Hi [[ session.user.profile.firstName ]]

Legal

  • Ask a Patent Attorney: Patent Costs and How To Minimize Them
    Ask a Patent Attorney: Patent Costs and How To Minimize Them Dylan O. Adams, Senior Patent Attorney | hosted by Ruta Sudmantaite from patsnap.com Live 60 mins
    Whether you are a sole inventor, or managing a patent portfolio for a global enterprise, patents are a significant investment that can help to protect your most valuable assets and enable them to be commercialized now, and in the future. However, costs involved with protecting your assets, and maintaining them can quickly add up over time.

    Dylan O. Adams, Senior Patent Attorney and Amazon Bestselling Author of "Patents Demystified, joins PatSnap once again for an informative and interactive Q&A-led webinar to share some best practices on keeping your patent costs down.

    Some topics covered in this session include:

    - Cost of provisional patent & non-provisional patent applications
    - Cost of responding to office actions
    - How to minimizing your attorney costs
    - Issuance and maintenance fees
    - Litigation and enforcement costs
    - International filing costs

    This webinar is essential viewing for anyone looking to slash their intellectual; property bill, and put their IP budget to better use.
  • The business of R&D: How intellectual property can reduce your tax bill
    The business of R&D: How intellectual property can reduce your tax bill Brian Williamson, Managing Director of Jumpstart | hosted by Ruta Sudmantaite at patsnap.com Recorded: Jun 22 2017 53 mins
    R&D is an expensive business – Last year alone, UK companies invested £16.5 billion into research and development, which accounted for 4% of the total global spend.

    While 25% of R&D spend came from the higher education sector and 7% from Government and Research Councils, the majority - a massive 66% of this investment, was made by businesses. But there are easy ways that these companies could be accessing even more money to invest in R&D.

    Of course R&D delivers benefits in the form of process efficiencies, new products, intellectual property which can be protected and monetized, and is a is source of long term competitive advantage. But the UK government also encourages R&D through significant tax benefits – so why are so many businesses still not claiming enough tax relief for R&D?

    Brian Williamson, Managing Director at Jumpstart, the UK’s leading tax credit specialists, joins us for this webinar where he will discuss:

    - Why the government cares about R&D investment
    - The common “white coat” misconception companies have about R&D
    - How to get your accountant or auditor to think like a scientist
    - Why companies ranging from startups to multinational companies are leaving money on the table and the options available for claiming it back.

    This webinar is essential for any R&D leaders wanting to know more about how to manage their R&D budgets more effectively.
  • Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring
    Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring Robert Huff, Managing Director, North America Recorded: Jun 15 2017 60 mins
    Regulators have been unequivocal in their expectation that companies know who they are doing business with. While pre-onboarding due diligence on third parties has become the cornerstone of most compliance programs, many companies are still feeling their way toward integrating effective post-onboarding monitoring strategies. Join Kroll's experts for an interactive discussion of steps you can take and resources you can leverage to define and execute a sustainable approach to third party monitoring.
  • ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects
    ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects Doug Austin and Karen DeSouza Recorded: Jun 15 2017 61 mins
    If you’ve conducted discovery for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” could occur that can derail your project. These issues can add considerable cost to your discovery effort through unexpected rework and also cause you to miss important deadlines or even incur the wrath of a judge for not following accepted rules and principles for discovery. This webcast* will discuss some of the most common “pitfalls” and “potholes” that you can encounter during the discovery life cycle and how to address them to keep your discovery project on track.

    Webcast Highlights

    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Ways to Avoid Potential Data Breaches
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Techniques to Increase Review Efficiency and Effectiveness
    + Checklist of Items to Ensure a Smooth and Accurate Production

    Presenters Include:

    
Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, technical project management and software development services to numerous commercial and government clients.

    
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • How to get more insight from design patents
    How to get more insight from design patents Alan Engel, Paterra, Inc | hosted by Jessie Parker at patsnap.com Recorded: Jun 14 2017 46 mins
    Generally speaking, it is possible to protect the ornamentation and shape of an article.
    However, it will depend on the jurisdiction as to whether this falls within the genus of patent law, or a separate branch of intellectual property known as a design right.

    Graphical descriptions play an important role in helping to validate the originality of a proposed invention or design, as well as when searching for inspiration or similar patents. But are you getting the most valuable insight from your design patent data?

