Hi [[ session.user.profile.firstName ]]

Legal

  • 2019 Federal Judges Survey: Key Takeaways and Trends
    2019 Federal Judges Survey: Key Takeaways and Trends
    EDRM and Exterro Recorded: Feb 14 2019 63 mins
    More than 250 federal judges responded to a survey from Exterro and Duke Law on how they view and handle discovery disputes and what they expect from lawyers.

    Register for this webcast to get exclusive advice and best practices for not only meeting e-discovery defensibility requirements but also learn...

    - Tips for reducing e-discovery expenses without sacrificing defensibility
    - How to effectively interact and communicate with judges on e-discovery issues
    - What new data types judges are seeing spoliated the most in their cases
  • Digital Document Transformation is Here: Are You Ready?
    Digital Document Transformation is Here: Are You Ready?
    Will Spendlove, VP Product Marketing & Marcus Wadell, Solutions Engineer Recorded: Feb 14 2019 50 mins
    Automating the creation and distribution of your most commonly used and highest-value documents can help teams across your company achieve greater speed and efficiency, deliver a better customer experience, and improve business operations without additional resources or expense.

    Join us to:

    1. Discuss the importance of Digital Document Transformation.
    2. Hear more use cases for Conga Composer and Conga Collaborate.
    3. Start transforming your processes to generate more revenue and create business-critical efficiencies.
  • Breached! What’s Your Cybersecurity Response Plan?
    Breached! What’s Your Cybersecurity Response Plan?
    EDRM and Zapproved Recorded: Feb 12 2019 61 mins
    There is a lot of talk about strategies to prevent your data but what about your response plan if a breach does happen? Minimizing risk is essential, but just as critical for your litigation readiness plan is how to adjust your processes and measures in response. During this webinar, our panel of security experts will walk you through the steps and considerations following exposure.

    Speakers Include:
    Brad Harris, Vice President of Corporate Strategy, Zapproved LLC
    Chris Wolski, Chief Information Security Officer, Herman Miller Inc.
    Sarah Knight, Senior Privacy Counsel, Gilead Sciences
    Matthew E. Yarbrough, Managing Partner, Yarbrough Law, PLLC
  • Unlock the Keys to Success in your CLM Journey
    Unlock the Keys to Success in your CLM Journey
    Andrew Walters, CLM Practice Manager & Lizzy Painter, CLM Marketing Manager Recorded: Feb 12 2019 29 mins
    Effective contract management has many quantifiable benefits for companies. The return on investment can be remarkable, appearing on many levels across various departments.

    At Conga we understand the importance of getting contract management right and we believe that all successful deployments share a common journey.

    Join us as we discuss:

    1. How to think big but act small - We know CLM can be overwhelming
    2. Key Elements of CLM
    3. Phased and iterative approach to Implementation (when to phase and a few considerations)
    4. The difference between a successful and a failed implementation
    5. CLM Maturity and it's affect on contracts

    Let us show you how your business can realize it’s full potential by understanding and managing your current and future contracts.
  • IP and the automotive sector
    IP and the automotive sector
    Matt Hervey (Gowling WLG); Dalpreet Saluja (Visteon); Magdalena Jablonski (Bosch) Matthias Schneider (Audi); Recorded: Feb 12 2019 62 mins
    Join Gowling WLG and Managing IP for a complimentary webinar on February 12 at 4pm GMT/11am EST as we review the challenges posed by the future development of connected cars and autonomous vehicles. Guest speakers Matt Hervey and James Nurton will discuss strategies for innovative and disruptive technology trends. Topics to be discussed include:
    • Challenges to the automotive industry: scale of investment needed, new entrants, competition for AI skills
    • Patentability of AI in automotive applications
    • Alternatives to patenting including the importance of trade secrets, copyright, designs and branding
    • Is data properly recognised in IP?
    • SEPs and connected vehicles and the potential for standards for AVs
    • Growth of litigation in the automotive sector and licensing models
    • IP for mobility as a service
  • The 2018 Open Source Year in Review
    The 2018 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Recorded: Feb 6 2019 59 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, Partner at DLA Piper and General Counsel for the Open Source Initiative and Tony Decicco, Shareholder, at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2018, including:

