams are leveraging Slack data during the discovery process
    - Best practices for dealing with Slack data and overcoming objections, from those who’ve done it
  • How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology
    How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology Mike Fowler, CISSP, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs, Recorded: Oct 16 2018 52 mins
    Increased workload coupled with an industry-wide shortage of skilled responders is a common challenge heavily impacting operational performance in Security Operations Centers globally. An integral part of the solution is formulating a methodology to ensure that crucial knowledge is held and transferred between incident responders at all levels and overall retained within the organization.

    By utilizing Security Orchestration, Automation and Response (SOAR) technology, security teams can combine traditional methods of knowledge transfer with more modern techniques and technologies by incorporating machine learning and artificial intelligence capabilities.

    Join this webinar to learn about the benefits of implementing a SOAR solution, such as IncMan SOAR from DFLabs, and see how we can help to ensure that your organization’s knowledge is consistently and accurately retained, used and transferred, while simultaneously contributing to the efficiency and effectiveness of your entire incident response process.

    Key Takeaways:

    - The benefits of using SOAR technology
    - How to overcome the shortage of skilled security operations staff
    - How security orchestration and automation can facilitate knowledge transfer
    - How a SOAR solution can improve your overall security program performance
  • Actavis and equivalence – where are we now?
    Actavis and equivalence – where are we now? Douglas Drysdale, partner, HGF Recorded: Oct 11 2018 63 mins
    The UK Supreme Court's 2017 decision in Actavis v Eli Lilly introduced a doctrine of equivalents into UK law. In this webinar, we'll discuss the implications of that decision and look at how it is being applied in other cases in the UK courts.
  • Container Security – What you need to know!
    Container Security – What you need to know! Olli Jarva, Managing Consultant, Synopsys Recorded: Oct 4 2018 45 mins
    Containers are revolutionizing application packaging and distribution. They’re lightweight and easy to build, deploy, and manage. But what about security? Your containers include more than the applications your team builds. They also bundle all the third-party software and open source components those apps depend on. In our webinar “Container Security – What you need to know!”, Olli Jarva, Managing Consultant & Security Architect, outline how you can prevent vulnerable code hiding in your containers from compromising your applications and sensitive data and how you can take control in the event when a new vulnerability breaks out for open source component present in your containers.
  • Debunking the Top Ten Myths of Document Review
    Debunking the Top Ten Myths of Document Review Michael Dalewitz, President (ReviewRight) Recorded: Oct 3 2018 62 mins
    Representing the largest expenditure in the eDiscovery task continuum, the review phase of legal discovery consumes almost 70% of each dollar spent on eDiscovery. Understanding budgetary constraints routinely are a top concern for eDiscovery professionals, legal departments and law firms are continually seeking ways to become more time effective and cost efficient during document reviews. But are these professionals making sourcing decisions based on facts or assumptions? This expert presentation will highlight ten of the most common myths associated with attorney document reviews and present approaches for avoiding decisions based on myths.

    Key Presentation Topics Include:

    + Myth #1: Hourly Billing is Better than Per Document Billing
    + Myth #2: TAR will Replace Humans
    + Myth #3: The Best Document Review Team will be in a Review Center
    + Myth #4: Recruiters Analyze ALL Candidates for Your Matters
    + Myth #5: Law Firm Associates are Always the Best High-Level Consultants for Review
    + Myth #6: Your Document Review Tool Produces ALL the Metrics You Need for Your Matter
    + Myth #7: Lots of Time Should be Spent on Individual Attorney Quality Control
    + Myth #8: ALTA Exams are the Best Way to Test Foreign Language Reviewers
    + Myth #9: Anyone with A Law Degree will be a Great Document Reviewer
    + Myth #10: Remote Review is Less Secure than OnSite

    Presentation Leader: Michael Dalewitz

    President of ReviewRight, Mike has extensive experience in eDiscovery and the management of large, document-intensive cases in a predictable fixed cost pricing model. He created one of the industry’s first managed document review models and developed the first document review metrics tracking software.

    Nationally recognized as an expert in eDiscovery, document review and legal staffing, Mike is a published author, speaker, and CLE instructor who graduated from the University of Florida with a Bachelor of Arts degree and obtained his JD from New York Law School.
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION Waterford Technologies Recorded: Oct 3 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • CloudNine Training Snapshot: Concordance Desktop Updating Image Bases
    CloudNine Training Snapshot: Concordance Desktop Updating Image Bases Travis Ballenger, Solutions Consultant Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of the process required to update an image base within Concordance Desktop.