    PatSnap will be joined by Alan Engel, President of Paterra Inc, for a webinar which will cover a wide range of topics relating to design patents, focusing primarily on East Asia but will also touch on European and American industrial designs and design patents. Topics covered include:

    1. The rising importance of design
    2. Design patents in the design world
    3. Design patents in the patent world
    4. Kinds of design patents
    5. Principle designs
    6. Related designs
    7. Partial designs
    8. Assembly designs
    9. Graphical user interfaces
    10. International treaties
    11. Searching design patents
    12. Design patent valuation

    This webinar is essential viewing for patent searchers and patent data users who are seeing more activity involving design patents and want to ensure they have the correct protection.
  • Success Factors in Threat Intelligence: Part 1 - Business Requirements
    Success Factors in Threat Intelligence: Part 1 - Business Requirements Allan Thomson, Chief Technical Officer Recorded: Jun 8 2017 46 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations.

    In Part 1 we will examine what drives CISOs and organizations to consider adoption of a threat intelligence practice. CISO’s are focused on Risk reduction to their organizations but may not have a fully defined set of requirements on who, how, where Threat Intelligence can assist in that high-level goal. They may require a solid business case to justify the investment and have a supporting set of well-defined business and technical requirements. Some key questions help formulate the executive’s plan.
    -What are the costs of solving these requirements?
    -How can my organization’s revenue be protected while investing in TI?
    -What is the right balance of both tactical and strategic Threat Intelligence-driven responses?
    -Where can existing investments be leveraged?
  • Patent Prosecution in Battery Innovation: Through the Lens of Big Data
    Patent Prosecution in Battery Innovation: Through the Lens of Big Data John Platt, Snell & Wilmer, Matthew Rappaport, IP Checkups and Rod Wittenberg, LexisNexis IP Solutions Recorded: Jun 8 2017 62 mins
    Battery technology powers devices around the globe and innovation are key to the power and storage economy. The use of big data is ubiquitous. Watch this webinar to learn how you can use big data to your advantage in patent prosecution for the dynamic and swiftly changing field of batteries.
  • Patentwissen für die Praxis – speziell für Manager!
    Patentwissen für die Praxis – speziell für Manager! Patentanwalt und Autor Carmen Tesch-Biedermann | Gehostet von patsnap.com Recorded: Jun 7 2017 60 mins
    Patentanwältin und Autorin Dr. Carmen Tesch-Biedermann schließt sich PatSnap für ein Webinar an, bei dem es um dieses Thema geht: Warum sollten sich auch Manager mit dem Thema "Patente" befassen?

    Das Ziel des Webinars ist es, Patente aus der Management-Perspektive zu betrachten und an jene Entscheidungsträger in Unternehmen heranzutragen, die sich nicht täglich mit Patenten beschäftigen, um Vorurteile abzubauen und sinnvollen Gebrauch von Patenten für ihr eigenes Unternehmen zu machen.

    Aus dem Inhalt:
    - Patentstrategie als Wettbewerbsvorteil
    - Wissen, worum es geht: Schutzrechtsbasics
    - Wissen, was geht: Patente und Patentierungsanforderungen
    - Wissen, wie es auch geht: Alternative Ansätze
    - Wissen, was die Anderen tun: Patente von Wettbewerbern
    - Wissen, was verboten ist: Patentverletzung und Haftungsfragen
    - Wissen, wem die Erfindung gehört: Arbeitnehmererfinder und Kooperationspartner
    - Wissen, was es kostet: Honorare und Gebühren
    - Wissen, das zählt: Patente aus strategischer Sicht
  • GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data?
    GDPR vs Trump vs Brexit vs Privacy Shield – how can you protect your data? FRA’s co-founders; Toby Duthie, Frances McLeod and Greg Mason Recorded: Jun 7 2017 61 mins
    With Safe Harbor being invalidated and EU-US Privacy Shield and Swiss-US Privacy Shield yet to be tested, UK data privacy post Brexit an unknown, the General Data Protection Regulation coming into effect throughout the EU next year, and the Trump administration potentially poised to ride roughshod over EU surveillance concerns– the uncertainty surrounding the current regulatory environment will inevitably add complexity to the issue of data transfers, especially in the context of international investigations and disputes – and, by extension eDiscovery.

