Hi [[ session.user.profile.firstName ]]

Legal

  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Recorded: Jul 26 2017 72 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • Trade Secrets: the expert guide to managing them effectively
    Trade Secrets: the expert guide to managing them effectively Donal O'Connell at Chawton Innovation Services & Ruta Sudmantaite at patsnap.com Recorded: Jul 26 2017 60 mins
    By nature, Trade secrets are invisible and well, secret. They can be many things including a design, pattern or formula and allow a business to obtain some information not generally known to the public. which will give them a particular advantage. But with all this information being so secretive, how can you management those assets in a discrete way, that still provides your company with enough protection?

    PatSnap is pleased to welcome back Donal O'Connell, Managing Director of Chawton Innovation Services, for a webinar on trade secret asset management. Some topics covered in this webinar include:

    - The seven 'musts' of trade secrets
    - A look at some recent, high- profile trade secret court cases
    - Trade secret metadata
  • Fighting Brand Impersonation and Noncompliance in Social Media
    Fighting Brand Impersonation and Noncompliance in Social Media Kyle Sale, VP Product Management; Zac Wolf, Product Marketing Manager, MarkMonitor Recorded: Jul 25 2017 54 mins
    With social media consumption at an all-time high, companies must be vigilant against burgeoning cases of brand impersonation, false association and improper partner compliance in the social channel. Customers expect an authentic and seamless brand experience, and even one negative experience can have a damaging impact on your social reputation – and your bottom line.

    Please join MarkMonitor® Brand Protection experts Kyle Sale and Zachary Wolf as they discuss the most common types of brand abuse found in social channels and best practices for protecting your brand across social and other digital channels.

    During this webinar, you'll learn:
    -How to detect unauthorized branding on social pages, user names and posts
    -Existing social site enforcement policies – and gaps you should be aware of
    -What unauthorized use of copyrighted content, images, and trademarks looks like on social media
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Recorded: Jul 20 2017 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • Cyber Security and Insider Threats: Turning Policies into Procedures
    Cyber Security and Insider Threats: Turning Policies into Procedures Ingrid Fredeen, J.D, VP and Senior Product Manager, NAVEXEngage, and Pamela Passman, President and CEOCREATe Compliance Recorded: Jul 20 2017 64 mins
    Unfortunately, even the best technological defenses won’t protect your company’s intellectual property and data if your employees inadvertently or intentionally take actions to compromise confidential information. The key to mitigating risk for your organization is to provide all employees with policies, processes and training on cyber security awareness.

    Join this presentation with CREATe Compliance where we discuss:
    - Elements of an effective cyber security program – addressing ‘people, process and technology’
    - Spotlight on insiders: Mitigating risks from employees, contractors and third parties
    - Emerging trends: Assessing your enterprise’s cyber security capabilities; training your workforce on cyber security
  • How To Delete a Lot of Emails and Files Quickly and Defensibly
    How To Delete a Lot of Emails and Files Quickly and Defensibly Dan Elam, VP and Consultant, Contoural Recorded: Jul 20 2017 60 mins
    Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?


    About the Speaker:
    Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
  • Successful Enforcement Strategies in Chinese Marketplaces
    Successful Enforcement Strategies in Chinese Marketplaces Trevor Robbins, Brand Protection Analyst, MarkMonitor Recorded: Jul 20 2017 51 mins
    Online marketplaces in Asia are a fast-growing channel for counterfeit activity and brand abuse. What are the complexities of protecting your brand in these marketplaces and how can you drive a successful enforcement strategy?

    Please join MarkMonitor® Brand Protection expert Trevor Robbins as he reveals key strategies for successful monitoring and enforcement in Chinese Marketplaces.

    During this webinar you’ll learn:

    -How to build a strong trademark portfolio that meets country-specific requirements
    -Ways to leverage local partners to understand and build trust with Chinese marketplaces
    -Tips for avoiding and resolving enforcement issues
  • Lessons from the Trenches: In-House Practitioners Talk Information Governance
    Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 60 mins
    Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

    -How they got their organization to care about Information Governance
    -Lessons learned while executing their Information Governance programs
    -Why it's important to obtain consensus from across different groups
    -Building the right-sized program for your organization

    Join us for a lively discussion!

