Hi [[ session.user.profile.firstName ]]

Legal

  • AppSec in Financial Services through the BSIMM Lens
    AppSec in Financial Services through the BSIMM Lens Nabil Hannan, Managing Principal, Synopsys Software Integrity Group (SIG) Recorded: Aug 14 2018 39 mins
    Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts you’ve put in place even make sense? The Building Security In Maturity Model, or BSIMM, is a metrics-driven study of existing security initiatives at other organizations. BSIMM results help you assess the current state of your software security initiative and determine which areas need improvement.

    During the webinar, we’ll use a BSIMM broken down by the financial services industry to see what other companies are doing. We’ll also:

    · Use real data to help drive your software security initiative
    · Learn how organizations use the BSIMM to measure the maturity of their software security initiatives
    · Look at the aggregate data of the FSI vertical in the BSIMM
    · Discuss some of the most common activities that we observe with FSI companies and the drivers of those activities
  • Using sponsored research as a pathway to licensing early stage technologies
    Using sponsored research as a pathway to licensing early stage technologies Laura Schoppe, President and Owner of Fuentek Recorded: Aug 14 2018 46 mins
    Patent licensing negotiations have an extremely high fail rate- this can be down to unfavourable licensing terms or weak patent portfolios. One of the ways universities and industry are trying to bridge the gap between innovation and commercialisation is by working together much earlier.

    From a university standpoint, their research can be tailored to specific industry needs, as well as having research costs covered. Through the eyes of industry, they can get their hands on the latest research developments, and attract the brightest and talented individuals to their businesses.

    Laura Schoppe, President and Founder of Fuentek, who has years experience helping TTO's improve their chances of commercalisation will be joining us to discuss:

    - How to start sourcing strategic sponsorship deals
    - Where to begin with searching and conversations for partnerships
    - The benefits of this chosen pathway. i.e Minimising risk

    Please note: All viewers will have their data shared with our guest speaker.
  • Leverage Your SIEM Solution Utilizing SOAR Technology
    Leverage Your SIEM Solution Utilizing SOAR Technology Mike Fowler, VP of Professional Services at DFLabs; Christian Have, Chief Product Officer at LogPoint Recorded: Aug 14 2018 43 mins
    Empower your security analysts to accelerate detection and response of cyber incidents by combining the power of SIEM and SOAR.

    Based on a new joint solution from DFLabs and LogPoint resulting from their deep two-way integration, join this webinar to see how two security operations tools can work seamlessly together fusing intelligence to improve the overall effectiveness and operational performance of your existing security program.

    While a SIEM solution delivers tons of valuable information about the security status of your IT system, a SOAR solution uses this information to automate the response needed to incoming cyber threats. Combining the two will free up valuable time and resources in any security program and make for faster, smarter detection, response, and remediation of potential incidents.

    Learn how to:

    · Respond to all security alerts
    · Automate repeatable, mundane tasks
    · Orchestrate actions across multiple security tools
    · Enrich raw data, allowing for more informed, effective decisions
    · Reduce the mean time to detection and response
    · Increase the ROI on existing security operations tools
  • Avoid Surprising Litigation Discoveries–Leveraging Tech for Complex Litigation
    Avoid Surprising Litigation Discoveries–Leveraging Tech for Complex Litigation EDRM and TCDI Recorded: Aug 7 2018 61 mins
    Complex Litigation management is no easy task and managing the growing amounts of data from different teams can seem impossible. Does your case management tool help you manage multiple cases in one dashboard? Are you able to visualize all of your data at once and create clear and persuasive charts and graphs to tell your story? Are you able to keep your law firms from duplicating efforts?

    Register for this webinar to learn how you can leverage the latest technology to link case profiles, contacts, calendar items, transcripts, exhibits, pleadings and other litigation materials together for one-click access. The panel of experts will share strategies for simplifying complex litigation management and multi-case data in one central repository to reduce time, effort and cost for all legal teams involved.
  • DevSecOps: Security at the Speed of DevOps with Comcast
    DevSecOps: Security at the Speed of DevOps with Comcast Larry Maccherone, Sr. Director DevSecOps Transformation, Comcast Recorded: Aug 3 2018 50 mins
    Security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy orders of magnitude faster than human gating can achieve.

    What’s needed to add security to DevOps are tools that work well with rapid-cycle CI/CD pipelines and an approach that reinforces the DevOps culture and process changes. This requires that security specialists become self-service toolsmiths and advisors and stop thinking of themselves as gatekeepers.

