Join us for a discussion of the E.U. General Data Protection Regulation and the new People’s Republic of China data privacy law and the potential impact on e-discovery in litigation. We'll also discuss how changing technologies in cloud computing might impact preservation and collection in e-discovery, including cross-border data sharing. Presenters include experienced attorneys from Dechert LLP based in the U.S., Asia and the E.U. The session will conclude with a Q&A.
Moderator: Jim Waldron – Director, EDRM
Timothy C. Blank – Partner, Boston
Hilary Bonaccorsi – Associate, Boston
Dr. Olaf Fasshauer – National Partner, Munich
Philip Kwok – Associate, Hong Kong
File sharing and cloud storage are quickly becoming commonplace in the modern business. However, it can be difficult to know when to use one tool over another and what advantages each provides. Moreover, technology is evolving quickly and keeping up to date on the latest and greatest can be extremely time-consuming for many professionals.
Join us for a few minutes to find out how to take your productivity to the next level, and become a file, sync, and share Office all-star with OneDrive for Business Next Generation Synchronization and SharePoint 2016’s wide array of new cloud collaboration tools.
In this webcast your will learn:
- When and why to use particular tools for file sharing, storage, and collaboration
- How OneDrive for business can help you get the most out of personal file storage
- How to use some of the newest features to securely store, edit, and share your documents
- How to make professional teamsites in minutes
Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.
Join us to learn 4 key best practices:
1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
3) Do make the experience better and faster for users (as opposed to more complicated and slower)
4) Have a policy (and protection) that covers email-based sharing even when mobile
With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.
Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.
While many businesses these days have policies in place that prohibit employees from peer to peer file sharing in the office, this activity occurs on a significant percentage of company networks. Beyond the dangers of downloading copyrighted material and breaking corporate policies, employees that engage in peer to peer file sharing could be bringing malware onto corporate networks without their knowledge.
BitSight recently observed the use of the BitTorrent protocol for over 37,000 entities and found that over 40% of torrented applications contain malicious software. Join Mike Woodward, Program Director of Data as he explains:
- the correlation between BitTorrent activity and botnet infections
- the percentage of torrented applications that contain malware
- which industries face the greatest challenges with peer to peer file sharing
File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?
Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:
•The drawbacks and costs of relying on email for file sharing
•The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
•The steps that organizations should consider for enterprise collaboration
All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.
Be honest: you don’t know how your employees are sharing sensitive information outside the company.
You’re not alone. Half of respondents to a recent Ponemon Research survey acknowledged they don’t have visibility into how employees are using file sharing applications. Cloud collaboration solutions make your business more productive, but without proper controls they can quickly lead to data loss, security breaches, and regulatory failures.
Join Intralinks, a leader in secure content collaboration solutions, and Netskope, a pioneer and leader in safe cloud enablement, as they discuss:
· How to uncover and secure file sharing applications being used in the organization
· Ways of enforcing regulatory compliance and governance across the enterprise, to ensure that information is always within your control
· Approaches that will help support pending data privacy legislation
Organised in partnership with MIS Training Institute, (ISC)² Security Congress EMEA, in its third year, offered a unique opportunity for information security professionals from all levels to participate in comprehensive education programmes and connect with colleagues.Read more >
Recent research shows that when it comes to Online File Sharing and Collaboration (OFS), a “one size fits all” deployment strategy isn't enough. Join ESG Senior Analyst Terri McClure and Syncplicity as we take a look at the drivers behind corporate OFS adoption, hurdles that need to be overcome, and emerging demand for hybrid solutions.
In this webinar, Terri McClure will discuss findings from ESG’s latest analysis, Online File Sharing and Collaboration: Deployment Model Trends. She will shed light on issues that motivate many IT departments to implement OFS solutions and identify trends that are pushing vendors to provide more deployment options to customers.
Jeff Schultz, Head of Marketing at Syncplicity, will discuss the value of Syncplicity StorageVaults, which provides enterprise customers with deployment flexibility, ensures data residency and compliance, and enables secure mobile collaboration across the enterprise.
As a thank you for registering you’ll receive a free copy of the ESG Research Brief: The Demand for Hybrid Online File Sharing Solutions.
File sharing enables work and is proliferating in the enterprise environment. The unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Protecting information must be an essential requirement of any sharing solution.
Extensive new research conducted by Ponemon Institute in North America and Europe reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control.
- Half of all respondents lack the confidence to deal with risky file sharing practices
- 62% of respondents accidentally sent files to unauthorized individuals outside the organization
- 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations
Learn more. Register now for this informative webinar with Dr. Larry Ponemon in which he will discuss:
- Extent of the risk associated with unsecure file sharing
- Individual behaviors driving and organizational responses to information loss
- Key considerations for securing information in the collaborative enterprise
And, receive a free copy of the research report from the Ponemon Institute.
CommVault Edge Mobile App Demo- Sharing on the GoRead more >