    About the Speakers:

    Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

    Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

    Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
  • Success Factors in Threat Intelligence: Part 3 - Key Elements
    Success Factors in Threat Intelligence: Part 3 - Key Elements Allan Thomson, Chief Technical Officer Recorded: Jul 19 2017 49 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig into the key elements of the TI program with concrete examples, and key components of the program that must exist including the right team, process, tools, metrics and connections.
  • Using a Data Placement Strategy to Simplify Data and Document Retention
    Using a Data Placement Strategy to Simplify Data and Document Retention Greg Forest, CTO, Contoural Recorded: Jul 19 2017 56 mins
    Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc. But before you can organize, you need to first answer some basic questions:
    - Where is the right place for specific content to live?
    - How and where do we keep as few copies as possible? Who can and should have access to what?
    - How do we make it easy to apply both retention and data security, while still enabling classification.

    Join us for a discussion on real-word data placement strategies for dealing with a complex world.

    About the Speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Why your company is using NDAs all wrong?
    Why your company is using NDAs all wrong? Vick Krishnan | Barrister at Law | Hosted by Ruta Sudmantaite from patsnap.com Recorded: Jul 19 2017 45 mins
    We've got bad news for you. It's extremely likely your company is making serious mistakes in the way it uses NDAs. Join this webinar to find out how to fix that.

    How well protected are your company's ideas, methods, and intellectual property? Non-disclosure agreements, or NDAs, can play an important role, alongside patents, trademarks, trade secrets, and copyright in ensuring that intangible assets are properly secured.

    However, many companies are making significant mistakes in the way that they use NDAs, leaving valuable company assets at risk when discovering and negotiating with external partners, collaborators or suppliers.

    Join our webinar to learn:

    - How to determine when an NDA is appropriate
    - The risk factors you should be aware of
    - Common mistakes companies make with NDAs and how to avoid them

    This webinar is essential viewing for anyone who is involved with collaborative R&D or managing supply chain relationships.
  • Become Litigation Ready: What To Do Now Before Your Next Lawsuit
    Become Litigation Ready: What To Do Now Before Your Next Lawsuit Tom Mighell, VP of Service Delivery, Contoural Recorded: Jul 18 2017 60 mins
    While you may not be able to avoid litigation, there is a tremendous amount you can do now to prepare for if and when litigation does strike. Join us for a thoughtful presentation on litigation readiness covering the policies, processes and technologies organizations can employ to reduce risk and costs of discovery. A little effort now can save a lot of pain and expense later.

    About the speaker:
    Tom is Vice President of Delivery Services at Contoural. With over 25 years of experience in compliance, litigation, privacy and information governance, Tom regularly works with corporations to develop information governance programs, including the creation and validation of records retention schedules.  Tom served as Chair of ABA TECHSHOW 2008, and as 2011-2012 Chair of the ABA's Law Practice Division.
  • The Difference Between Information Governance and Data Governance
    The Difference Between Information Governance and Data Governance Greg Forest, CTO, Contoural Recorded: Jul 18 2017 55 mins
    Legal is about to start an information governance initiative. IT gets wind of it and says that this initiative would be redundant, as they have been working on a data governance project for the past six months. The data governance charter touches on some areas of information governance, but then again not really. Should there be two initiatives, or increase the scope of one of them? Join us for a lively discussion on the difference between Information Governance and Data Governance.

    About the speaker:
    Greg Forest has 30 years of experience in compliance, storage, application software, management, support, and implementation of technical solutions for information governance, data management and regulatory compliance. As Contoural’s CTO, he has developed methodologies to make information governance solution deployment predictable and cost effective, and has worked with Contoural clients to help them select, configure, test, implement, and train new solutions to reduce cost and risk while improving employee productivity.
  • Creating the Foundation for an Effective and Workable IG Program
    Creating the Foundation for an Effective and Workable IG Program Mark Diamond (Contoural), Matthew Bernstein (DeutscheBank), Megan Hertzler (PG&E), Andrea Meyer (FCCC) Recorded: Jul 18 2017 60 mins
    Information Governance programs that address records management, privacy, litigation readiness and productivity hold the promise of delivering substantial value to the organization. Yet effectively executing these initiatives is both an art and a science. Join Matthew Bernstein from Deutsche Bank, Megan Hertzler from PG&E, and Andrea Meyer from the Foundation of CA Community Colleges for a lively discussion!