    This webinar includes guidance on the characteristics of security tools compatible with DevOps, but it focuses primarily on the harder part: the people. This talk introduces the DevSecOps manifesto and provides you with a process model, based on agile transformation techniques, to accomplish the necessary mindset shift and achieve an effective DevSecOps culture transformation. It has been successfully used in a large DevSecOps transformation at Comcast and has gained recognition in DevSecOps circles as a leading framework.
  • Mobile Device Forensics and Beyond: The New Frontier
    Mobile Device Forensics and Beyond: The New Frontier Michael Sarlo - EnCE, CBE, CCLO, RCA, CCPA Recorded: Aug 1 2018 69 mins
    With mobile phones and tablets now ubiquitous in the modern workplace, attorneys and litigation support professionals need to be prepared to forensically preserve these robust digital repositories, extract information from them, and produce extracted information in a way that displays evidence true to its original format. This expert presentation will cover best practices for handling a mobile device at the outset of a matter, provide a framework for working with custodians to ensure a smooth forensic collection process, and highlight the differences between different forensic extraction types and how they affect data retrieval.

    Key Presentation Topics Include:

    + New Matter Intake Questions and Considerations
    + Tracking Devices and Users
    + Data Types and Forensic Extractions
    + Android and iOS Considerations
    + Challenges and Solutions: Review, Production, and PII
    + Cellebrite-Relativity Integrator

    Presentation Leader: Michael Sarlo - EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.

    Michael is fluent in a wide variety of digital forensic, ECA, e-Discovery processing and hosting technologies in addition to the IT infrastructure associated with deploying and administering such tools. He is also a frequent speaker on digital forensics best practices, GDPR issues, ESI treatment methodologies, and cost containment strategies for working with massive volumes of data.

    Michael is an expert witness and holds certifications around several forensic tools including Cellebrite, EnCase, and BlackLight. He is also a Relativity Certified Administrator (RCA).
  • Inside BDO’s eDiscovery & Beyond Survey: Lessons for Inside Counsel and Law Firm
    Inside BDO’s eDiscovery & Beyond Survey: Lessons for Inside Counsel and Law Firm EDRM and BDO Recorded: Jul 31 2018 61 mins
    BDO’s fourth annual Inside E-Discovery & Beyond survey examines the opinions and insights of more than 100 senior in-house counsel about changes in their approaches to e-discovery and other data and information related topics. In an interactive session with George Socha (EDRM Co-Founder and BDO Managing Director) along with other guests, this inside look at our survey will examine:

    •Why technophobic lawyers are an endangered species
    •How effective use of experienced personnel and advanced technologies can prevent e-discovery from being a profit drain
    •How GDPR and other data privacy rules and regulations affect e-discovery
    •Realigning your needs and e-discovery practices
  • Intelligent Automation for Financial Services
    Intelligent Automation for Financial Services Jason Gabrieli Investor Coach at HFM Investment Advisors, Dominic Ionadi Salesforce Consultant, Kimber Spradlin VP, Cogna Recorded: Jul 31 2018 58 mins
    Financial Services is built on customer service, strong client relationships and trust. However, financial professionals are spending hours each week on manual, administrative tasks that could be better spent serving their clients.

    Watch to learn the modern challenges faced by financial services professionals and how automation technology is disrupting the industry by shifting time from document generation to client relationships while keeping client information safe, secure and reducing human error.

    Hear stories from two industry experts who transformed their business processes with intelligent automation.
  • Key eDiscovery Case Law Review for First Half of 2018
    Key eDiscovery Case Law Review for First Half of 2018 Doug Austin and Tom O'Connor Recorded: Jul 25 2018 61 mins
    Legal precedents set by past case law decisions remain one of the best ways to guide lawyers on how to do their job, especially when it relates to eDiscovery best practices. Case law examples help lawyers avoid mistakes made by others, as well as saving time and money for their clients. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2018 to enable lawyers to learn from these cases. Key topics include:

    + Is there a template for how parties should cooperate in a Technology Assisted document review?
    + Should a plaintiff be allowed to email all defendant employees to see if they have responsive documents?
    + Will fabrication of text messages result in sanctions post Rule 37(e)?
    + Can Twitter be compelled to produce direct messages between their own employees?
    + Can an individual be compelled to produce private Facebook photos by the opposing party?
    + How have proportionality considerations in the 2015 Federal rules affected scope of discovery?
    + Should a receiving party be granted a quick peek at privileged documents to resolve privilege disputes?
    + Should border searches of electronic devices require a warrant?
    + Can you be sanctioned for discovery violations even after a jury verdict?

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. 

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Reviewing Spectre 6 Months Later
    Reviewing Spectre 6 Months Later Taylor Armerding, Senior Security Strategist for Synopsys Recorded: Jul 25 2018 30 mins
    It’s been more than six months since the major design flaw in computer chips labeled Spectre became public. And, as predicted, it is still haunting the world of information technology. The CPU (central processing unit) is, after all, the “brain” of any computer, phone, tablet, modern TV, or other “smart” device.
    Since then, we’ve all learned a bit about terms some of us had never heard before—“speculative execution,” anyone? We’ve also been told that you can’t just patch a chip the way you can patch bugs in software. But you can create work-arounds with software patches.
    In this webinar, Taylor Armerding, senior security strategist for Synopsys Software Integrity Group, will address some of the questions that “regular”—i.e., nontechnical—users may have about Spectre:
    - What is it?
    - How does it work?
    - Why does it work?
    - Why didn’t chip makers catch a flaw of this magnitude during the design phase?
    - Why is a tool called static analysis the best way to work around Spectre without causing intolerable performance slowdowns?
  • How to create a 5-year M&A plan for dealing with patent cliffs
    How to create a 5-year M&A plan for dealing with patent cliffs Jurgen Vollrath, President at Exponential Technology Counsel Recorded: Jul 25 2018 40 mins
    A ‘Patent cliff’ describes a severe drop in revenue once the patent for a company’s leading product expires. The sharp revenue decline is a result of competitors being able to start developing and selling the product, often at a much lower price.