    •The rising importance of data and licensing considerations
    •Business model problems and the proposed solutions (RedisLabs and MongoDB)
    •Dangerous Legal Theories: core developers as fiduciaries
    •OSS vs. SSO: clash of models
    •Return of Linux patent troll: McHardy
    •The need to extend the scope of an audit to cover web services/APIs
    •The changing tide in open source license adoption
    •Big open source transactions
    •And more

    Live attendees will earn CLE credit for this webinar. Don’t miss out – register today.

    CLE:
    DLA Piper LLP (US) has been certified by the State Bar of California, the Board on Continuing Legal Education of the Supreme Court of New Jersey, and the New York State Continuing Legal Education Board as an accredited CLE provider. The following CLE credit is being sought:
    •California: 1.0 Credit (1.0 General, 0.0 Ethics)
    •New Jersey: 1.2 Credits (1.2 General, 0.0 Professional Responsibility)
    •New York: 1.0 Transitional & Non-Transitional Credit (1.0 Professional Practice, 0.0 Ethics and Professionalism)
    CLE credit will be applied for in other states where DLA Piper has an office with the exception of Minnesota, North Carolina, Pennsylvania, and Puerto Rico.
  • Best Practices : Efficiency with Contract Lifecycle Management
    Best Practices : Efficiency with Contract Lifecycle Management
    Conga & Statera Recorded: Feb 5 2019 45 mins
    The end of the fiscal year is always a mad rush of activity as department heads hurry to push through projects, spend remaining budget, and finalize contracts before the year closes. Sales, procurement, and legal teams usually feel the brunt of the pressure, as they battle timewasting manual processes and piles of paperwork to squeeze in priority projects and revenue opportunities in under the wire.

    Join Conga and Statera for a discussion about contract management pain points and best practices to remedy those pitfalls and put you on a path to efficiency for 2019.

    In this session you’ll learn:

    -Common pain points and pitfalls when it comes to contract management
    -Best practices for the buying process and implementation
    -Demo: MSA and NDA tips & tricks
  • Detect, Analyze & Respond to Advanced Malware Using Orchestration & Automation
    Detect, Analyze & Respond to Advanced Malware Using Orchestration & Automation
    John Moran, Senior Product Manager, DFLabs Mark Mastrangeli, Lead Architect, McAfee, Security Innovation Alliance Recorded: Feb 5 2019 48 mins
    Detect, Analyze and Respond to Advanced Malware Using Security Orchestration and Automation: A DFLabs and McAfee Use Case

    As malware attacks continue, attackers are going to great lengths to obfuscate both the intent and capabilities of their malicious payloads to evade detection and analysis. In addition, the rate at which new malware is being developed has reached staggering new levels. Zero-day malware is increasingly common in all environments and signature analysis is becoming less effective.

    As a result, malware has become increasingly difficult to detect using more traditional detection mechanisms. Once detection occurs, it is often difficult to successfully analyze the malicious file to determine the potential impact and extract indicators. To successfully respond to a potential malware incident to contain the threat and block malicious traffic to minimize the impact, early detection and analysis are critical.

    In this webinar we will discuss how a security operations team can detect, analyze and respond to advanced, evasive malware by using DFLabs’ IncMan SOAR platform integrated with McAfee’s suite of tools including Advanced Threat Defense (ATD), Web Gateway and ePO for malware detection, while further being able to share critical security information using McAfee OpenDXL.