    About the Speakers:
    Matthew Bernstein: Matthew is the head of Deutsche Bank’s Group Information & Records Management, which is responsible for the Bank’s eDiscovery, Records Management, and Archiving operations and strategies. Matthew joined the Chief Operating Office division in 2013 to lead efforts to improve the Bank’s ability to provide timely, complete, and accurate responses to requests for information, while retaining and disposing of records in compliance with legal, regulatory, and business requirements.

    Megan Hertzler: Megan is the Director, Enterprise Information Governance for PG&E, one of the largest natural gas and electric utilities in the United States.  Megan leads the Enterprise Records and Information Management team, which is responsible for the effective management of PG&E records and information assets.  Previously, Megan was the Director of Information Governance at Xcel Energy, an attorney in private practice, and an Assistant Attorney General providing legal counsel to the Minnesota Public Utilities Commission. 

    Andrea Meyer: As the General Counsel and Corporate Secretary at the Foundation, Andrea Meyer oversees the contracts and legal team, facilitates contract management and legal review, manages outside legal counsel relationships, works collaboratively with the Chancellor’s Office legal affairs department to address mutual issues, and provides effective guidance on organizational strategies, programs, services, and their implementation as it relates to general risk management, compliance, and legal liability.
  • The Principles of PatSnap
    The Principles of PatSnap Jarrod Britton, Head of Product Support at PatSnap Recorded: Jul 12 2017 49 mins
    In the last couple of months, PatSnap has launched a number of different feature updates, and we'd like to share how you can drive the most value from them in your day to day work. We'd also like to share some upcoming features to look out for in the coming weeks.

    This webinar will focus on understanding and applying intellectual property knowledge, to the PatSnap platform. Specific topics covered in this session will include:

    - A quick summary of PatSnap's recent growth
    - How to perform the perfect search with examples of common queries
    - Best practices for refining your search results
    - PatSnap Workspaces
    - How to drive value from our analytical insights reports
    - A look into Q3 and some special features to look out for.

    This session will be valuable for anyone looking to explore PatSnap in a little more detail, and is for both PatSnap customers, and those who have never heard of PatSnap before.
  • A Faster, More Advanced VEC App is Coming Soon
    A Faster, More Advanced VEC App is Coming Soon Paul Schiffer, VP of Product, EDR Recorded: Jul 6 2017 46 mins
    The industry's only application to screen for vapor encroachment risk will soon be new and improved. We're moving the VEC App to Lightbox, saving you time. These updates will also include major improvements to key VEC App features like the ground water flow tool, filtering, report output and more. Join us for a preview of the new VEC App.
  • Success Factors in Threat Intelligence: Part 2 - Starting a Program
    Success Factors in Threat Intelligence: Part 2 - Starting a Program Allan Thomson, Chief Technical Officer Recorded: Jun 29 2017 46 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In Part 1 of the CSO Series we introduced the key business and technical requirements of TI programs. In Part 2 webinar we will examine some important definitions to consider in TI and how to start building the program based on the requirements identified in Part 1 of the series. We will introduce to the audience the overall vision of the TI program execution, doing gap analysis on existing security programs and identifying where the TI program can complement and enhance existing investments.
  • The new Silk Road of innovation: Taking your IP into ASEAN and the World
    The new Silk Road of innovation: Taking your IP into ASEAN and the World Mr Daren Tang, Chief Executive of the Intellectual Property Office of Singapore (IPOS) Recorded: Jun 29 2017 51 mins
    The Chief Executive of the Intellectual Property Office of Singapore joins us for this exclusive webinar.

    Singapore's IP regime has been consistently ranked as one of the best in the world. More than 5400 multinational companies choose to set up their Asia-Pacific headquarters in Singapore, using Singapore as a gateway to ASEAN and beyond.

    Home to a growing consumer market of 600 million people, ASEAN is a highly attractive destination for investors. Increasingly, digital technologies are changing how business is done by blurring the lines at the borders, creating a truly global marketplace. With a greater focus on innovation to drive profitability, how can companies take advantage of the economic opportunities in ASEAN and globally?