    As US biopharmaceutical company Celgene struggles to get regulatory approval from the FDA, the company is facing major market, shares and revenue losses, and is facing a phenomenal patent cliff. Furthermore, research from EvaluatePharma reports that an estimated $250 billion in projected sales is at risk between 2018-2024 as many drugs lose exclusivity.

    When it comes to acquisitions, the effects of a dwindling patent term can severely impact the value of your company. So how do you create 5-year plan to prepare for an inevitable patent cliff? We are very excited to welcome back Jurgen Vollrath, President of Exponential Technology Counsel, and customer of PatSnap. ET Counsel, advise clients on IP strategy & business alignment to ensure the most successful M&A and exit outcomes.

    In this webinar, Jurgen will be discussing:

    - Risk vs. reality when it comes to patent cliffs
    - How to create a 5-year M&A plan for your organisation
    - How to find potential acquisition targets
    - Predicting the potential impact a patent cliff could have on your business.
  • Scaling for the future: Evolving your intelligence-driven digital investigations
    Scaling for the future: Evolving your intelligence-driven digital investigations Stuart Clarke, Global Head of Security & Intelligence Recorded: Jul 23 2018 49 mins
    Investigative teams are under increasing pressure to respond to challenges caused by greater volumes of data and a more diverse range of digital devices.

    Key facts are often spread across multiple evidence sources, making it difficult to understand the bigger picture and often requiring an investigator to manually correlate their findings and identify connections. This places an increasing burden on overstretched teams, who need to respond faster and with more accuracy.

    Join Stuart Clarke, Global Head Security & Intelligence at Nuix who will introduce collaborative and intelligence driven investigations that can augment human investigative skills and expose the hidden relationships across people, objects, locations and events.

    Key takeaways:

    • Learn how a single pane of glass can help expose hidden relationships in the data
    • Understand the importance of efficient workflows that can make best use of technology
    • Find out how the latest technology can augment your investigative teams to enable you to make timely and informed decisions

    The presenter: Stuart Clarke, Global Head of Security & Intelligence Solutions

    Stuart is an internationally respected information security expert who is responsible for the overall security and intelligence strategy and delivery at Nuix. During his time at the company, Stuart has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams. He led the development of Nuix Investigation & Response, an innovative investigative tool used to delve into the causes and scope of data breaches.
  • Anatomy of a Hack: Learning From Successful Law Firm Cyberattacks
    Anatomy of a Hack: Learning From Successful Law Firm Cyberattacks Jake Bernstein, Eli Wald, Kip Boyle Recorded: Jul 18 2018 61 mins
    Law firms are increasingly a high-value target for hackers, a “one stop shop” for sensitive data. And as dozen of examples show, the hackers are often successful. How do these cybercriminals infiltrate law firms and what can be done to prevent them?

    Join our panel of experts as they dissect the anatomy of a successful law firm cyberattack and explain how you can protect yourself, and your clients, from a similar fate.

    Attend this webinar to learn:
    -Why hackers are increasingly targeting legal professionals
    -What vulnerabilities make law firms easy prey for hackers
    -The ethical implications of law firm cybersecurity
    -How to protect yourself, your clients, and your data

    Featuring:
    - Jake Bernstein: An attorney with Newman Du Wors, Jake Bernstein’s practice focuses on counseling clients on cybersecurity issues. A former Washington State Assistant Attorney General and a frequent speaker and advisor on cybersecurity legal issues, Bernstein has significant experience with regulatory compliance, privacy, and cybersecurity law.

    - Eli Wald: A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli Wald was one of the first academics to investigate the ethical implications of law firm cybersecurity. A frequent author and speaker on ethics and professional responsibility, his work has been cited in ABA ethics opinions and excerpted in legal ethics casebooks.

    - Kip Boyle: A 20-year information security expert and founder of Cyber Risk Opportunities, Kip Boyle advises global companies in the logistics, technology and financial services industries. He is a nationally recognized analyst, lecturer and thought-leader in cyber risks and has been featured in Entrepreneur magazine, Chief Executive magazine and others.
  • Best Practices for Managing Open Source in an Organization and Throughout M&A
    Best Practices for Managing Open Source in an Organization and Throughout M&A Mark Radcliffe, Partner, DLA Piper/General Counsel OSI; Anthony Decicco, Shareholder, GTC Law Group & Affiliates Recorded: Jul 18 2018 58 mins
    The use of open source has surpassed the occasional and solidified itself as the standard. In fact, the Black Duck by Synopsys 2018 Open Source Security and Risk Analysis found that 96% of the applications we scanned last year contained open source components.