    Key Takeaways:

    Learn how McAfee’s suite of security products combined with IncMan SOAR from DFLabs can automatically detect and respond to malware threats to improve the effectiveness and efficiency of your security program by:

    - Performing advanced malware analysis
    - Enriching alert data
    - Immediately blocking threats
    - Sharing critical threat intelligence

    Your registration information will be shared with McAfee who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Transform Your Security Operations With SOAR Technology -  IncMan SOAR Overview
    Transform Your Security Operations With SOAR Technology - IncMan SOAR Overview
    John Moran, Senior Product Manager, DFLabs Cody Mercer, Manager of Pre-Sales & Sales Marketing, DFLabs Recorded: Jan 29 2019 60 mins
    IncMan SOAR from DFLabs is the only Security Orchestration, Automation and Response (SOAR) platform available capable of full incident lifecycle automation, including built-in, automated threat intelligence gathering, risk assessment, triage and notification, context enrichment, hunting and investigating, threat containment and more.

    This feature rich, unique and scalable solution provides context to security incidents, automates actions, orchestrates response to activities, while enabling full reporting and measurement functionality across all stakeholders. With its Open integration Framework, REST API and Automated START Triage, it is the most open and customizable SOAR platform in the industry, helping organizations to overcome some of the most common challenges and pain points when it comes to incident response.

    Join this webinar to learn how to transform your Security Operations by using SOAR technology and discover how DFLabs can help you to detect, respond to and remediate all security incidents fast, before they impact your organization.

    Key Features & Capabilities:

    - Security Automation and Orchestration
    - Threat Hunting and Investigation
    - Incident Management
    - Flexible Integrations and Event Parsing
    - Forensic Evidence Management
    - Reporting and KPIs
    - Knowledge Transfer & Machine Learning
    - Community Portal and Community Edition
  • Managing the Business Risks of Open Source
    Managing the Business Risks of Open Source
    Scott Crawford, Research Director for Information Security, 451 Research & Phil Odence, GM, Black Duck by Synopsys Recorded: Jan 24 2019 61 mins
    It’s no secret that “software is eating the world,” as Marc Andreessen once described—and it’s taking entire development communities to support it. Recently, open source has become a primary contributor to software found in the enterprise. According to a 2018 report from the Synopsys Center for Open Source Research & Innovation, the average percentage of open source in codebases examined in Black Duck audits has increased to 57% from only 36% from the previous year. But open source isn’t risk-free—and the implications can have a direct impact on the business.

    Join Scott Crawford, research director for information security with 451 Research, and Phil Odence, general manager of Black Duck On-Demand with Synopsys, to take a closer look at open source risks and the ways that businesses can better evaluate and mitigate them. They’ll cover the following points and more:

    • One of the highest-profile breaches of 2017 was the result of a widely exposed vulnerability in a popular open source application component, exposing millions of personal financial records—and costing business leaders their jobs.
    • In just the last few weeks, the implicit trust on which the open source ecosystem is based has been exploited to steal tangible assets.
    • What’s the real cost of a data breach? In at least one highly visible case, a breach reduced the dollar value of an acquisition by hundreds of millions. As business dependence on open source grows, so too does business exposure.
    • And of course, compliance with open source licenses remains a concern.

    Getting a handle on taming these threats to the business requires an approach that fits with the central role open source plays in the fast-moving world of continuous innovation.
  • The End of Sanctions?
    The End of Sanctions?
    Mira Edelman, Craig Ball, and Casey Sullivan Recorded: Jan 23 2019 67 mins
    Following the 2015 amendments to the Federal Rules of Civil Procedure, the amount of cases involving spoliation sanctions has plummeted. Today, cases involving discovery sanctions are only one third as common as they were during their peak in 2011 and 2012.

    Are we seeing the end of sanctions? And if so, what effects is this having on the legal practice?

    Join Logikcull and eDiscovery experts Craig Ball and Mira Edelman as we explore these topics, including a review of extensive new research on eDiscovery sanctions post-2015, key case laws, and emerging corporate discovery trends.

    About our presenters:

    Craig Ball

    Craig Ball is a trial lawyer, computer forensic examiner, law professor and noted authority on electronic evidence. Among his many accomplishments, he has served as the Special Master or testifying expert in computer forensics and electronic discovery in some of the most challenging and celebrated cases in the U.S. He is a founder of the Georgetown University Law Center E-Discovery Training Academy and regularly teaches eDiscovery and digital evidence at the University of Texas School of Law.