    In this webinar, you will discover how the Intellectual Property Office of Singapore (IPOS) is helping businesses accelerate growth with the following solutions:

    - Continuing IP education to keep abreast of continuing changes in the IP realm.
    - Technology foresighting and a strong IP strategy to help build and sustain a competitive edge in your business.
    - Patent acceleration initiatives that will facilitate the protection of your technology globally.
    - IP financing and valuation.
    - SGD 1 billion Makara Innovation Fund that supports the global expansion of IP-driven companies, from Singapore and through Singapore.
  • How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms
    How SaaS Automation Has Revolutionized eDiscovery for Solo and Small Firms Doug Austin and Karen DeSouza, Esq. Recorded: Jun 28 2017 63 mins
    Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. This webcast* will discuss how SaaS automation technology has revolutionized eDiscovery for solo and small firms today.

    Webcast Highlights:

    + How Automation and the Cloud is Affecting All Industries, including eDiscovery
    + Drivers for the eDiscovery Automation Revolution
    + The Impact of Automation and the Cloud on the Lawyer Job Market
    + The Evolution of eDiscovery Technology
    + Whip Me, Beat Me, Call Me EDna: Two Challenges, Seven Years Apart
    + Key Components of a SaaS eDiscovery Automation Solution
    + Cost Alternatives for SaaS eDiscovery Automation Solutions
    + Can Automation Really Disrupt the eDiscovery Industry?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • Ask a Patent Attorney: Patent Costs and How To Minimize Them
    Ask a Patent Attorney: Patent Costs and How To Minimize Them Dylan O. Adams, Senior Patent Attorney | hosted by Ruta Sudmantaite from patsnap.com Recorded: Jun 28 2017 37 mins
    Whether you are a sole inventor, or managing a patent portfolio for a global enterprise, patents are a significant investment that can help to protect your most valuable assets and enable them to be commercialized now, and in the future. However, costs involved with protecting your assets, and maintaining them can quickly add up over time.

    Dylan O. Adams, Senior Patent Attorney and Amazon Bestselling Author of "Patents Demystified, joins PatSnap once again for an informative and interactive Q&A-led webinar to share some best practices on keeping your patent costs down.

    Some topics covered in this session include:

    - Cost of provisional patent & non-provisional patent applications
    - Cost of responding to office actions
    - How to minimizing your attorney costs
    - Issuance and maintenance fees
    - Litigation and enforcement costs
    - International filing costs

    This webinar is essential viewing for anyone looking to slash their intellectual; property bill, and put their IP budget to better use.
  • The business of R&D: How intellectual property can reduce your tax bill
    The business of R&D: How intellectual property can reduce your tax bill Brian Williamson, Managing Director of Jumpstart | hosted by Ruta Sudmantaite at patsnap.com Recorded: Jun 22 2017 53 mins
    R&D is an expensive business – Last year alone, UK companies invested £16.5 billion into research and development, which accounted for 4% of the total global spend.

    While 25% of R&D spend came from the higher education sector and 7% from Government and Research Councils, the majority - a massive 66% of this investment, was made by businesses. But there are easy ways that these companies could be accessing even more money to invest in R&D.

    Of course R&D delivers benefits in the form of process efficiencies, new products, intellectual property which can be protected and monetized, and is a is source of long term competitive advantage. But the UK government also encourages R&D through significant tax benefits – so why are so many businesses still not claiming enough tax relief for R&D?

    Brian Williamson, Managing Director at Jumpstart, the UK’s leading tax credit specialists, joins us for this webinar where he will discuss:

    - Why the government cares about R&D investment
    - The common “white coat” misconception companies have about R&D
    - How to get your accountant or auditor to think like a scientist
    - Why companies ranging from startups to multinational companies are leaving money on the table and the options available for claiming it back.

    This webinar is essential for any R&D leaders wanting to know more about how to manage their R&D budgets more effectively.
  • Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring
    Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring Robert Huff, Managing Director, North America Recorded: Jun 15 2017 60 mins
    Regulators have been unequivocal in their expectation that companies know who they are doing business with. While pre-onboarding due diligence on third parties has become the cornerstone of most compliance programs, many companies are still feeling their way toward integrating effective post-onboarding monitoring strategies. Join Kroll's experts for an interactive discussion of steps you can take and resources you can leverage to define and execute a sustainable approach to third party monitoring.
  • ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects
    ACEDS Webcast: Pitfalls and Potholes to Avoid in Your eDiscovery Projects Doug Austin and Karen DeSouza Recorded: Jun 15 2017 61 mins
    If you’ve conducted discovery for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” could occur that can derail your project. These issues can add considerable cost to your discovery effort through unexpected rework and also cause you to miss important deadlines or even incur the wrath of a judge for not following accepted rules and principles for discovery. This webcast* will discuss some of the most common “pitfalls” and “potholes” that you can encounter during the discovery life cycle and how to address them to keep your discovery project on track.