    Some of the various ways in which to update a Concordance Desktop image base are renaming media paths and folders, editing or deleting media keys and calculating and updating the page count for an image base. Use Concordance Desktop’s Image Base Management feature to accomplish each of these tasks.
  • CloudNine Electronic Discovery Loader Settings Overview
    CloudNine Electronic Discovery Loader Settings Overview Terry Leang, CloudNine Solutions Consultant Recorded: Oct 1 2018 8 mins
    An overview of the configurable settings in the LAW PreDiscovery Electronic Discovery Loader, that are specific to the type of source you’re importing. Based on policies and project specifications, the settings tab is used to determine how specific file types will be handled during the import process, such as extracting the contents of an archive or detecting duplicate files, as well as how the files will be organized in the folder view of LAW PreDiscovery.
  • Law Prediscovery Electronic Discovery Loader
    Law Prediscovery Electronic Discovery Loader Terry Leang, CloudNine Solutions Architect Recorded: Oct 1 2018 6 mins
    A snapshot demonstration of an introduction to the LAW PreDiscovery Electronic Discovery Loader.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES Waterford Technologies Recorded: Oct 1 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • Drone Forensics
    Drone Forensics Rob Attoe, CEO, Spyder Forensics Recorded: Sep 28 2018 63 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • Preparing for Litigation Before it Happens
    Preparing for Litigation Before it Happens Doug Austin and Tom O'Connor Recorded: Sep 26 2018 62 mins
    Information Governance (IG) has always been part of the eDiscovery landscape and it has always been important for reducing the population of potentially responsive electronically stored information (ESI) that might be subject to litigation by helping organizations adopt best practices for keeping their information “house in order”. But now with an increased concentration on the two-fold concerns of privacy and security, IG has become more important than ever. This CLE-approved* webcast will explore the implementation of Information Governance best practices to help organizations better prepare for litigation before it happens. Topics include:

    + Minority Report: Pre-Case for Litigation Avoidance
    + What Information Governance is and What it Isn't
    + General Principles for Information Governance
    + Who Uses Information Governance?
    + IG Considerations and Issues
    + Basic Information Governance Solutions
    + Information Governance vs. Analytics
    + How Privacy/Security Has Impacted the Importance of an IG Program
    + Recommendations for Implementing an IG Program

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Tracking technology trends to maximise commercialisation value
    Tracking technology trends to maximise commercialisation value Mireya McKee CEO of McKee Innovation Consulting Recorded: Sep 26 2018 55 mins
    Technology commercialisation at its core requires for an invention to be applied to a use case in a specific market. Doing this successfully will ensure that you are getting ROI out of your research and inventions. Mireya McKee has over 16 years experience in research, academia and commercialisation and will be talking about how she utilises technology trends to maximise commercialisation value.

    Some of the topics discussed in this webinar will be:

    * How to track technology trends
    * What can patents tell us about technology trends
    * Technology adoption cycle
    * How technology readiness levels can affect commercialisation opportunities
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach EDRM and AccessData Recorded: Sep 25 2018 57 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Recorded: Sep 25 2018 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades Leila Szwarc & Paola Fonseca TMF Group and Yoab Bitran, LRN Recorded: Sep 25 2018 61 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Recorded: Sep 25 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • Don't Acquire Open Source Risks You're Not Aware Of
    Don't Acquire Open Source Risks You're Not Aware Of Daniel Kennedy, Research Director - Information Security, 451 Research; Phil Odence, GM – Black Duck On-Demand Recorded: Sep 19 2018 49 mins
    Modern applications are constructed using open source components. Most organizations understand they’re using open source. What they likely underestimate is its prevalence in their homegrown applications and the potential security and license compliance risks they assume if they’re not continuously monitoring those libraries. When companies merge or are acquired, that unknown risk is transferred, potentially to organizations with greater regulatory exposure. Join Daniel Kennedy, Research Director, Information Security, and Phil Odence, GM, Black Duck On-Demand, for a discussion of these risks and how to address them.
  • MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES
    MAILMETER EMAIL ARCHIVING AND COMPLIANCE | WATERFORD TECHNOLOGIES Waterford Technologies Recorded: Sep 19 2018 1 min
    MailMeter solves multiple business problems for organisations that need to retain and retrieve email records, are suffering from overwhelming email volumes, or that recognise the importance of email as a critical asset and source of business intelligence.