    As regulatory investigations and related processes frequently span several years, strategic decisions made today around data transfers will have important ramifications down the line.

    Do you know where your/your client’s data currently is hosted and if it is being held in accordance with the various and, at times, conflicting data privacy laws? If the answer is 'no', significant reputation and even financial implications could ensue.

    This GIR Live webinar will break down the current data protection laws and set out some considerations and practical guidelines to minimize risk exposure for companies and professional services firms dealing with cross-border investigations and litigation.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:

    • Data privacy and adequate protection
    • What you can do now to remain compliant
    • How to manage conflicts of law in a global investigation with practical tips from real life case studies
  • What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017
    What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017 Doug Austin, Julia Romero Peter, Esq., Sean Hall and Paul Cobb Recorded: May 31 2017 62 mins
    You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.

    Webcast Highlights:

    + The State of Cybersecurity in the U.S. in 2017
    + Top Threats Facing Your Practice
    + Your Responsibility to Your Clients: The High Cost of Data Leaks
    + How to Protect Your Firm and Your Clients
    + Recent Developments in International Data Privacy
    + Criteria for Evaluating Providers in Your eDiscovery Projects
    + Ethics Considerations
    + Looking Forward: The Future of Cybersecurity in the Legal Field

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Sean Hall: Sean is the CEO of Firm Guardian, LLC. Sean has a decade of experience working with emerging start-ups from an executive level creating scalable, profitable businesses.

    Paul Cobb: Paul is the COO for Firm Guardian LLC. Paul is a business leader with twenty years of diverse experience in management, marketing, sales strategy, and operations.

    MCLE Approved in Selected States
  • How to build a data-driven pharmaceutical molecule discovery pipeline
    How to build a data-driven pharmaceutical molecule discovery pipeline Duncan Clark, Head of Product Marketing at patsnap.com Recorded: May 31 2017 42 mins
    While innovation intelligence provides a wealth of data regarding future drug possibilities and their attachment to therapeutic areas, this information can be difficult to extract and integrate into workflows and processes. As such, it is hard for organizations to formulate a targeted strategy based on all the information available.

    In this webinar, we will be investigating the ever increasing pressure to improve collaborative efficiency between R&D, IP and other divisions within pharmaceutical organizations in order to drive successful drug discovery and commercialization.

    We will also be discussing:

    - Approaches that can be taken to overcome these difficulties
    - Steps that can be taken to align all teams during the entire phase of discovery & commercialization
    - How to use innovation data systematically to drive further success and explore new opportunities
  • Judge Analytics: Predicting the Behavior of the Courtroom's Boss
    Judge Analytics: Predicting the Behavior of the Courtroom's Boss Mark Lemley, Neukom Professor, Stanford Law School, Josh Curry, Partner Dentons, Josh Becker, CEO Lex Machina Recorded: May 24 2017 40 mins
    How do you gather intelligence about a judge, to pitch a new client or inform case strategy? A blast email to colleagues just won't suffice anymore. Join this 30 minute webcast, where our speakers will discuss how Legal Analytics helps you predict your judge's behavior, based on data from all dockets from prior cases: Time to termination/trial/other case milestones, transfer rates, case resolutions, damages, remedies, findings, and more. Your competition uses Legal Analytics to win the client and the case; can you afford NOT to?
  • Using patent valuation data to measure the ROI of R&D
    Using patent valuation data to measure the ROI of R&D Dr. Dierk-Oliver Kiehne, CEO at InTraCoM GmbH | hosted by Jessie Parker at patsnap.com Recorded: May 23 2017 60 mins
    R&D represents a significant investment for most companies, but innovation leaders often struggle to accurately measure the output of their R&D activities. The number of new product launches, or revenue generated from products developed through R&D are too simplistic, and can make it difficult to justify investment in long-term R&D projects.

    Dr Dierk-Oliver Kiehne, CEO at InTraCoM GmbH, a leading patent valuation consultancy, joins us for a live webinar where he will discuss how patent valuation data can be used to analyse the output of R&D activities.