    Webcast Highlights

    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Ways to Avoid Potential Data Breaches
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Techniques to Increase Review Efficiency and Effectiveness
    + Checklist of Items to Ensure a Smooth and Accurate Production

    Presenters Include:

    
Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, technical project management and software development services to numerous commercial and government clients.

    
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Selected States
  • How to get more insight from design patents
    How to get more insight from design patents Alan Engel, Paterra, Inc | hosted by Jessie Parker at patsnap.com Recorded: Jun 14 2017 46 mins
    Generally speaking, it is possible to protect the ornamentation and shape of an article.
    However, it will depend on the jurisdiction as to whether this falls within the genus of patent law, or a separate branch of intellectual property known as a design right.

    Graphical descriptions play an important role in helping to validate the originality of a proposed invention or design, as well as when searching for inspiration or similar patents. But are you getting the most valuable insight from your design patent data?

    PatSnap will be joined by Alan Engel, President of Paterra Inc, for a webinar which will cover a wide range of topics relating to design patents, focusing primarily on East Asia but will also touch on European and American industrial designs and design patents. Topics covered include:

    1. The rising importance of design
    2. Design patents in the design world
    3. Design patents in the patent world
    4. Kinds of design patents
    5. Principle designs
    6. Related designs
    7. Partial designs
    8. Assembly designs
    9. Graphical user interfaces
    10. International treaties
    11. Searching design patents
    12. Design patent valuation

    This webinar is essential viewing for patent searchers and patent data users who are seeing more activity involving design patents and want to ensure they have the correct protection.
  • Success Factors in Threat Intelligence: Part 1 - Business Requirements
    Success Factors in Threat Intelligence: Part 1 - Business Requirements Allan Thomson, Chief Technical Officer Recorded: Jun 8 2017 46 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations.

    In Part 1 we will examine what drives CISOs and organizations to consider adoption of a threat intelligence practice. CISO’s are focused on Risk reduction to their organizations but may not have a fully defined set of requirements on who, how, where Threat Intelligence can assist in that high-level goal. They may require a solid business case to justify the investment and have a supporting set of well-defined business and technical requirements. Some key questions help formulate the executive’s plan.
    -What are the costs of solving these requirements?
    -How can my organization’s revenue be protected while investing in TI?
    -What is the right balance of both tactical and strategic Threat Intelligence-driven responses?
    -Where can existing investments be leveraged?
  • How to Identify, Disrupt and Dismantle Unauthorized Product Distribution
    How to Identify, Disrupt and Dismantle Unauthorized Product Distribution Josh Hopping, Investigative Research Specialist; Annie Wood, Client Service Manager Aug 1 2017 4:00 pm UTC 60 mins
    As widespread unauthorized product distribution reaches a new level of complexity, brand owners are finding themselves mired in a “whack-a-mole” battle against fraudsters. Unauthorized sellers are adept at setting up new sites and marketplace listings almost as quickly as they are taken down. Meanwhile, their multi-level marketing networks allow them to hide behind layers of anonymity.

    Please join MarkMonitor brand protection experts Josh Hopping and Annie Wood as they discuss how to generate actionable intelligence and leverage investigative tactics to disrupt and dismantle infringing online networks at their source.

    During this webinar, you’ll learn how to:

    -Identify interconnected networks of infringing activity and shut them down
    -Use test purchases and investigations to support legal action
    -Connect the dots between online infringement and physical enforcement
  • Technology Assisted Review: What You Need to Know, Ask, and Expect
    Technology Assisted Review: What You Need to Know, Ask, and Expect George Socha, Bonnie Kennedy, Avi Benayoun, Adam Strayer Aug 3 2017 6:00 pm UTC 60 mins
    Join George Socha, co-creator of the EDRM, as he moderates a conversation with Bonnie Kennedy of Delta Air Lines, Avi Benayoun of Greenberg Traurig and Adam Strayer of BDO. They will discuss the TAR workflow and the importance of open communication between and among the client, the law firm, and the service provider. These three litigation and ediscovery experts will talk about expectations, transparency, and some of the information black holes that can develop during the predictive coding process.
  • Practical Tips for a Successful First TAR Project
    Practical Tips for a Successful First TAR Project George Socha, Kelly Atherton, and Sam Merritt Aug 8 2017 6:00 pm UTC 60 mins
    Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.
  • 5 things IP and R&D teams should never hide from each other
    5 things IP and R&D teams should never hide from each other Laura Schoppe at Fuentek | Hosted by Ruta Sudmantaite at patsnap.com Aug 9 2017 3:00 pm UTC 60 mins
    In many organisations, there is a widening gap in the communication between these departments; R&D may invent something with the intention of filing a patent only to find out later from the IP department of pre-existing IP which renders their research (and costs) effectively wasted.