    We provide both on-premise and fully hosted solutions.
  • WATERFORD TECHNOLOGIES | OVERVIEW
    WATERFORD TECHNOLOGIES | OVERVIEW Waterford Technologies Recorded: Sep 19 2018 2 mins
    Waterford Technologies are experts in Compliance Technology and Unstructured Data (Email & File) Management. We enable organisations to achieve a clear overview of their data, enabling informed business decisions to prepare for legislation such as GDPR and MiFID II. We simplify data oversight by providing cutting edge technology and unlimited unrivalled support.
  • Email and File Compliance Solution for GDPR
    Email and File Compliance Solution for GDPR Waterford Technologies Recorded: Sep 19 2018 3 mins
    ComplyKEY from Waterford Technologies has been developed to help organizations address their unstructured Email and File Data to meet new compliance regulations such as GDPR.

    Talk to us today about how our Data Management experts can help your compliance needs.

    https://www.waterfordtechnologies.com...

    Call us today for a FREE Data Strategy Review
    EMEA: +353 (0) 51 334 967
    UK: 0845 378 0935
    USA: +1 (949) 428 9300
  • SISCIN | FILE ANALYSIS, ARCHIVING  AND FILE SEARCHING SOLUTION
    SISCIN | FILE ANALYSIS, ARCHIVING AND FILE SEARCHING SOLUTION Waterford Technologies Recorded: Sep 19 2018 4 mins
    SISCIN from Waterford Technologies allows the creation of policies based on data profile for retention, deduplication or archiving, enabling full control in managing your file data. With flexible storage control to archive directly to the Cloud or locally. Giving organisations the performance and scalability of the Cloud with their existing server infrastructure.
  • Being Future Ready in a Transformative Digital Economy
    Being Future Ready in a Transformative Digital Economy Doug Rybacki, Chief Product Officer, Conga & Sheryl Kingstone, Research Director, 451 Research Oct 23 2018 5:00 pm UTC 48 mins
    In today’s digital economy, companies are competing for customers like never before as price and product are no longer the only drivers of business. The value of delivering an engaging customer experience is on the rise, and businesses are increasingly turning to software and digitized processes to accommodate this trend. In fact, 80 percent of businesses are either planning or formally engaged in digital transformation initiatives to improve their overall customer experience.

    Join us to understand:

    -The importance of Digital Transformation
    -Why businesses must respond to the pace of change
    -The tools for Digital Transformation success
  • Through the LookingGlass: Top Trends to Keep Your Organization Cyber Aware
    Through the LookingGlass: Top Trends to Keep Your Organization Cyber Aware LookingGlass Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall Oct 24 2018 6:00 pm UTC 60 mins
    It’s 2018 and threat actors continue to leverage the same tactics – phishing, ransomware, botnets, etc. – against their targets. They’ve using the same techniques for years, yet it’s still working. Do we sound like a broken record yet?

    With October being National Cyber Security Awareness Month, it’s an ideal time to re-evaluate the cyber threat landscape and your cybersecurity hygiene. Topics like fake news, privacy, and the Internet of Things are “hot” topics in mainstream culture, and you need to know their impacts on your organization.

    Join LookingGlass’ Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall, in a lively discussion about the hottest cybersecurity topics and what your organization can do to protect itself against them. Wednesday, October 24 @ 2PM ET.

    This webinar will also cover:
    · Business Email Compromise (BEC)
    · Single Sign-On and Password Managers
    · Information Warfare
    · Third Party Risk
  • Costs and Competition in the non-domestic Energy Sector
    Costs and Competition in the non-domestic Energy Sector Georgina Penfold, Arjan Geveke, Tony Glover Oct 25 2018 11:30 am UTC 60 mins
    Join us on the first anniversary of the publication of the Helm Review on the Cost of Energy. What has been done since then to tackle energy costs in the non-domestic sector?

    Are we really supporting British business, when rising costs of production impacts our global competitiveness?

    Most of the cost rises are coming from non-commodity charges. Is this an essential spend, delivering critical infrastructure with the costs applied fairly to all users, or are the networks reaping benefits at the expense of the consumer?

    And how can we ensure we get the best price when we go to market?
  • Cybersecurity and Your Ethical Duties
    Cybersecurity and Your Ethical Duties Eli Wald and Casey Sullivan Oct 25 2018 6:00 pm UTC 60 mins
    In the eyes of cybercriminals, legal professionals are an easy—and lucrative—target. Law firms are often a one-stop shop for incredibly sensitive information and you might not be doing enough to protect the data in your possession.