    He will explore:
    - How patent valuation data can be used to measure R&D efficiency
    - Why it makes sense to use an indicator approach to patent valuation
    - Examples of companies who are achieving extremely capital-efficient R&D
    - Other ways that IP value can be used to drive corporate strategy

    This webinar is essential viewing for all R&D leaders who are interested in understanding patent valuations and measuring the ROI of their R&D activity.
  • Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase)
    Webcast: Data, Discovery, and Decisions (ACEDS CloudNine Software Showcase) Doug Austin Recorded: May 11 2017 61 mins
    This on-demand webcast provides an overview and demonstration of three CloudNine software offerings designed to extend and enhance legal discovery efforts of law firms and legal departments.

    Webcast Overview:

    The acceleration of data creation in today’s business world coupled with the requirement to understand, manage, and act on information throughout its lifecycle presents a challenge to information governance and legal discovery professionals seeking to balance process, products, and outcomes. This presentation and technology demonstration led by eDiscovery Daily Blog author and eDiscovery expert Doug Austin will provide attendees with an overview of data discovery and legal discovery and help them frame the lifecycle of data through the lens of data and legal discovery objectives, tasks, and tools.

    Presentation Highlights

    + The Objectives of Data Discovery and Legal Discovery
    + A Framework for Approaching Discovery
    + Tasks and Tools For Effective Discovery

    Demonstration Highlights

    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + NEW: Outpost from CloudNine: Data Transfer into Relativity
    + NEW: CloudNine Legal Hold Notification

    Webinar Presenter

    Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    To learn more about CloudNine, visit eDiscovery.co.
  • Bigger Isn't Always Better: Assessing Cyber Risk to Reduce Your Attack Surface
    Bigger Isn't Always Better: Assessing Cyber Risk to Reduce Your Attack Surface Eric Olson, VP of Intelligence Operations, and James Carnall, VP Cyber Security Center Recorded: May 10 2017 52 mins
    Ransomware, spear phishing and third party breaches have become a huge problem as organizations become more connected online and expand their cyber footprint. When even the largest and most
    sophisticated global organizations, government agencies, and multinational banks are routinely penetrated and taken offline by cyber criminals, how can a concerned enterprise quickly and cost-effectively evaluate their own risk?

    During this webinar, Vice President of Intelligence Operations, Eric Olson, and VP of Cyber Security Center, James Carnall, will discuss how organizations can evaluate their internal and third party cyber risk to:

    · Minimize your attack surface for increased visibility
    · Make smarter and more cost-effective investments in your security posture
    · Proactively look for potential leaks, theft of sensitive data or other holes in your security posture
  • A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security
    A CISO's Key Challenge: Creating Valid Security Metrics & Reporting For Security Bill Bonney (CISA) Vice President, Product Management, TechVision Research and Dario Forte, CEO, and Founder of DFLabs Recorded: May 10 2017 52 mins
    Cyber Security requires organizations to analyze and correlate data derived from the measurement of the right metrics. Every CISO is searching for the best practices for turning metrics and reporting into meaningful data for 3 important data sharing levels within organizations. Managing metrics and reporting for Security Operations and Incident Response can be a time consuming and costly project.

    In this webinar, our speakers will discuss how to strengthen and empower a security team’s ability to quickly assess and remediate security Incidents and data breaches.

    Including:
    • Review CISO’s guide for sharing SecOps and IR data with C-level, VPs, and Directors.
    • Discover true priorities in breach reporting.
    • Learn what organizations can do to improve the automated analysis of incidents.
    • Understand the trends and benchmarks in security automation and orchestration to include metrics and reporting.
    • How to orchestrate and automate processes and machine actions in order to mitigate damages.

    Hear from:
    Bill Bonney, a co-author of the seminal book for new CISOs, the CISO Desk Reference Guide – A Practical Guide for CISOs. Along with his co-authors, Bill has established the standard “go to” reference for setting up an effective Information Security program. Along with Dario Forte, CEO, and Founder of DFLabs who will also be presenting on orchestrate and automate processes. Dario Forte started his career in Incident response as a member of the Italian police. In that role, he has worked with United States governmental agencies including the National Aeronautics and Space Administration (NASA). He is Co-Editor of several ISO Standards within the 27000 series and holds the CFE, CISM and CGEIT certifications. The author of over 50 books and scientific papers, Dario has an MBA from the University of Liverpool and has completed select executive curriculum at the Harvard Business School.
  • Open Innovation Models in the Knowledge Economy
    Open Innovation Models in the Knowledge Economy Bruno Reynolds, Nathan Pike | hosted by Jessie Parker at patsnap.com Recorded: May 10 2017 63 mins
    Over the last decade, the global economy has become increasingly dependent on knowledge workers as drivers of growth. Digitization has facilitated disruptive innovations and new innovation models, where information is paramount.