    It’s increasingly difficult to properly manage open source in an organization to ensure compliance with the over 2,000 different licenses in use today and defend against new vulnerabilities, which surface frequently.

    Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and general counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss best practices for managing open source in an organization and throughout an M&A transaction:

    - How do you conduct an open source / third-party software audit?
    - How do you get the most out of your Black Duck code scan?
    i.e. Handling license compliance issues and managing security vulnerabilities
    - What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
    - What are key success factors for effectively releasing code as open source?
  • A guide for UK and Chinese patent collaboration
    A guide for UK and Chinese patent collaboration Tom Duke attaché for UK in Beijing UK Intellectual Property Office Recorded: Jul 18 2018 56 mins
    UK Intellectual Property Office is going to be joining this webinar to explore some of the ways UK and Chinese companies can work together on innovation projects, where patents are involved.


    Some of the topics covered will be:

    - Different types of collaboration i.e. university, industry
    - Tips for setting up successful partnerships
    - Chinese Policy on Licensing and Ownership of incremental innovation
  • Trends in Security: How to Create a Scalable Threat-modeling Practice
    Trends in Security: How to Create a Scalable Threat-modeling Practice Chandu Ketkar, Principal Consultant, Synopsys Recorded: Jul 17 2018 45 mins
    For most organizations, performing threat-modeling is a difficult and an expensive undertaking. There are good reasons why this is the case. Threat modeling traditionally requires an experienced security architect with knowhow in architecture patterns, design patterns, a breadth of technologies, and above all deep security knowledge.

    Join this webinar and learn:

    - Consistency/Reliability: Use of patterns allows us to identify recurring problems/patterns and provide consistently the same solution. In security this means that identifying patterns during threat modeling will allow us to create consistent design, development, testing, and risk guidance.

    - Efficiency: Use of patterns allows us to automate some part of a problem while leaving the more complex concerns to be tackled by experts. This creates efficiencies.

    - Commonly understood taxonomy: Patterns create a common taxonomy for organizing knowledge, training users/practitioners, communicating with stakeholders (developers, testers, architects, security analysts, etc.)
  • Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem
    Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem Michael Suby, VP of Research at Frost & Sullivan, and James Carnall, VP of Customer Support Group at LookingGlass Recorded: Jul 17 2018 63 mins
    In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks?
    BYOD: Do benefits of personal devices at work outweigh drawbacks? EDRM and AccessData Recorded: Jul 17 2018 63 mins
    Bring Your Own Device (BYOD) policies present many benefits for both employees and companies, but they also bring unwanted risk associated with allowing individuals to access and share company information through non-monitored personal devices.

    AccessData and Corporate Counsel Business Journal have partnered on a survey of Corporate Legal professionals to identify current BYOD trends and concerns, and understand the impact it is having on e-discovery. Join us for this one-hour webinar where we will review the findings of this exclusive survey and highlight best practices for organizations allowing personal device use for business purposes, to help ensure data is protected and accessible in the event of e-discovery.
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely? Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Recorded: Jul 17 2018 46 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • *AST in CI/CD - How to Make it Work
    *AST in CI/CD - How to Make it Work Ofer Maor, Director, Solutions Management at Synopsys Recorded: Jul 17 2018 58 mins
    SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this session we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The session will review the pros and cons of each of the testing technologies, how to adapt it to rapid development, and how to make testing work as organizations are moving to A/B testing. Finally, this session will guide on how to manage the balance between risk and speed to build the right process, so that real threats will become blockers, but other issues will be handled in a parallel, slower cycle, without slowing down the main delivery.
  • Getting Your Bearings in a DevSecOps World
    Getting Your Bearings in a DevSecOps World Apoorva Phadke, Associate Principal Consultant, Synopsys Recorded: Jul 12 2018 48 mins
    Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software—quickly. By automating manual processes and building tools into the continuous integration and continuous delivery (CI/CD) pipeline, they’ve increased trust between groups, which is essential as these once-disparate teams tackle critical issues together. In this webinar, you’ll learn how to build a DevSecOps culture in your organization with automated and integrated application security tools and the right training for each team.
  • How to accelerate your innovation pipeline using Social Impact Investments
    How to accelerate your innovation pipeline using Social Impact Investments Rosemarie Truman from The Center for Advancing Innovation Recorded: Jul 12 2018 45 mins
    Social Impact Investment brings together capital and experience from the public, private and non-for-profit industries to achieve specific social objectives. The return of these investments is measured typically by the social outcomes achieved.

    The Centre of Advancing Innovation is a public-private partnership non-profit focused on identifying breakthrough inventions hidden in portfolios, to maximise investor returns and commercial success. Research performed by the group has highlighted that Social Impact projects accelerate innovation, and result in higher returns.