    Here at PatSnap, our clients often tell us that the two teams can no longer work independently, so we thought we'd explore how to improve communication between the two divisions.

    We will be joined by Laura Schoppe an industry expert from the world of R&D and IP, and get her insight into the five most important things the two teams should never hide from each other.

    This webinar is essential viewing for any innovation leader, across any division looking to improve cross team collaboration and flexibility.
  • Idea to Product: What happens in between?
    Idea to Product: What happens in between? Niosha Kayhani R&D Manager at Cubic | Ruta from PatSnap Aug 16 2017 3:00 pm UTC 60 mins
    When it comes to innovation, we often only see the end product of a successful idea, and this got us thinking, what about everything in between? What about those ideas that didn't quite make the cut?

    Niosha Kayhani will be discussing how Cubic speeds up their innovation process with a unique workflow. As well as technology before its time and its renewal.
  • Unlocking the Value of Innovation
    Unlocking the Value of Innovation Winston Chan, Director, RHT i-Assets Advisory and Jonathan Ng Creative Partner, Nurun Aug 17 2017 9:00 am UTC 60 mins
    Innovation has been the buzzword of the new Asian economy. We are living in an age whereby you are either disrupting the way things are done, or are being disrupted by new business models or technologies. As business leaders in ASEAN, we have to stay ahead of the game in order to survive an environment that is VUCA – Volatile, Uncertain, Complex and Ambiguous. The speakers will provide insights to: -

    - Why disruptive thinking is the key to UNCOVER the latent potential of your business here in ASEAN;
    - How agile creation can UNLOCK massive commercial potential of Intellectual Property Rights (IPRs); and
    - What ways IPRs can help you UNLEASH new value for your business.

    In addition to speaking as Innovators and IP Specialists, the speakers will also be sharing about innovation and IP from their own entrepreneurship experience.
  • How to align your IP strategy with the performance of your target molecule
    How to align your IP strategy with the performance of your target molecule Chemist and IP expert Andy Lai Aug 22 2017 3:00 pm UTC 60 mins
    Innovation in chemistry is required in all sectors of industry, whether it be in pharmaceuticals, material science, or indeed any other branch of science. These innovations are the foundation of our modern society and lead the way for businesses to progress - and help the world to progress.
    Chemical by PatSnap seamlessly links chemical structure searches to intellectual property data, enabling you to effortlessly discover chemical structures linked to the most relevant of patents, no matter how they’re described or written.

    In this webinar, we’ll be joined by Chemist and IP expert Andy Lai as he demonstrates how you can validate your target chemicals performance against 114 million structures, from over 100 patent jurisdictions. Some other topics that will be discussed include:

    - How to utilize the similar search function to discover structures very close to yours
    - How the Chemscape can highlight opportunities for licensing and collaboration
    - Discover what the good chemical performance indicators look like
  • Why the stage-gate process is killing your innovation strategy?
    Why the stage-gate process is killing your innovation strategy? Presented by Robert Weidner MD of DMInc | Hosted by Ruta at patsnap.com Aug 23 2017 3:00 pm UTC 60 mins
    The stage-gate process is as ubiquitous in R&D as doors are in the real-world. But, like doors, stage-gate processes aren't always the best solution for filling a gap. They can be overly elaborate (leading to slowness), fixated on pruning rather optimising (leading to negativity), and lacking in flexibility (leading to missed opportunities).