    So if a breach occurs, what potential ethics violations may result? Join us for an upcoming webinar as we delve into this question.

    Watch to learn:
    + How not to get hacked and how to respond when you do
    + Where professional responsibility and cybersecurity intersect
    + What steps attorneys must take to protect client data
    + How the "reasonableness" of cybersecurity protections is determined
    And more!

    Featuring Eli Wald, Professor, Sturm College of Law

    A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli was one of the first academics to investigate the ethical implications of law firm cybersecurity, or, as he terms it, “legal ethics’ next frontier.”

    A frequent author and speaker on ethics and professional responsibility, his work has appeared in leading journals such as the Fordham, Stanford, University of Colorado and Wisconsin law reviews, and the Georgetown Journal of Legal Ethics. Eli’s articles have also been cited in ABA ethics opinions and excerpted in legal ethics casebooks.
  • Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations
    Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations Dr Nick Sharples Oct 30 2018 11:00 am UTC 45 mins
    Our latest release is designed to give eDiscovery professionals, legal operations, lawyers, investigators, information governance professionals, and law enforcement additional freedom and functionality to automate and simplify their workflows.

    Users will find it easier to add, organize, and share information within and across cases, incorporate social media into investigations, and load and process files with additional data inputs, bulk load capabilities, and workflow templates.
  • Using Threat Intelligence Effectively in Security Automation and Orchestration
    Using Threat Intelligence Effectively in Security Automation and Orchestration John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Oct 30 2018 3:00 pm UTC 60 mins
    Using Threat Intelligence Effectively in Security Automation and Orchestration: A DFLabs and Cisco Use Case.

    Actionable intelligence is critical to responding efficiently and effectively to a potential security incident. Inaccurate or incomplete intelligence can lead to threats dwelling on the network, resulting in increased financial losses and irreparable damage to reputation. Once a threat has been discovered, decisive action must be taken to contain the threat.

    Cisco’s suite of detection, intelligence and response products, including Email Security Appliance, Threat Grid, Umbrella and Umbrella Investigate; offer security practitioners an unparalleled suite of tools, to address all phases of the incident response lifecycle.

    Combining the vast capabilities of Cisco’s suite of security products, with the orchestration and automation power of DFLabs’ IncMan SOAR platform, allows organizations to respond to potential security incidents, with unmatched speed and accuracy.

    Key Takeaways:

    · How Cisco’s suite of security products can improve your security infrastructure
    · How IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    · How Cisco security products combined with IncMan SOAR from DFLabs can automatically respond to threats

    Presented by:
    John Moran, Senior Product Manager, DFLabs
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security
    Michael Auger, Senior Security Solutions Architect, Cisco Security

    Your registration information will be shared with DFLabs’ solution partner Cisco Security, who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Get a “Clue” Regarding Your eDiscovery Process
    Get a “Clue” Regarding Your eDiscovery Process Doug Austin, Tom O'Connor, and Mike Quartararo Oct 31 2018 5:00 pm UTC 75 mins
    As evidenced by some high-profile recent eDiscovery disasters, managing eDiscovery projects is more complex than ever. Not only have the volume and variability of ESI data sources increased dramatically, but there are often more stakeholders in eDiscovery projects today than characters on the board game Clue©. Successful eDiscovery today means not only meeting your obligations, but also making sure that each stakeholder in the process succeeds as well. This CLE-approved* webcast will discuss the various participants in the eDiscovery process, what motivates each of them, and best practices on how to avoid becoming the next high-profile eDiscovery disaster. Topics include:

    + The Process: Managing the Project from Initiation to Close
    + The Phases: Managing the Flow of ESI Before and During the Process
    + The Players: Goals and Objectives of Each eDiscovery Stakeholder
    + Whodunnit?: Lessons Learned from a Large Financial Institution’s Mistakes
    + Whodunnit?: Lessons Learned from a Government Entity’s Mistakes
    + Whodunnit?: Lessons Learned from a Medical Center’s Mistakes
    + Recommendations for Avoiding Your Own Mistakes
    + Resources for More Information

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    Mike Quartararo is the founder and managing director of eDPM Advisory Services. He is also the author of the 2016 book Project Management in Electronic Discovery, the only book to merge project management principles and best practices in electronic discovery.
  • Answers to the World’s Scariest Employment Law Questions
    Answers to the World’s Scariest Employment Law Questions Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, and Neil Alexander, of Littler Mendelson. Oct 31 2018 7:00 pm UTC 60 mins
    Join ManpowerGroup for a complimentary webinar designed to reduce your employment law nightmares.
    In this engaging and interactive webinar, Mark Toth of ManpowerGroup and guest Neil Alexander of Littler Mendelson will answer the world’s most terrifying employment law questions. Mark and Neil will not only address the questions that keep you awake at night but also ensure that you get all the latest employment law news on everything from hiring to firing and beyond.