    Bruno Reynolds and Nathan Pike, Senior Consultants at Oxentia, Oxford University Innovation join us to discuss how the knowledge economy is helping to forge new innovation models. In this webinar they will discuss:

    - The rise of collaborative and open innovation models
    - The role of universities and government in R&D
    - Why intangible assets matter so much in the knowledge economy
    - Examples of new innovation models in practise and what they mean
  • Should Social Media Be Part of Your Information Governance Strategy?
    Should Social Media Be Part of Your Information Governance Strategy? Tom Mighell, VP Service Delivery, Contoural Recorded: May 5 2017 61 mins
    Corporate pressures to use social and other types of newer media continues to build. Part of the business sees using social media as an indispensable channel for reaching a newer generation of consumers. Yet in many industries uncertainties about compliance and recordkeeping requirements make companies cautious to use these new tools. Unlike more traditional media, social communications occur on third party venues and with posts, replies, and retweeting it becomes a gray area where your responsibilities start and end. In this webinar Tom Mighell from Contoural will review incorporating social media into your records management, eDiscovery, privacy and other elements of your information governance strategy. Topics will include:

    • Creating a media-agnostic program focused on content, not the underlying medium
    • Designing a program that can manage not only today’s social media, but also newer types of communications in the future
    • How much social content to retain, and by whom
  • Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations
    Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Matt Axelrod (Partner, D.C.) Satindar Dogra (Partner, London) and Adam Lurie (Partner, D.C.), Linklaters LLP Recorded: May 3 2017 61 mins
    With cross-border enforcement on the rise, companies must consider what information, if any, to provide to various regulators. But that’s only the start of the challenge. Having decided to provide information, companies must carefully consider how to protect their privileged and otherwise protected information, including information subject to data protection law.

    This GIR Live webinar will break down these challenges as well as looking at various strategies that companies can take to protect that which is privileged or protected when interacting with regulators around the world.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:
    •How to protect privilege and data privacy during an internal investigation in response to a regulator.
    •How to interact with regulators while preserving privilege and data protection rules.
    • How do legal privileges and data privacy protections vary between key jurisdictions?
    •How does increasing cross-jurisdictional cooperation between regulators impact these considerations?
    •What recent developments should practitioners should be aware of?
  • Workflow management: Ensuring collaboration between IP and R&D teams
    Workflow management: Ensuring collaboration between IP and R&D teams Jarrod Britton, Head of Product support at patsnap.com Recorded: May 3 2017 29 mins
    Many people believe R&D and IP can no longer work independently. Although they are in different departments, their goals are essentially the same and both are responsible for shaping and realising a company’s vision. Working separately leads to qualitative filing without having an intact strategy.

    Jarrod Britton, Head of Product Support at PatSnap will be exploring possible workflow management tools and systems to ensure maximum collaboration within your organisation.

    - Why collaboration is crucial for both IP and R&D
    - Top tips for workflow management & establishing a collaborative IP strategy
    - How PatSnap supports IP and R&D communication