    Mira Edelman

    Mira Edelman has decades of experience in discovery, both as in-house counsel and in private practice. She has worked as Associate General Counsel and Director of eDiscovery Services and Information Governance for Facebook, Senior Counsel and Discovery manager for Google, and eDiscovery Counsel at Hughes Hubbard & Reed. Mira is also a frequent writer and speaker on issues such as sanctions, legal holds, and ESI.
  • Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Presentation Leaders: Doug Austin and Tom O'Connor Recorded: Jan 23 2019 67 mins
    2018 was another notable year for eDiscovery case law with several significant rulings that stand to impact eDiscovery practices and the admissibility of evidence. How can these key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2018 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Technology Assisted Review best practices and trends
    + The use of sampling to settle disputes
    + Admissibility vs. proportionality and privacy disputes
    + Form of production disputes and the issues involved
    + Key case rulings on discoverability of mobile device data
    + Privilege disputes and clawback requests
    + Impact of rules changes on boilerplate objections
    + The state of sanctions three years after the 2015 Fed Rules updates

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    John Wilson, ACE, AME, CBE and Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA Recorded: Jan 23 2019 65 mins
    Even in the most clear-cut matters, defending IP and trade secrets can be difficult. And when digital evidence is obfuscated through direct and indirect efforts, these defenses can be downright daunting. However, with a comprehensive and integrated discovery plan supported by a team of experts with digital investigative experience augmented with targeted eDiscovery technologies, legal teams can quickly, effectively, and economically gain and maintain the legal high ground in these critical corporate matters.

    This expert presentation will present actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters. Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.

    Webcast Highlights:

    + Organizing for Success: From Complaint to Discovery Plan
    + Accelerated Execution: Translating Data into Evidence
    + Advancing on Smoking Guns: Advanced Technologies and Assisted Review
    + Reviewing Right: Accelerated Legal Document Review
    + Decisive Differences: The Benefit of an Integrated eDiscovery Provider

    Presenting Experts:

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • AMP Up Your Response with SOAR and Cisco’s Security Suite
    AMP Up Your Response with SOAR and Cisco’s Security Suite
    John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Recorded: Jan 11 2019 58 mins
    Presented By:
    John Moran, Senior Product Manager, DFLabs
    Michael Auger, Senior Solutions Security Architect, Cisco Security
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security

    Learn how DFLabs’ Security Orchestration, Automation and Response solution, IncMan SOAR, integrates and performs seamlessly with Cisco’s security suite, including its latest integration with Cisco AMP for Endpoints.

    As organizations are exposed to more advanced and frequent attacks, speed of detection and response is critical in reducing financial and reputational damage.

    Cisco AMP for Endpoints leverages cloud-based analytics to detect and respond to advanced threats in real-time. Used with Cisco’s security suite, including Threat Grid, Umbrella and Umbrella Investigate, threats can be assessed, and assessments of the network performed; but this consumes valuable analyst time.

    IncMan SOAR allows security teams to automate repeatable tasks, including enriching initial threat indicators, allowing more time to focus on tasks which require human intervention.

    By combining these solutions, security teams can automate and orchestrate the process from initial alert, to containment and remediation, reducing actionable detection and response times from hours to seconds.
  • Rising Stars in 2019: Developing Leaders Program Launch
    Rising Stars in 2019: Developing Leaders Program Launch
    John Rybak, 2017 winner of the PRISM Industry Influencer award, and BB&T’s SVP Environmental Risk Manager Recorded: Jan 8 2019 45 mins
    Each year at EDR’s PRISM conference, an up-and-coming risk management or due diligence professional is recognized for impressive achievement in leadership, visibility, professional competency and/or industry involvement. Building on this popular awards category, EDR is excited to launch a new Developing Leaders program aimed to further the development of our industry’s future leaders. This new initiative will provide education and mentor/mentee connections to leverage the industry knowledge of prominent business leaders, and provide newer professionals with the tools and resources they need to fulfill their education and professional development goals.

