Hi [[ session.user.profile.firstName ]]
Sort by:
    • Training Snapshot: Persistent Highlighting from CloudNine
      Training Snapshot: Persistent Highlighting from CloudNine Brian Kelley Recorded: Feb 15 2018 2:05 pm UTC 3 mins
    • A snapshot demonstration of the process required to set up and view persistent highlight terms within CloudNine to ensure important terms are always highlighted during review, regardless of search criteria.

      Failing to spot highly relevant, hot or privilege terms during document review can lead to important documents being missed or inadvertent disclosure of privileged information. Persistent highlighting enables these important terms to be always highlighted – regardless of search criteria – enabling them to be more easily spotted during review, which improves the quality of the review process.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Training Snapshot: Filtering Your Document Collection from CloudNine
      Training Snapshot: Filtering Your Document Collection from CloudNine Brian Kelley Recorded: Feb 8 2018 9:50 pm UTC 5 mins
    • A snapshot demonstration of the process required to filter your document collection within CloudNine to exclude documents from search and view.

      Duplicate and non-responsive ESI can comprise a significant portion of your document collection. Filtering your document collection to exclude duplicative and clearly non-responsive ESI enables you to reduce costs by eliminating redundant and non-responsive files from the review population and focus more on ESI that is unique and potentially responsive to the matter.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Training Snapshot: Early Data Assessment from CloudNine
      Training Snapshot: Early Data Assessment from CloudNine Brian Kelley Recorded: Jan 18 2018 9:35 pm UTC 4 mins
    • A snapshot demonstration of the process required to quickly generate an Early Data Assessment (EDA) report from within the CloudNine eDiscovery Platform and to review the information provided in the report.

      EDA reports provide a comprehensive view of the content and context of a collection of electronically stored information (ESI) early in the litigation, audit, or investigation lifecycle to help eDiscovery practitioners better understand, estimate, and plan discovery efforts.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Cyber Threat Predictions & Security for 2018
      Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 6:00 pm UTC 61 mins
    • With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

      This interactive Q&A panel with security industry experts will explore:
      - The biggest threats on the horizon
      - Key vulnerabilities and how to protect against them
      - Measures for breach prevention, detection and response
      - Which areas to focus on in 2018
      - Recommendations for CISOs

      Speakers:
      - Diana Kelley, Cybersecurity Field CTO, Microsoft
      - David McGuire, CEO, SpecterOps
      - Ashton Mozano, CTO, Circadence
      - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
      - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company

      Read more >
    • Training Snapshot: Preservation and Collection from CloudNine
      Training Snapshot: Preservation and Collection from CloudNine Brian Kelley Recorded: Jan 25 2018 10:15 am UTC 5 mins
    • A snapshot demonstration of the process required to quickly initiate and complete the preservation and collection of electronically-stored information (ESI) with the CloudNine eDiscovery Platform.

      Delivered as an integrated and automated capability in CloudNine's cloud-based, Software-as-a-Service eDiscovery automation software, Preservation and Collection from CloudNine improves collection workflow by efficiently and comprehensively accelerating legal and IT team ability to detect, identify, locate, and collect ESI in a targeted, comprehensive manner. And once collected through an automated ingestion process, ESI is automatically processed and prepared for analytics and review in support of litigation, investigations, or audits.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Training Snapshot: Litigation Hold Notifications from CloudNine
      Training Snapshot: Litigation Hold Notifications from CloudNine Brian Kelley Recorded: Jan 25 2018 11:15 pm UTC 5 mins
    • A snapshot demonstration of the process required to generate a Legal Hold Notification to potential custodians from within the CloudNine eDiscovery Platform as well as to send reminder and follow up notices to those custodians and generate tracking reports.

      Issuing a properly documented Legal Hold Notification can go a long way in showing due diligence efforts to meet your duty to preserve. The ability to automate the issuance and tracking of legal hold notices helps eDiscovery practitioners save considerable time and effort to demonstrate the satisfaction of their preservation obligation.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Training Snapshot: Proximity Searching From CloudNine
      Training Snapshot: Proximity Searching From CloudNine Brian Kelley Recorded: Feb 22 2018 10:05 pm UTC 5 mins
    • A snapshot demonstration of the process and syntax required to perform proximity searches within CloudNine to locate responsive terms that are not only in the same document, but close to each other without having to be in an exact phrase.

      When performing keyword searching, the challenge to performing those searches effectively is to balance recall (retrieving responsive documents with hits) and precision (not retrieving too many non-responsive documents with hits). One way to achieve that balance is through proximity searching, which is simply searching for two or more words that appear close to each other in the document. Proximity searching is more precise then an AND search (where two terms can appear in the document together but be completely unrelated) with more recall than a phrase search (where the terms must be exactly together in that order), so proximity searching can be a valuable search strategy for striking the proper balance in your search results.

      Training Snapshot Presenter: Brian Kelley

      Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.