    In this webinar, Rosemarie Truman, CEO and Founder of CAI will be discussing the positive implications of choosing social impact projects for your business, including:

    - Why they accelerate innovation
    - How these projects can increase your potential investment opportunities for the future
    - The influence on the future funding of projects.
  • Customer Spotlight - EvolveIP Automating Processes for Improved Efficiency
    Customer Spotlight - EvolveIP Automating Processes for Improved Efficiency Delinda Tinkey Sr. Sales and Marketing Automation Manager, Conga Recorded: Jul 11 2018 34 mins
    Learn how EvolveIP puts their employees first by removing manual processes and workflows to ensure maximum productivity. By automating time consuming manual tasks, employees are now able to fully spend more time on creative problem solving to support customer success and keep developing as individuals.

    Hear How:

    1. improving workflow efficiencies will help your team complete more work in less time and standardize how the work is performed.
    2. the resulting efficiencies mean more time can be devoted to pursuing other corporate goals and improving profitability.
    3. automation can redefine the value placed on certain skills and create new roles that support company growth.

    About the presenter:

    Delinda Tinkey is a marketing tech and CRM manager who drives automation through the entire sales funnel from lead generation to client engagement. She has administered Conga solutions for almost 5 years as part of Evolve IP’s technology stack. Delinda holds certifications as an Advanced Salesforce Administrator and Marketo Expert.
  • China IP Trends: the shift in patent filing
    China IP Trends: the shift in patent filing Justin Simpson, RWS, founder of inovia; Xia Zheng, founder, president of AFD China Intellectual Property Recorded: Jun 28 2018 66 mins
    The data trends do not lie: China will soon become the top filer of IP in the world, both home and abroad. What does this mean for your business? Join RWS and Managing IP for our webinar China IP Trends: the shift in patent filing as we take a look at the data and give you tips to stay ahead of your competitors. Guest speakers Justin Simpson, RWS, founder of inovia and Xia Zheng, founder, president of AFD China Intellectual Property, will review trends from WIPO and discuss important strategies for filing in China, including some of the advantages of their system and common mistakes even experienced filers fall victim to.

    •Keys to Success: Understanding the Patent System in China

    •National Filing Numbers in China: Looking at the Data
  • Six Steps for Moving E-Discovery In-House
    Six Steps for Moving E-Discovery In-House EDRM and Zapproved Recorded: Jun 27 2018 62 mins
    In this Zapproved webinar, legal professionals walk through how to bring ediscovery in house to better control process, improve outcomes, and lower cost and risk. Tune in for their six best practices, from envisioning the end goal to hiring and training your team.
  • Digital Transformation Series Part 1: Legal Insights
    Digital Transformation Series Part 1: Legal Insights Mark Fowler, VP General Counsel at Conga Aug 21 2018 3:00 pm UTC 60 mins
    Discover how Legal teams are beginning to focus on artificial intelligence (AI) for contract lifecycle management as well as how they are advancing and expanding their digital transformation initiatives.
  • New Horizons in Data and Litigation
    New Horizons in Data and Litigation Christopher J. Adams, Martha K. Louks, and Michael Simon Aug 21 2018 6:00 pm UTC 60 mins
    The amount of data available to legal professionals is expanding at a mind-boggling pace. Over 2.5 exabytes, or 75 trillion pages’ worth, of data is generated every day. And much of it isn’t the email inboxes and Office documents attorneys are used to dealing with.

    From chat messages, to IoT data, to ephemeral communications, tomorrow’s case-dispositive data can take nearly any shape.

    Join us for this webinar as we explore the ways novel data sources are reshaping the future of discovery and litigation. Topics to be covered include:

    -- Mobile data: Does BYOD, BYOA and BOYC all add up to Bring Your Own Nightmare?
    -- Redefining TL;DR with ephemeral messaging
    -- Welcome to your quantified life. BTW, it’s all discoverable
    -- The IoT isn’t SciFi. It’s here now and it’s also all discoverable

    It’s an educational, action- and acronym-packed hour you don’t want to miss.
  • Dreamforce Panel: How to Dreamforce
    Dreamforce Panel: How to Dreamforce Peter Terhune, Salesforce Evangelist at Conga, Katy Engebretson Partnership Alliances & Sales Operations Manager at Penrod Aug 22 2018 3:00 pm UTC 45 mins
    Join us to learn how to get the most out of your time at Dreamforce! With 200,000+ attendees, 3,000+ educational sessions, and countless parties, the week can be a lot to tackle.

    Hear from Dreamforce vets and Salesforce MVPs their experiences identifying:

    - Can't-miss breakout sessions
    - Top social events and parties
    - Networking opportunities
  • Security Champions: Only YOU Can Prevent File Forgery
    Security Champions: Only YOU Can Prevent File Forgery Marisa Fagan, Product Security Lead, Synopsys Aug 22 2018 4:00 pm UTC 60 mins
    If you’re a developer, there will come a time when you realize that you have the power not only to ship awesome features but also to protect them so that no one else can tamper with all your hard work. Every developer is responsible for coding securely, but a brave few among us will take this duty one step further by wearing the mantle of a Security Champion.