    This webinar is essential for anyone that wants to increase productivity throughout their teams and increase cross-collaboration.
  • Applying Records Retention and IG to Office 365
    Applying Records Retention and IG to Office 365 Greg Forest, CTO, Contoural Recorded: May 2 2017 58 mins
    One day, the decision is made to move the company’s messaging to Microsoft’s Office 365 cloud platform. While this may make it easier and less expensive to manage email and messaging, it raises a number of questions: How should we configure Office 365? What electronic records do we have, how do we manage them, and does Office 365 have the required functionality to support our policy? How much legacy email should we migrate to the new system? Do we want to just take advantage of the messaging and client features or should we move our documents to SharePoint Online and OneDrive for Business as well? How do we train our employees on the new system? How do we migrate our information to the new system? How many of these questions do we need to answer now, or can we just figure them out along the way? Office 365 adoption raises a host of Information Governance questions. In this webinar industry expert Greg Forest from Contoural will address:
    • Office 365 deployment options (cloud only and hybrid)
    • Implementing governance policies for Office 365 components
    • Office 365 migration and employee behavior change management strategies
    • Creating an Office 365-specific Information Governance roadmap
  • Protecting Against a Panama Papers Breach
    Protecting Against a Panama Papers Breach Mark Diamond, Contoural CEO Recorded: May 2 2017 57 mins
    A Panama law firm suffered a massive data leak exposing offshore holdings of government officials across the world and companies should take notice. While the media has focused on the politicians involved, this breach also points to a more insidious trend: A new normal has come into place whereby it’s seemingly OK to breach information and the media’s “right to know” appears to trump companies and law firms’ rights to keep their confidential, sensitive and even privileged documents and data private. Traditional privacy and cybersecurity efforts are often ineffective against these types of attacks, and new, smarter approaches are needed.
    In this webinar we will discuss:
     How the “Panama Papers” and other similar attacks represent a new type of risk
     Where traditional information security approaches often fall short
     Key steps companies can take to protect themselves
  • Building a Real Business Case for Information Governance
    Building a Real Business Case for Information Governance Mark Diamond, CEO, Contoural Recorded: May 2 2017 56 mins
    How do we take such a diverse program such as Information Governance, that can reduce risk, cost, and in many cases move the business forward, and leverage it in a way so that the organization can figure out what value it has and build a business case for senior management?
  • Applying Records Retention and Deletion to Structured Data
    Applying Records Retention and Deletion to Structured Data Greg Forest, CTO, Contoural Recorded: May 2 2017 59 mins
    Historically, records retention programs have focused on hardcopy paper records in addition to semi structured electronic information like email, and unstructured information such as files and images. Yet surveys indicate that up to 75% of most data reside in structured systems – relational and other types of databases that house application data. These systems contain records, privacy information and other content subject to legal and regulatory requirements. Most organizations, however, rarely apply retention deletion and other governance policies to this structured data, creating both non-compliance and risk.
  • Is It Time for Your Records Retention Schedule to Grow Up and Become Useful
    Is It Time for Your Records Retention Schedule to Grow Up and Become Useful Tom Mighell, VP of Service Delivery, Contoural Inc. Recorded: May 2 2017 60 mins
    We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your information governance foundation. Many organizations consider records retention as something that they have to do, but feel handcuffed because they have no way of enforcing a policy. This webinar covers the different ideas to get your records retention schedule “off the couch” and become something useful to your organization.
  • How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms
    How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms Doug Austin and Karen DeSouza, Esq. Jun 28 2017 5:00 pm UTC 75 mins
    Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. This webcast* will discuss how SaaS automation technology has revolutionized eDiscovery for solo and small firms today.

    Webcast Highlights:

    + How Automation and the Cloud is Affecting All Industries, including eDiscovery
    + Drivers for the eDiscovery Automation Revolution
    + The Impact of Automation and the Cloud on the Lawyer Job Market
    + The Evolution of eDiscovery Technology
    + Whip Me, Beat Me, Call Me EDna: Two Challenges, Seven Years Apart
    + Key Components of a SaaS eDiscovery Automation Solution
    + Cost Alternatives for SaaS eDiscovery Automation Solutions
    + Can Automation Really Disrupt the eDiscovery Industry?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • The new Silk Road of innovation: Taking your IP into ASEAN and the World
    The new Silk Road of innovation: Taking your IP into ASEAN and the World Mr Daren Tang, Chief Executive of the Intellectual Property Office of Singapore (IPOS) Jun 29 2017 9:00 am UTC 60 mins
    The Chief Executive of the Intellectual Property Office of Singapore joins us for this exclusive webinar.

    Singapore's IP regime has been consistently ranked as one of the best in the world. More than 5400 multinational companies choose to set up their Asia-Pacific headquarters in Singapore, using Singapore as a gateway to ASEAN and beyond.

    Home to a growing consumer market of 600 million people, ASEAN is a highly attractive destination for investors. Increasingly, digital technologies are changing how business is done by blurring the lines at the borders, creating a truly global marketplace. With a greater focus on innovation to drive profitability, how can companies take advantage of the economic opportunities in ASEAN and globally?