      Read more >
    • Diversity and the Art of Cybersecurity | RSAC Live Panel
      Diversity and the Art of Cybersecurity | RSAC Live Panel Diana Kelley (IBM), Jennifer Steffens (IOActive), Dug Song (DuoSec), Ayelet Steinitz (Imperva), Larry Whiteside Jr. (Optiv) Recorded: Feb 14 2017 9:00 pm UTC 40 mins
    • Cybersecurity is an art. It’s a game of virtual hide-and-seek wherein attacker and defender are pitted against each other in an elaborate game of strategy which requires making unexpected connections between things before they happen. The skills needed for this job come from different experiences, perspectives and the ability to put yourself in another person’s shoes, and without a wide range of thinking styles, the solutions that we devise for a security problem are necessarily limited. Cybercriminals don’t think nor play by the rules - so why do we put unnecessary rules on ourselves? In this panel, industry experts and diversity champions discuss why diversity is critical to cybersecurity and explore the concrete steps that the security industry can take to foster diversity today for better solutions.

      The audience will learn:
      - What diversity in the workforce really means (hint: it’s more than gender!)
      - The value of diversity (with examples of successful diversity programs in InfoSec)
      - Tips, tricks and best practices to creating and maintaining a successful, working diversity program

      Moderator:
      Diana Kelley, Global Executive Security Advisor, IBM

      Panelists:
      - Jennifer Steffens, CEO of IOActive, Inc
      - Dug Song, Co-Founder & CEO, Duo Security
      - Ayelet Steinitz, VP of Business Development, Imperva
      - Larry Whiteside Jr., Co-founder & VP, International Consortium of Minority Cybersecurity Professionals

      Read more >
    • Make The Most Out Of Your Email Security Data
      Make The Most Out Of Your Email Security Data Kelley Mak, Former Forrester Analyst | Scott Greaux, PhishMe Recorded: Sep 20 2016 4:00 pm UTC 58 mins
    • Email remains an essential tool for business communication and collaboration as well as customer engagement. Because of its pervasiveness and business importance, it is a common – even preferred – attack vector for both cybercriminals and fraudsters that can result in devastating breaches and other financial losses. Yet, security teams can leverage the data from email to enhance their ability to detect, analyze, and respond to critical email security incidents, as well as leverage the threat intelligence for other security technologies.

      In this webinar, former Forrester Analyst Kelley Mak will join Scott Greaux from PhishMe to:
      •Provide an overview of today's email security challenges across on-premise and hosted cloud email deployments
      •Discuss the need for in-depth email incident response capabilities, including internal and external threat analysis, prioritization, and rapid response
      •Provide recommendations on how security teams can refine the email events in their enterprise into valuable threat intelligence

      Read more >
    • Finally -- Evidence-Based Best Practices For Using UV Disinfection Equipment
      Finally -- Evidence-Based Best Practices For Using UV Disinfection Equipment Dr. William Jarvis MD, Dr. Thomas Kelley MD Recorded: May 25 2016 6:00 pm UTC 62 mins
    • You wouldn’t operate a ventilator or administer an IV without knowing there are scientific studies that back up your procedures. You learned best practices supported by scientific research.

      We have the science and consensus to support UV disinfection best practices. Best practices that have resulted in infection rate reductions in real hospital environments.

      Your discussion will be led by esteemed experts Dr. William Jarvis and Dr. Thomas Kelley.

      William Jarvis, MD is a world leader in infection prevention. Among many other accomplishments he worked at the Centers for Disease Control and Prevention for 23 years, and has published over 450 peer reviewed papers. Recently it was said of Dr. Jarvis, “His decades of service and uncompromised commitment to [infection prevention] has lead to changes in how infection control is administered and has saved many lives.”

      Dr. Jarvis will discuss:
      -Most recent CDC and SHEA guidelines, and the metrics involved
      -A review of the science available on UV technologies in the market
      -What to look for when evaluating a UV technology

      Thomas Kelley, MD is Chief of Quality and Clinical Transformation at Orlando Health. He is a practicing primary care physician in Florida and has been a champion of quality improvement his entire career. He developed the first quality improvement council for the residency program when he was a faculty physician training residents at Atlanta Medical Center, and has continued to give his time and expertise to the causes of patient safety and quality care ever since. Colleagues say, “Dr. Kelley is a true champion for quality.”

      Dr. Kelley will discuss:
      -An integrated disinfection program with pulsed xenon enlightening best practices
      -Review of the results from a system-wide deployment of pulsed xenon light technology
      -How they achieved a $3.8M cost avoidance from HAI rate reduction in 12 months

      Read more >
    • Orchestrating Effective IT Risk Management Across the Lines of Defense
      Orchestrating Effective IT Risk Management Across the Lines of Defense Kelley Vick, IT GRC Forum; Cameron Jackson, Riskonnect; Weston Nelson, Moss Adams Advisory Services Recorded: Aug 8 2017 8:00 pm UTC 65 mins
    • Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.

      Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.

      Read more >
    • Rethinking vulnerability management: Insights from Secunia & Forrester
      Rethinking vulnerability management: Insights from Secunia & Forrester Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia Recorded: Sep 15 2015 3:00 pm UTC 61 mins
    • Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.

      In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.

      Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.

      Read more >