    This webinar is your guide to becoming the Security Champion you always wanted to be, in just five easy steps. We’ll also talk about what benefits you’ll get out of it, besides saving the world, and what to do if your company doesn’t have a Security Champions program or even a product security program.
  • New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4
    New Features and Capabilities of DFLabs IncMan SOAR Platform V4.4 Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs Aug 28 2018 2:00 pm UTC 45 mins
    Mike Fowler, Vice President of Professional Services and John Moran, Senior Product Manager at DFLabs

    Aug 28 2018
    10:00 EDT / 15:00 BST

    The latest release of DFLabs IncMan SOAR platform v4.4 includes a range of additional and enhanced features and capabilities including:

    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - Enhanced flexibility of runbooks
    - And more...

    Join this webinar to get this unique opportunity to take a look at the new and improved IncMan SOAR platform and see first-hand one of the most exciting new features and first of its kind capability, START (Simple Triage And Rapid Treatment) Triage, in action.

    START Triage aims to dramatically reduce the number of security incidents generated from alerts and is being used in production by a major European bank to eliminate manual first line assessment of suspected fraudulent online transactions. IncMan SOAR has reduced triage time by 90% for cyber fraud events generated by its mainframe and other external systems. The flexible, open and customizable architecture of IncMan SOAR’s START Triage allows it to adapt to virtually any use case and data source, including network alerts, endpoint alerts, transaction fraud alerts, physical security events and threat intelligence alerts.
  • Enterprise Security at Scale With IAST
    Enterprise Security at Scale With IAST Asma Zubair, Product Marketing Manager, Synopsys Aug 28 2018 4:00 pm UTC 60 mins
    With all the different application security testing tools available, you may be wondering whether interactive application security testing (IAST) makes sense for you. If you want to equip your developers with everything they need to fix vulnerabilities quickly and accurately in CI/CD workflows, then the answer is yes.

    In this webinar, Asma Zubair, product marketing manager for Seeker, our IAST solution, will show you how to gain unparalleled visibility into the security posture of your web applications and how to identify vulnerability trends against compliance standards (e.g., OWASP Top 10, PCI DSS, and CWE/SANS). You’ll also learn how IAST can:

    - Be deployed in existing environments with ease
    - Give you real-time, accurate results
    - Integrate with software composition analysis
  • Litigate or Settle? Info You Need to Make Case Decisions
    Litigate or Settle? Info You Need to Make Case Decisions Doug Austin and Tom O'Connor Aug 29 2018 5:00 pm UTC 75 mins
    People say that fewer and fewer cases go to trial these days. Is that true. Regardless of whether it is or not, what information do you need to know to make an informed decision whether or not to litigate or settle the case and how do you gather that information? This CLE-approved* webcast will discuss how litigation has evolved over the years, how that impacts discovery and what you need to know to decide on the best course of action for each case. Topics include:

    + How Litigation Has Evolved
    + The Importance of Deciding Correctly
    + eDiscovery Considerations
    + Covering Your Bases While You Decide
    + Benefits of Early Data Analysis
    + How Much Each GB Can Cost You
    + Why Number of GBs Isn't All You Need to Know
    + Why You Should Test Searches Before Meet and Confer
    + Other Tips and Tricks to Know for a Successful Outcome

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • The Modern SOC: Automated Intelligence Tradecraft and the Human Element
    The Modern SOC: Automated Intelligence Tradecraft and the Human Element IDC Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec Aug 29 2018 6:00 pm UTC 60 mins
    Traditional cybersecurity leads with a “block & tackle” strategy. But as threats become more complex, targeted, and sophisticated, security operations centers (SOC) require a better understanding of how threats beyond the perimeter interact with their network. Join IDC special guest, Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec in a discussion on modern-day SOC needs for a threat platform that marries automated intelligence tradecraft with the human element.
  • Digital Transformation Series Part 2: Sales Insights
    Digital Transformation Series Part 2: Sales Insights Justin Mongroo VP, Worldwide Sales Excellence at Conga, Seth Marr Demand Generation Coordinator at Conga Aug 30 2018 6:30 pm UTC 60 mins
    Discover how Sales teams are beginning to add artificial intelligence (AI) to their day-to-day initiatives and how they are advancing and expanding digital transformation.
  • Theft of Trade Secrets - Forensics Best Practices
    Theft of Trade Secrets - Forensics Best Practices Dylan Wiseman, Esq. (Buchalter) and Michael Sarlo (HaystackID) Sep 5 2018 4:00 pm UTC 75 mins
    Attorneys and in-house counsel need to be aware of how best to respond to the potential for loss of control of protected and trade secret information in the face of the departure of employees who may have had access to such information. Time is of the essence, but the methodology and process controls governing the forensic preservation and collection of at-risk information is critical to mounting a valid response.