    In this webinar, you will discover how the Intellectual Property Office of Singapore (IPOS) is helping businesses accelerate growth with the following solutions:

    - Continuing IP education to keep abreast of continuing changes in the IP realm.
    - Technology foresighting and a strong IP strategy to help build and sustain a competitive edge in your business.
    - Patent acceleration initiatives that will facilitate the protection of your technology globally.
    - IP financing and valuation.
    - SGD 1 billion Makara Innovation Fund that supports the global expansion of IP-driven companies, from Singapore and through Singapore.
  • Success Factors in Threat Intelligence: Part 2 - Starting a Program
    Success Factors in Threat Intelligence: Part 2 - Starting a Program Allan Thomson, Chief Technical Officer Jun 29 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In Part 1 of the CSO Series we introduced the key business and technical requirements of TI programs. In Part 2 webinar we will examine some important definitions to consider in TI and how to start building the program based on the requirements identified in Part 1 of the series. We will introduce to the audience the overall vision of the TI program execution, doing gap analysis on existing security programs and identifying where the TI program can complement and enhance existing investments.
  • How to unearth the billion dollar idea you didn't know you had
    How to unearth the billion dollar idea you didn't know you had Hosted by Timi Olotu at patsnap.com Jul 12 2017 3:00 pm UTC 60 mins
    Once you get into the groove of generating ideas and prototypes, it's easy to build a scrapheap of forgotten ideas. Maybe your R&D team cooked up something that didn't work for its intended purpose... but does that mean it doesn't have value when applied to solve a different problem or within another division?

    For example, Xerox created Xerox Technology Ventures (XTV) to recycle "abandoned" ideas... and it saw great success. This programme led to the profitable launch of initiatives like the Advanced Work Station (AWS)—a project that had previously been deemed unfit for purpose.

    Join our webinar as we discuss:

    - Tips for unearthing the gems buried in your pile of abandoned ideas
    - Strategies for effectively monetising these ideas.
  • Success Factors in Threat Intelligence: Part 3 - Key Elements
    Success Factors in Threat Intelligence: Part 3 - Key Elements Allan Thomson, Chief Technical Officer Jul 12 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig into the key elements of the TI program with concrete examples, and key components of the program that must exist including the right team, process, tools, metrics and connections.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Jul 18 2017 3:00 pm UTC 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Jul 18 2017 5:00 pm UTC 60 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Jul 18 2017 9:00 pm UTC 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • Why your company is using NDAs all wrong
    Why your company is using NDAs all wrong Vick Krishnan | Barrister at Law | Hosted by Ruta Sudmantaite from patsnap.com Jul 19 2017 3:00 pm UTC 60 mins
    Due to unforeseen circumstances we have had to delay this webinar to the 19th of July. We apologise for any inconvenience caused and if you can't make this live showing you will still be sent the recorded version. Thank you for registering to our Webinars.

    How well protected are your company's ideas, methods, and intellectual property? Non-disclosure agreements, or NDAs, can play an important role, alongside patents, trademarks, trade secrets, and copyright in ensuring that intangible assets are properly secured.

    However, many companies are making significant mistakes in the way that they use NDAs, leaving valuable company assets at risk when discovering and negotiating with external partners, collaborators or suppliers.

    Join our webinar to learn:

    - How to determine when an NDA is appropriate
    - The risk factors you should be aware of
    - Common mistakes companies make with NDAs and how to avoid them

    This webinar is essential viewing for anyone who is involved with collaborative R&D or managing supply chain relationships.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Jul 19 2017 5:00 pm UTC 60 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.


    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Jul 19 2017 9:00 pm UTC 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Jul 20 2017 5:00 pm UTC 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Jul 20 2017 9:00 pm UTC 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • Is your CEO an innovation bottleneck?
    Is your CEO an innovation bottleneck? Hosted by Kirsty Bell at patsnap.com Aug 2 2017 3:00 pm UTC 60 mins
    Innovation is a board-level agenda item. A recent McKinsey study revealed that 70 percent of senior executives said that innovation will be one of the top three drivers of growth for their companies in the next three to five years.

    Companies who innovate effectively can bring new products to market faster, find it easier to attract and retain customers, and can even enjoy a higher share price as a result.