    Each of the webinar speakers is an industry veteran who is deeply committed to helping rising professionals learn what they wish they knew when they were just starting out. Whether you’re a seasoned manager looking to retain top talent—or a newbie just starting out, join us for this kickoff webinar to hear what’s in store from EDR’s new Developing Leaders program!

    Who should attend:

    •Risk management professionals just starting out in the field
    •Experienced industry veterans
    •Anyone looking to broaden his/her professional development expertise

    Speakers:

    John Rybak, 2017 winner of the PRISM Industry Influencer award, and BB&T’s SVP Environmental Risk Manager
    Roger Caramanica, Ph.D., EDR’s VP of Organizational Development
    Dianne Crocker, EDR Insight’s Principal Analyst
  • Nuix Ringtail demonstration: removing doubt from your discovery process
    Nuix Ringtail demonstration: removing doubt from your discovery process
    Christina Mather, Solutions Consultant, Nuix Recorded: Jan 7 2019 31 mins
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Black Duck Audit Reporting: The Next Generation
    Black Duck Audit Reporting: The Next Generation
    Emmanuel Tournier, Sr. Manager, Black Duck On-Demand and Phil Odence, GM – Black Duck On-Demand at Synopsys Recorded: Dec 18 2018 45 mins
    You won’t want to miss this webinar, if you have received Black Duck audit reports and anticipate more in the future.

    Black Duck by Synopsys constantly strives to improve our offerings and reporting capabilities. We’ve expanded the range of our audit offerings, and by the first of the year, we’ll be rolling out a new set of reports and a new process for sharing them. Join us for a preview of the new reports and process. Black Duck On-Demand’s Phil Odence and Emmanuel Tournier will demonstrate how we have combined customers’ ideas with the best elements of our reporting to develop new reporting technology and processes designed to make reviewing audit results easier, more insightful, and more productive.
  • Crowdsourcing IP Research: From Novelty to Best Practice
    Crowdsourcing IP Research: From Novelty to Best Practice
    Peter Vanderheyden, COO, RWS IP Research Recorded: Dec 18 2018 42 mins
    Join RWS IP Research COO Peter Vanderheyden for a live webinar on how crowdsourcing your prior art can serve as a best practice for your IP research. What was once a novel and uncertain methodology has been reliably used to kill bad patents in litigation, monetize patent portfolios and even provide competitive analyses. In 40 minutes, we will discuss:

    •Why crowdsourcing is particularly suited for infringement cases, monetization efforts and even competitive intelligence;
    •A walk through of results illustrative of a crowdsourced search;
    •How RWS uniquely approaches the crowdsourcing process for purposes of finding prior art;
    •How technology plays a role and the advantage of our AOP Connect™ platform;
    •How crowdsourcing can help you to efficiently and effectively manage discovery risk and confidentiality; and more.

    About the Presenter

    Peter Vanderheyden is COO of RWS IP Research where he brings over 30 years of experience across all business disciplines from finance to product management and entrepreneurial startups. Prior to joining RWS, Mr. Vanderheyden was the Chief Executive Officer of Article One Partners where he led a team that developed AOP Connect and helped revolutionize the way that IP research is conducted through crowdsourcing. While vice president and Managing Director of LexisNexis’s Global IP Solutions, his team developed both TotalPatent and PatentOptiimizer, while spearheading the first truly semantic search engine for technical/patent content.

    Mr. Vanderheyden earned a BS in Business from the University of Minnesota with undergrad certification in math, science and engineering. Mr. Vanderheyden also has a US Patent to his credit.

    https://www.rws.com/
  • DFLabs’ New Open Integration Framework and Customer Community Portal
    DFLabs’ New Open Integration Framework and Customer Community Portal
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabs Recorded: Dec 18 2018 41 mins
    DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.

    The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.

    Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:

    - Open Integration Framework
    - Community Portal
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...
  • 10 Things Corporate Counsel Hate—And How to Avoid Them
    10 Things Corporate Counsel Hate—And How to Avoid Them
    Robert Schlossman, CLO at Zscaler, Laszlo Kupan, GC at J.D. Power Recorded: Dec 13 2018 64 mins
    Today’s in-house counsel are changing the practice of law. GCs and CLOs are leading the charge to implement new legal technology, to bring new efficiencies to the legal process, and to, simply, do more with less. Meanwhile growing in-house expertise and autonomy are changing the dynamic with outside counsel, as corporate clients demand to be treated not as advisees, but as partners. If you want their business, you’ll need to keep them happy.