    This expert presentation will cover the best practices for counsel to adopt in working to identify and forensically preserve and collect data in a sound, defensible manner. The presentation also will educate legal professionals as to the essential categories of evidence that can be recovered from smartphones and how these categories can be leveraged in not only a defensive manner but also an offensive manner in civil litigation.

    Key Presentation Topics Include:

    + Defining Trade Secrets
    + Trade Secret Violations and Theft
    + Defining When Should One Reasonably Panic
    + The Importance of Defining Wins Upfront
    + Steps to Identify Custodians of Potential Evidence
    + The Anatomy of an Investigation
    + Reasonable Forensic Analysis Triage
    + Addressing Privacy Concerns

    Presentation Experts:

    + Dylan W. Wiseman, Esq. (Buchalter)

    Based in California, Dylan is a Shareholder with Buchalter. His practice focuses upon intellectual property protection including representing employers in cases involving trade secrets, unfair competition, employee mobility disputes, non-solicitation disputes, social media, workplace privacy, BYOD devices, and eDiscovery.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA (HaystackID)

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • Digital Transformation Series Part 3: IT Insights
    Digital Transformation Series Part 3: IT Insights Conga Sep 5 2018 4:00 pm UTC 60 mins
    For our 3-part webinar series on Digital Transformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why IT professionals should have Digital Transformation on their radar as we discuss:

    - Innovating with an emphasis on customer experience
    - The state of internal systems, all starting with IT departments
    - IT's need for integrated and automated solutions to ensure data integrity across the organization
  • Seven Steps to Effective Regulatory Response
    Seven Steps to Effective Regulatory Response EDRM and Zapproved Sep 5 2018 6:00 pm UTC 60 mins
    Learn the seven steps to effective regulatory response and be prepared to respond quickly to ensure compliance.

    Regulatory agencies such as the SEC and CFTC can initiate an investigation into business activity at any time, bringing challenges beyond those of typical ediscovery. Regulatory investigations often relate to unclear charges, make broad and sweeping data requests under unrealistically tight timelines, and bear severe consequences for noncompliance. Organizations need to be prepared to identify, preserve, and analyze relevant information rapidly and accurately.

    In this webinar, Zapproved will discuss seven clear, actionable steps to launch a successful regulatory response. These steps start with strategizing and preserving data before moving into assessing information, negotiating the terms of the request, creating privilege logs, and keeping the lines of communication open.

    Any organization subject to regulatory oversight could be investigated at any time. Prepare today so you can face tomorrow with confidence.
  • Second Medical Use Patent Opportunities from Personalised Healthcare Inventions
    Second Medical Use Patent Opportunities from Personalised Healthcare Inventions Dr. Laurence Gainey, Patent Director, HGF Sep 11 2018 2:00 pm UTC 90 mins
    Personalised healthcare (sometimes referred to as precision medicine) is an evolving field in medicine where a therapeutic treatment is tailored to an individual with a particular disease. The patenting of personalised healthcare inventions has proved problematic in a number of jurisdictions, most notably the USA. However, various aspects of these inventions are patentable in Europe.

    This webinar will set the scene as to what personalised healthcare is and will run through the history of second medical use patenting in Europe. Discussing key cases such as G5/83, T1020/03 and G2/08.

    It will then focus on how second medical use patenting can be applied to personalised healthcare inventions and will give examples of claim language that is finding favour at the EPO.
  • Aviation Law News European Drone Law
    Aviation Law News European Drone Law Airbus, Bird & Bird, Monard Law, LS Lexjus Sinacta, DLA Piper Sep 13 2018 8:00 am UTC 60 mins
    Recent months have seen the European Parliament back EU-wide safety regulations and registries for drones, which could mean large fines for manufacturers and operators, as well as recommendations by the European Aviation Safety Agency for new rules on the use of electronic identification systems and geo-awareness technology in drones.

    Against this backdrop, our panel will provide detailed insight on the current legislative state of play, taking in such topics as the transition from national to EU-wide drone laws; the timeline and implementation of the new regulations; practical challenges for regulators; and the categorisation and certification requirements for drones.

    Panellists will also examine related issues for drone users and regulators – including insurance, liability and privacy – as well as looking to what developments we can expect in the future.

    Our world-class panel will be made up of:

    - Airbus in-house counsel Vincent Barbaud and Jaime Garcia-Neto;
    - Bird & Bird of counsel Simon Phippard in London;
    - Monard Law partner Birgitta Van Itterbeek in Brussels;
    - LS Lexjus Sinacta partner Anna Masutti in Bologna; and
    - DLA Piper senior associate Camille Lallemand in Paris.
  • Using Security Champions to Build a DevSecOps Culture Within Your Organization
    Using Security Champions to Build a DevSecOps Culture Within Your Organization Brendan Sheairs, Associate Managing Consultant, Synopsys Software Integrity Group (SIG) Sep 13 2018 4:00 pm UTC 60 mins
    The security industry has made great strides developing tools and technology to integrate software security into the application development life cycle. However, it’s important not to ignore the people and process aspects of DevSecOps. Building security into application teams’ culture is necessary for DevSecOps to be successful.

