Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date California Privacy Rights Act: Understanding Your HR Compliance Obligations Jessica Clark and Lindley Fraley, CGL LLP Effective January 1, 2023, California became the first state to provide expansive privacy rights to employees. The new rights go well beyond existing ... 3 weeks ago | 43 mins PAM 2.0: Smarter, Better, Faster, Stronger Martin Cannard, VP of Product Strategy at Netwrix, Dirk Schrader, VP of Security Research and Field CISO EMEA at Netwrix Theft of privileged credentials is the costliest type of insider threat, and the number of such thefts has tripled over the last two years. Privileged... 5 months ago | 56 mins Important eDiscovery Case Law Decisions for January 2023 Doug Austin, Hon. Judge Andrew Peck (ret.), Tom O'Connor & Mary Mack 2022 may be done with us, but we’re not done with unique and interesting 2022 eDiscovery case law disputes! Our January 2023 monthly webinar of cases ... 2 months ago | 70 mins Cyber Notes Cast - Secrets of Cyber Resilience senhasegura In a cyber attack, hackers can access critical systems and data, compromising the entire corporation, which may never recover from the attack. Any co... 3 weeks ago | 7 mins Important eDiscovery Case Law Decisions for September 2022 Doug Austin, Hon. Judge Andrew Peck (ret.), Tom O'Connor & Mary Mack It may be fall, but there is no fall off with new and interesting eDiscovery case law disputes! Our September monthly webinar of cases covered by the ... 6 months ago | 70 mins Threat Detection in AWS: Cloud security secrets from my time at AWS Andre Rall, Director of Cloud Security, Uptycs Today’s attackers have become cloud security experts, abusing cloud APIs to deploy ransomware, mine cryptocurrency, or steal data. Andre Rall, former ... 4 months ago | 30 mins Validations for Optimizing Workflows with AI For Privilege & PII Bobby Malhotra, Judge Andrew Peck, Josh Kreamer The pressure on law firms and corporate legal departments to deliver critical information faster and more cost-effectively isn’t new. What is new is t... 1 year ago | 62 mins Important eDiscovery Case Law Decisions for March 2022 Doug Austin, Hon. Judge Andrew Peck (ret.), Tom O'Connor & Mary Mack It’s March Metadata Madness! Our March monthly webinar of cases covered by the eDiscovery Today blog discusses three cases involving metadata dispute... 1 year ago | 63 mins EDRM Privilege Log Protocol Project: Fireside Chat David R. Cohen and Cristin Traylor David Cohen, Partner at Reed Smith and EDRM Chair of Project Trustees and Privilege Log Protocol Project Trustee Cristin Traylor, Discovery Counsel, M... 2 years ago | 23 mins Detecting and Mitigating Active Directory Attacks Adam Rosen (Vice President of Product Strategy at Netwrix), Alex McCoy (PreSales Engineer at Netwrix) Active Directory (AD) quite literally holds the keys to the kingdom. If AD compromised, the security of everything connected to it is compromised as w... 9 months ago | 37 mins Load more