    We want to help you do that. Join us for our upcoming webinar featuring Robert Schlossman, Chief Legal Officer at Zscaler, and Laszlo Kupan, General Counsel at J.D. Power, as we explore the 10 things corporate counsel hate—and how to avoid them.

    Featured Presenters:
    Robert Schlossman, Chief Legal Officer at Zscaler, has been a key legal and business advisor to CEOs, management teams, and boards of directors of public, private equity, and venture capital backed companies. Robert develops legal departments into organizations that both protect a company and enable the success of the business. He has substantial experience with streamlining legal operations, optimizing legal budgets, creating and managing compliance programs, IP strategy, contracts, litigation, and more.




    Laszlo Kupan is General Counsel at J.D. Power, one of the leading marketing information services companies, where he works to help the company realize both its business and legal objectives. Prior to joining J.D. Power, Laszlo worked as senior counsel for Live Nation and General Counsel for Access Integrated Healthcare.
  • Using coaching to advance your career
    Using coaching to advance your career
    Julie Smith, Pressurevalve; Michael Loney, Managing IP (moderator) Recorded: Dec 13 2018 55 mins
    Coaching is now a key component of many development packages, but do we really understand what it is and how to use it to our advantage?
    In this practical session we’ll explore the following questions:
    •What is coaching and what isn’t coaching?
    •What type of challenges and goals can coaching help with?
    •What happens in the coaching process?
    •Are you ‘coachable’?
    •How do you find a coach and assess whether they are the right fit for you?

    Julie Smith is Director and Coach at Pressurevalve Ltd. As well as being a qualified executive coach, she’s also an experienced leader with 15+ years in management positions. Ten of these were in senior posts, including heading national operations and an interim CEO post. This means she understands the complexities, challenges and rewards of leadership. Key success factors in her coaching include helping people develop: skills in viewing situations from different perspectives, self-awareness, decision-making, confidence, self-belief, self-coaching and resilience. As well as coaching, Julie: designs and facilitates sessions for leadership programmes in London and New York, runs network groups for leaders and is Chair of the Global Taskforce of the American Express Leadership Academy, Alumni Network. If you’d like more information on Julie’s coaching services, plus self-coaching resources, visit: https://www.pressurevalvecoaching.com/free-stuff
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Recorded: Dec 13 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • 2018 eDiscovery Year in Review
    2018 eDiscovery Year in Review
    Doug Austin and Tom O'Connor Recorded: Dec 12 2018 64 mins
    2018 was a very busy and significant year from an eDiscovery standpoint. This year has had everything from new data privacy laws here and in Europe to the use of Internet of Things (IoT) devices in discovery to important trends regarding the use (or non-use) of Technology Assisted Review (TAR) to a landmark SCOTUS case regarding accessing cell phone location data without a warrant. What do you need to know about important 2018 events and how they impact your eDiscovery efforts? This CLE-approved* webcast will discuss key events and trends in 2018, what those events and trends mean to your discovery practices and predictions for 2019. Topics include:

    + Technology Competence Trends and Developments
    + CLOUD Act and the Microsoft Ireland Case
    + General Data Protection Regulation (GDPR) and California Data Privacy Law
    + Data Privacy and Cybersecurity Trends and Challenges
    + SCOTUS Ruling in Carpenter v. US
    + Technology Assisted Review (TAR) Trends
    + Internet of Things (IoT) Devices as Sources of ESI
    + Business and Investment Trends within eDiscovery
    + Form of Production Trends and Disputes
    + New Resources for eDiscovery Best Practices

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Beyond Open Source Compliance: Security in M&A Due Diligence
    Beyond Open Source Compliance: Security in M&A Due Diligence
    Nabil Hannan, Managing Principal, Synopsys Recorded: Dec 12 2018 30 mins
    The headline of Wall Street Journal article from March read “Due Diligence on Cybersecurity Becomes Bigger Factor in M&A.” In April, Gartner reported, “Cybersecurity is Critical to the M&A Due Diligence Process.” Companies that invest in open source license compliance as part of diligence are starting to dive more deeply into security issues.
     