    Outside the software security group, Security Champions are the leaders of this cultural change. Embedding knowledgeable champions within development teams to assist with security activities and vulnerability remediation will help your organization see this cultural shift. As a result, you’ll build new features not only faster but also more securely. In this webinar, you’ll learn the foundations of a successful Security Champions program and the challenges you’ll face implementing such a program.
  • How to Evaluate & Improve Your E-Discovery Process
    How to Evaluate & Improve Your E-Discovery Process EDRM and Exterro Sep 13 2018 5:00 pm UTC 60 mins
    No two e-discovery processes are alike. But that doesn’t mean there aren’t universal principles and tools to evaluate and take steps to improve your e-discovery processes.

    Register for this webinar and learn from three e-discovery practitioners about how they have assessed and mended gaps in their e-discovery processes, including:
    -Tips and tools for evaluating your own e-discovery process
    -How to get buy-in across departments for real change
    -Learn more about what mature e-discovery operations look like
  • Corporate compliance in Latin America: main challenges and opportunities
    Corporate compliance in Latin America: main challenges and opportunities Leila Szwarc, Global Head of Compliance & Strategic Regulatory Services & Paola Fonesca, Americas Corporate Counsel, TMF Grou Sep 18 2018 3:00 pm UTC 60 mins
    Meeting the global challenge of evolving corporate compliance.

    Issues to be discussed include:

    1.An overview of the Compliance Complexity Index 2018 (CCI 2018) - Key global trends and the most and least complex countries.

    2. Insights about the main challenges in Latin America:
    - Which are the most complex countries in the Americas (from CCI 2018)
    - Compliance and main regulatory developments in Latin America

    3. How companies should prepare to meet these challenges
  • Don't Acquire Open Source Risks You're Not Aware Of
    Don't Acquire Open Source Risks You're Not Aware Of Daniel Kennedy, Research Director - Information Security, 451 Research; Phil Odence, GM – Black Duck On-Demand Sep 19 2018 4:00 pm UTC 60 mins
    Modern applications are constructed using open source components. Most organizations understand they’re using open source. What they likely underestimate is its prevalence in their homegrown applications and the potential security and license compliance risks they assume if they’re not continuously monitoring those libraries. When companies merge or are acquired, that unknown risk is transferred, potentially to organizations with greater regulatory exposure. Join Daniel Kennedy, Research Director, Information Security, and Phil Odence, GM, Black Duck On-Demand, for a discussion of these risks and how to address them.
  • Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades
    Cumplimiento Corporativo en Latinoamérica: principales retos y oportunidades Leila Szwarc, Global Head of Compliance & Strategic Regulatory Services & Paola Fonesca, Americas Corporate Counsel, TMF Grou Sep 25 2018 3:00 pm UTC 60 mins
    Acerca de este webinario:

    Enfrentando el desafío global de evolucionar en cumplimiento Corporativo
    Los principales temas a discutir incluirán:

    1.Visión general del Índice de Complejidad de Cumplimiento Corporativo 2018 - tendencias clave a nivel global, países más y menos complejos

    2.Perspectivas sobre los principales desafíos en Latinoamérica

    - Países con mayor índice de complejidad en las Américas.
    - Cumplimiento y principales desarrollos regulatorios en América Latina

    3.Tips acerca de cómo las empresas deben prepararse para enfrentar los desafíos
  • Tracking technology trends to maximise commercialisation value
    Tracking technology trends to maximise commercialisation value Mireya McKee CEO of McKee Innovation Consulting Sep 26 2018 3:00 pm UTC 60 mins
    Technology commercialisation at its core requires for an invention to be applied to a use case in a specific market. Doing this successfully will ensure that you are getting ROI out of your research and inventions. Mireya McKee has over 16 years experience in research, academia and commercialisation and will be talking about how she utilises technology trends to maximise commercialisation value.

    Some of the topics discussed in this webinar will be:

    * How to track technology trends
    * What can patents tell us about technology trends
    * Technology adoption cycle
    * How technology readiness levels can affect commercialisation opportunities
  • Container Security – What you need to know!
    Container Security – What you need to know! Tanay Sethi, Senior Security Architect, Synopsys Oct 4 2018 5:30 am UTC 75 mins
    Containers are revolutionizing application packaging and distribution. They’re lightweight and easy to build, deploy, and manage. But what about security? Your containers include more than the applications your team builds. They also bundle all the third-party software and open source components those apps depend on. In our webinar “Container Security – What you need to know!”, Tanay Sethi, Senior Security Architect, outline how you can prevent vulnerable code hiding in your containers from compromising your applications and sensitive data and how you can take control in the event when a new vulnerability breaks out for open source component present in your containers.