    But not every CEO is well equipped to effectively align people, processes, technology and market forces to create successful innovation. And in many companies, the CEO can actually become an innovation bottleneck, potentially suffocating creativity, and making it more difficult for the company to bring innovative products and services to market at the right time.

    In this webinar we will discuss:

    - What makes certain CEOs better equipped to lead innovative companies
    - Simple ways to identify if your CEO is stifling innovation
    - Common mistakes CEOs make that leads to poor innovation performance
    - Strategies R&D leaders can use to improve communication with bottleneck CEOs and empower their team to innovate.
  • 5 things IP and R&D teams should never hide from each other
    5 things IP and R&D teams should never hide from each other Laura Schoppe at Fuentek | Hosted by Ruta Sudmantaite at patsnap.com Aug 9 2017 3:00 pm UTC 60 mins
    In many organisations, there is a widening gap in the communication between these departments; R&D may invent something with the intention of filing a patent only to find out later from the IP department of pre-existing IP which renders their research (and costs) effectively wasted.

    Here at PatSnap, our clients often tell us that the two teams can no longer work independently, so we thought we'd explore how to improve communication between the two divisions.

    We will be joined by Laura Schoppe an industry expert from the world of R&D and IP, and get her insight into the five most important things the two teams should never hide from each other.

    This webinar is essential viewing for any innovation leader, across any division looking to improve cross team collaboration and flexibility.
  • The life and death of your innovation ideas
    The life and death of your innovation ideas Hosted by Jessie Parker at patsnap.com Aug 16 2017 3:00 pm UTC 60 mins
    When it comes to innovation, we often only see the end product of a successful idea, and this got us thinking, what about everything in between? What about those ideas that didn't quite make the cut?

    Join PatSnap and a panel of innovation leaders as we discuss some of the worlds best and worst innovation ideas. We'll also explore:
  • Why the stage-gate process is killing your innovation strategy
    Why the stage-gate process is killing your innovation strategy Hosted by Timi Olotu at patsnap.com Aug 23 2017 3:00 pm UTC 60 mins
    The stage-gate process is as ubiquitous in R&D as doors are in the real-world. But, like doors, stage-gate processes aren't always the best solution for filling a gap. They can be overly elaborate (leading to slowness), fixated on pruning rather optimising (leading to negativity), and lacking in flexibility (leading to missed opportunities).

    Join our webinar as we explore:

    - The shortcomings of the stage-gate process
    - Potential alternatives that could drive more efficiency and productivity

    This webinar is essential viewing for any innovation leaders who are looking to take their innovation strategy out of its comfort zone and to the next level.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • How to build your R&D A-team
    How to build your R&D A-team Hosted by Kirsty Bell at patsnap.com Aug 30 2017 3:00 pm UTC 60 mins
    R&D success is dependent on many factors – the idea, the market opportunity, the technology readiness, and your company’s ability to deliver on the strategy.

    And at the heart of all these things is the R&D team. Different skill-sets and personalities are better suited to different types of innovation, and world-class innovation teams can find ways to make even the most challenging projects succeed.

    Join this panel discussion to learn:

    - The role that team structure plays in R&D success
    - How R&D leaders can build teams to fit their innovation strategy
    - What strategies the world’s most innovative companies use to build R&D A-teams
  • ASEAN connections: Cross-border M&A
    ASEAN connections: Cross-border M&A Richard Dailly, Managing Director, Kroll Sep 12 2017 6:00 am UTC 90 mins
    Rich with investment opportunities and positive demographics — a young and dynamic population with growing disposable income and upward mobility — the Association of Southeast Asian Nations (ASEAN) continues to attract international acquirers.

    In 2016, the region recorded 534 M&A transactions valued at US$57.9bn, and Q1 2017 sustained the momentum with 118 deals worth US$14.7bn. This was a year-on-year increase of 8% in value and 7% in volume over the same period in 2016. For foreign inbound M&A, the ASEAN saw 223 deals worth US$23.7bn in 2016, a 10% rise in volume but a 16% drop in value from US$28.1bn (202 deals) in 2015. In 2017, volumes have remained relatively steady while values have shot up, with the first quarter registering as much as 45% of 2016’s annual total.

    Join Kroll Managing Director Richard Dailly as he shares insights on the ways to spot and mitigate risks before entering into cross-border M&A transactions in the ASEAN.