    A first step in assigning the security of software assets is looking at known vulnerabilities in open source components. But, now as part of the Synopsys Software Integrity Group, Black Duck can bring much broader capabilities to bear to analyze the overall security of code assets, including proprietary code.
     
    This webinar will discuss application security issues at a high level and the security services that you can include with a due diligence audit.
  • Automation as a Force Multiplier in Cyber Incident Response
    Automation as a Force Multiplier in Cyber Incident Response
    Mike Fowler, CISSP - VP of Professional Services, DFLabs Feb 26 2019 4:00 pm UTC 15 mins
    Security analysts are subjected to such a volume and frequency of alerts that over time they can become desensitized to the information they are analyzing, resulting in critical alerts potentially being disregarded or missed.

    When responding to tens of thousands of security alerts a month, how can you reliably distinguish what's important from what's just a noise in the background?

    Join our new webinar to learn how a Security Orchestration, Automation and Response (SOAR) solution can help your overwhelmed cyber response team to "SOAR" above the noise when detecting, responding to and remediating a potential security incident. Our VP of Professional Services, Mike Fowler, will present proven best practices to reduce and avoid alert fatigue.

    Key Takeaways:

    ● What is “Alert/Alarm Fatigue” and why should you care?
    ● What is the impact of alert fatigue on Security Operations and Incident Response?
    ● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
    ● How to reinforce the front line
    ● How to leverage SOAR capabilities that act as a Force Multiplier in Incident Response

    Want to learn more on the topic ahead of the webinar? Download our white paper "Automation as a Force Multiplier in Cyber Incident Response" here: https://bit.ly/2SKN9pL
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Feb 27 2019 10:00 am UTC 45 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • What you need to know about forensics in the cloud
    What you need to know about forensics in the cloud
    Marc Cressall, VP Business Development at AccessData and Keith Lockhart, Vice President of Strategic Programs at AccessData Feb 27 2019 4:00 pm UTC 30 mins
    More and more organizations have made the decision to migrate to the cloud. Speed, security, collaboration, scalability and reliability are some of the many benefits of adopting a cloud strategy. In fact, some larger organizations and government agencies have a cloud first policy owing to the aforementioned benefits. However, given the current assumption of “when, not if” a cyber event will affect your organization, it’s necessary to have a plan in place for collecting evidential data from the cloud and analyzing it in a forensically sound manner.

    Join Marc Cressall, VP Business Development and Keith Lockhart, VP Strategic Programs in a 30-minute webinar to learn about:

    • Trends impacting forensics in the cloud
    • Benefits of the cloud
    • What AccessData offers in managed cloud solutions

    Next up—in March, Eide Bailly joins us to talk about how they are using the AccessData Cloud Solution to increase the efficiency of working a case and increase their overall profits. You won’t want to miss it!
  • Active Learning in eDiscovery: From Analytics to Outcomes
    Active Learning in eDiscovery: From Analytics to Outcomes
    Vazantha Meyers, Esq., and Todd Haley Feb 27 2019 5:00 pm UTC 75 mins
    The promise of employing active learning in eDiscovery has been its capability to simplify and speed the reduction and review of legal documents when compared to traditional data reduction and review approaches. However, this promise of active learning is often not achieved based on the lack of understanding and expertise of the individuals and organizations seeking to use this powerful eDiscovery tool.

    This expert presentation will help eDiscovery professionals understand how to appropriately apply active learning to audits, investigations, and litigation by explaining how active learning works, what are the best situations and practices for its use, and how it has been successfully employed to help legal teams speed and shape positive eDiscovery outcomes.