    After this fast-paced hour, you’ll walk away with:
    -Answers to difficult legal questions
    -Up-to-the-minute information on the latest employment law developments
    -Tips and tools on everything from hiring to firing
    -Practical solutions based on real-life examples

    Your host is Mark Toth, Chief Legal Officer of ManpowerGroup™ North America, a former partner in a major employment law firm, and widely known for his ability to present legal and HR issues in a uniquely entertaining style.

    Special guest Neil Alexander, of Littler Mendelson, has represented companies in employment disputes all across the U.S. for the last 25 years. Neil’s practice focus includes unfair competition disputes, whistle blower and retaliation claims, ADA and FMLA disputes, wrongful termination claims and allegations of harassment or discrimination.

    ManpowerGroup is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRMSCPSM. This program is valid for 1 PDC for the SHRM-CPSM or SHRM-SCPSM. For more information about certification or recertification, please visit www.shrmcertification.org

    This webinar is approved for 1 HRCI credit. The use of the HRCI seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.
  • The New World of AI - Powered Contracts
    The New World of AI - Powered Contracts Tim Cummins, IACCM President and Jason Gabbard, Head of AI, Conga Nov 6 2018 6:00 pm UTC 55 mins
    Contract management is an area that is ripe for innovation and digital transformation. Often contracting processes are bureaucratic, burdensome, and a major source of delays. Yet new technological solutions are emerging quickly, affording the opportunity for AI to manage much of the process, while freeing up people—contract management staff—to focus on more strategic tasks.

    Are you prepared for the pace of change?

    Join us live to hear from IACCM President Tim Cummins and Conga Head of AI Jason Gabbard while they chat about:

    -The essential documents and contracts to automate.
    -Driving compliance across departments and increasing collaboration.
    -Boosting efficiency by reducing errors with key AI technology and Machine Learning.
  • Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain
    Blockchain and eDiscovery (Part One): Basics of Cryptocurrencies and Blockchain John Wilson, ACE, AME, CBE Nov 7 2018 5:00 pm UTC 75 mins
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Etherium, today's legal professional is behind the proverbial power curve if they do not have a basic understanding of emerging cryptocurrency and blockchain technologies. As these emerging technologies are rapidly moving from proof of concept projects to formal systems of record, it is only a matter of time until almost anyone involved in the business of law or the law of business is confronted with a situation involving these highly publicized technologies.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both blockchains and cryptocurrencies to arm attendees with essential information that will help them understand these technologies that are changing the landscape of business and law.

    Key Presentation Topics Include:

    + Understanding Cryptocurrencies
    + Why Cryptocurrencies Have Value
    + How Cryptocurrencies Work
    + Understanding Blockchain
    + Why Blockchain Is A Foundational Technology
    + How Blockchain Works
    + Use Cases for Blockchain as a Legal Technology
    + eDiscovery Considerations for Cryptocurrencies and Blockchain

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.
  • Nuix Ringtail demonstration: removing doubt from your discovery process
    Nuix Ringtail demonstration: removing doubt from your discovery process Christina Mather, Solutions Consultant, Nuix Nov 12 2018 2:00 pm UTC 45 mins
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain John Wilson, ACE, AME, CBE Dec 4 2018 5:00 pm UTC 75 mins
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as part of data discovery and legal discovery processes.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both cryptocurrencies and blockchains and provide attendees with fundamental information that will help them understand how to examine and investigate these technologies and the electronically stored information that results from their usage.

    Key Presentation Topics Include:

    + Quick Review: Cryptocurrencies and Blockchain
    + Crime, Cryptocurrencies, and Blockchain
    + Investigating Cryptocurrencies and Blockchain
    + The Physical Scene
    + The Digital Scene
    + Forensic Evidence
    + Following Transaction Trails
    + Investigation Intelligence

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.