    Join our webinar as we explore:

    - The shortcomings of the stage-gate process
    - Potential alternatives that could drive more efficiency and productivity

    This webinar is essential viewing for any innovation leaders who are looking to take their innovation strategy out of its comfort zone and to the next level.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • How to build your R&D A-team
    How to build your R&D A-team Cliff Emmons Founder of Accelerated Healthcare Innovations | Hosted by Ruta at PatSnap Aug 30 2017 3:00 pm UTC 60 mins
    R&D success is dependent on many factors – the idea, the market opportunity, the technology readiness, and your company’s ability to deliver on the strategy.

    And at the heart of all these things is the R&D team. Different skill-sets and personalities are better suited to different types of innovation, and world-class innovation teams can find ways to make even the most challenging projects succeed.


    Join Cliff Emmons Former VP of R&D at Medronics and Founder of Accelerated Healthcare Innovations, LLC to learn:

    - The role that team structure plays in R&D success
    - How R&D leaders can build teams to fit their innovation strategy
    - What strategies the world’s most innovative companies use to build R&D A-teams
  • In-house vs. Out-sourced Legal Counsel
    In-house vs. Out-sourced Legal Counsel Svend Littauer | Founder of Entreprenör | Hosted by Ruta at patsnap.com Sep 6 2017 3:00 pm UTC 60 mins
    Many companies believe that outsourcing and in-house legal counsel is an either or option, but as many find out later that's definitely not the case. There are specific strengths and weakness to each option whether it comes to knowledge, cost, motive or efficiency.

    Svend Littauer, Founder of Entreprenör, has spent most of his professional career helping companies set up in the UK and advising them on Legal, HR and Tax topics.

    This webinar will explore:

    - Value of In-house and its limitations
    - Pros and Cons of Outsourcing
    - What to look for when hiring in-house?
    - How to find a law firm that's right for your company?
  • ASEAN connections: Cross-border M&A
    ASEAN connections: Cross-border M&A Richard Dailly, Managing Director and Head of Southeast Asia, Kroll Sep 12 2017 6:00 am UTC 90 mins
    Rich with investment opportunities and positive demographics — a young and dynamic population with growing disposable income and upward mobility — the Association of Southeast Asian Nations (ASEAN) continues to attract international acquirers.

    In 2016, the region recorded 534 M&A transactions valued at US$57.9bn, and Q1 2017 sustained the momentum with 118 deals worth US$14.7bn. This was a year-on-year increase of 8% in value and 7% in volume over the same period in 2016. For foreign inbound M&A, the ASEAN saw 223 deals worth US$23.7bn in 2016, a 10% rise in volume but a 16% drop in value from US$28.1bn (202 deals) in 2015. In 2017, volumes have remained relatively steady while values have shot up, with the first quarter registering as much as 45% of 2016’s annual total.

    Join Kroll's Managing Director and Head of Southeast Asia Richard Dailly as he shares insights on the ways to spot and mitigate risks before entering into cross-border M&A transactions in the ASEAN.
  • Innovation Incentives from around the World
    Innovation Incentives from around the World Thomas Hayden and Antoine Abbatucci | F. Initiatives | Ruta from PatSnap Sep 13 2017 3:00 pm UTC 60 mins
    Many companies are unaware of the different innovation incentives around the world. Some will go as far as applying for foreign patent protection but never looking into the Tax relief or grants that are available to them.

    In this webinar experts from one of the world’s largest specialist R&D Tax consultancies, F. Initiatives; Thomas Hayden and Antoine Abbatucci will be exploring the different funding options available for innovators across Europe, the US and Asia.
  • Why hackers will steal your R&D
    Why hackers will steal your R&D Jeff Middleton | CEO of Lantium | Presented by Jessie Parker at patsnap.com Oct 4 2017 9:00 am UTC 60 mins
    The recent global hacks on companies and organisations including Merck, Mondolez International, Rosneft and the NHS have demonstrated that all different types of industries are at risk when it comes to cyber attacks/hacks.
    Most people think about the obvious affects such as consumer data infringement or loss of functionality but what can an attack mean for your R&D department?

    Jeff Middleton, CEO of Lantium, who build bespoke cyber security solutions, will take us through the learning's of recent "Petya" and "WannaCry" attacks, as well as how we can prevent and minimise losses in such instances.

    Topics covered in this webinar:

    - Recent Global Attacks and learning
    - How Cyber attacks affect R&D, M&A and IP
    - What to consider when creating a cyber-safety strategy.

    Essential viewing for anyone that runs a company where data could be at risk.