    Webcast Highlights:

    + Active Learning: How It Works
    + Appropriate Uses: When Active Learning Makes Sense
    + Benefits, Costs and Cost Savings: The Reasons for Choosing Active Learning
    + Shaping Positive Outcomes: Practical Examples and Explanations of Active Learning Success
    + Lessons Learned: How to Use Active Learning Successfully and Avoid Pitfalls

    Presenting Experts:

    + Vazantha Meyers, Esq.

    As Director of Review Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives. Recognized as an expert in all aspects of traditional and technology-assisted review, Vazantha graduated from Purdue University and obtained her JD from Valparaiso University School of Law.

    + Todd Haley

    As Vice President of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address various matters related to the planning, management, execution, and documentation of eDiscovery. An information technology expert with industry-acknowledged expertise in managed services, Todd has served in IT and leadership positions with multiple law firms and technology integrators.
  • The Round the Clock Third Party Advantage
    The Round the Clock Third Party Advantage
    Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger Mar 20 2019 6:00 pm UTC 60 mins
    Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.

    In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.

    This webinar will answer:

    - Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks

    - How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network

    - Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others

    - Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly
  • After the Attack—Surviving and Thriving Post-Breach
    After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, Vice President of Strategic Programs, AccessData Mar 21 2019 4:00 pm UTC 60 mins
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • Top Considerations for Software Audits in M&A Due Diligence
    Top Considerations for Software Audits in M&A Due Diligence
    Phil Odence, Synopsys Mar 21 2019 4:00 pm UTC 60 mins
    There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate those risks. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.

    Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:

    • Application Risks: What’s in the code
    • Taking a comprehensive approach to security audits
    • Choosing the right partner for audits

    Don’t miss this informational webinar. Register today!
  • Anatomy of an International Investigation
    Anatomy of an International Investigation
    Jeremy Burdge, John Wilson, and Michael Sarlo Mar 27 2019 4:00 pm UTC 75 mins
    From FCPA to FIFA and from the Panama Papers to GDPR privacy requirements, international investigations require an incredible balance of knowledge, expertise, and practical experience for those involved in collecting and assessing electronically stored information (ESI) in response to bribery, corruption, fraud, and privacy violation allegations. And with the increased risk factors associated with multinational and cross-border data transfer, an investigative misstep might be the last step for involved investigators.

    This expert presentation led by international investigations expert Jeremy Burdge of Hogan Lovells will present actionable considerations for auditors, investigators, and litigators as they navigate the planning requirements, political and people issues, privacy laws, and the technologies available to identify and shape positive investigation outcomes in international venues.

    Webcast Highlights

    + Defining Investigations: Internal and External Events
    + Preparing and Planning: Actors, Allegations, and End-Points
    + Politics and Privacy: Agreements, Borders, and Confidentiality
    + Technologies and Techniques: Investigative Goals and Goal Posts

    Presenting Experts:

    + Jeremy Burdge

    As Litigation Practice Group Lead for Legal Project Management (LPM) for the Americas at Hogan Lovells, Jeremy leads the LPM teams that support Investigations & White Collar, International Arbitration, and Employment practice groups spanning the firm's U.S., Mexico, and Brazil offices.

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.
  • Open Source Risk in M&A by the Numbers
    Open Source Risk in M&A by the Numbers
    Phil Odence, General Manager, Black Duck On-Demand Apr 11 2019 4:00 pm UTC 60 mins
    In over 1000 code bases audited in 2018, Black Duck found that nearly every one contained open source components. Not only that, but a significant % of “proprietary code” overall was open source. Virtually every company building software is now depending on open source, and with great reason. However, left unmanaged, open source can lead to license compliance issues plus security and code quality risks. Whether you’re on the buy side or sell side, these risks could negatively valuation in an M&A transaction.

    Many acquirers have come to understand all this in concept; Black Duck has the data. Join us for this webinar as we answer questions about the code of tech companies being acquired today. We’ll cover:


    • Open source license and security risks by the numbers
    • Why audits have become the norm in M&A tech due diligence
    • How you can get a complete picture of open source risks

    Don’t miss this informational webinar – register today.