Hi [[ session.user.profile.firstName ]]

From Ransomware to Cyber Discovery: History, Solutions, and AI Workflows

In this presentation, experts in the areas of cybersecurity incident response, cyber discovery, and privacy will share how organizations can prepare, address, and respond to cyber-related incidents. From ransomware remediation to incident response, the presentation will highlight cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.

Webcast Highlights

+ It’s Only A Matter of Time: Security Incident Statistics & The History of Ransomware
+ The First 48: Electronic Security Incident Detection & Classification
+ Effective IR Plan Design: Simplicity, Scalability & Beyond the Technical Details
+ Post-Breach Discovery: Workstream Overview, Use of AI & Impact Assessment Reporting
+ HaystackID ReviewRight Protect: Post-Breach Review & Extraction Workflow

Speakers

+ Michael Sarlo: Michael is the Chief Innovation Officer and President of Global Investigation and Cyber Discovery Services for HaystackID.

+ Mary Mack: Mary is the CEO and Chief Legal Officer of the Electronic Discovery Reference Model.

+ John Brewer: As Chief Data Scientist, John serves as the Head of Advanced Technology Services for HaystackID.

+ John Wilson: As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

+ Jenny Hamilton: As the Deputy General Counsel for Global Discovery and Privacy at HaystackID, Jenny is the former head of John Deere’s Global Evidence Team.
Recorded Aug 11 2021 87 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Sarlo, Mary Mack, John Brewer, John Wilson, and Jenny Hamilton
Presentation preview: From Ransomware to Cyber Discovery: History, Solutions, and AI Workflows

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Going for the Gold? Mobile Elite Discovery and Analysis Lab for Mobile Devices Oct 20 2021 4:00 pm UTC 75 mins
    John Wilson and Rene Novoa
    Companies poring over high-stakes investigations and litigation now have immediate access to a powerful new service to assist in identifying and analyzing digital clues from mobile devices through HaystackID’s Mobile Elite Discovery and Analysis Lab (MEDAL). Forensics professionals require specialized skills and powerful tools to investigate various platforms ranging from smart devices to messaging systems for issues including criminal activity, misconduct, and embezzlement. With our MEDAL service, professionals can find, understand, and learn from data at the start of the legal discovery continuum.

    In this educational presentation, digital forensics experts will share considerations for full-file system and physical extractions from both Android and iOS devices, allowing for access into previously restricted areas on mobile devices by digital forensics and eDiscovery professionals.

    Webcast Highlights

    + The Challenge of Mobile Device Discovery
    + The Constraints of Mobile Android and iOS Devices
    + An Overview of Mobile Elite Discovery and Analysis Lab (MEDAL)
    + MEDAL Technical Considerations
    + Use Cases, Approaches, and Impact on Investigations

    Expert Speakers

    + John Wilson: As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

    + Rene Novoa: As the Director of Forensics at HaystackID, Rene has more than 20 years of experience ranging from data recovery and digital forensics to eDiscovery. He has performed many investigations in support of both civil and criminal matters.
  • From Breach to Response: Cybersecurity Essentials That Every Lawyer Should Know Recorded: Sep 16 2021 61 mins
    Ashish Prasad, Michael Sarlo, Jenny Hamilton, and Matthew Miller
    Every large corporation and organization today face the significant threat of cybersecurity incidents. However, most practitioners who handle litigation and investigation matters are unfamiliar with the basics of responding to cybersecurity incidents and the challenges associated with incident response and post-data breach requirements.

    In this panelist discussion and presentation, cybersecurity incident response, legal discovery, and privacy experts will share considerations for handling a cybersecurity incident.

    Webcast Highlights

    Areas highlighted that will impact incident response and post data breach discovery and review practices and processes in the coming years will include:

    + The Role of the Cyber Insurance Company and Trends in the Cyber Insurance Industry
    + The Roles of Internal Legal, Compliance, IT, and Business Personnel
    + The Roles of Outside Counsel and Incident Response Firms
    + The Workflows of Incident Response Between and Within the Participating Companies and Groups
    + Federal, State, and International Legal Requirements and Strategies for Meeting the Expectations of Different Regulators
    + The Protection of Privilege in Light of Recent Case Law
    + The Proactive Steps that Companies Should be Taking to be Prepared to Respond to Cybersecurity Incidents

    Speakers

    + Ashish Prasad – Vice President and General Counsel, HaystackID
    + Michael Sarlo – Chief Innovation Officer & President of Global Investigation Services, HaystackID
    + Jenny Hamilton – Deputy General Counsel for Global Discovery & Privacy, HaystackID
    + Matthew Miller – Senior Vice President of Information Governance and Data Privacy, HaystackID
  • From Ransomware to Cyber Discovery: History, Solutions, and AI Workflows Recorded: Aug 11 2021 87 mins
    Mike Sarlo, Mary Mack, John Brewer, John Wilson, and Jenny Hamilton
    In this presentation, experts in the areas of cybersecurity incident response, cyber discovery, and privacy will share how organizations can prepare, address, and respond to cyber-related incidents. From ransomware remediation to incident response, the presentation will highlight cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.

    Webcast Highlights

    + It’s Only A Matter of Time: Security Incident Statistics & The History of Ransomware
    + The First 48: Electronic Security Incident Detection & Classification
    + Effective IR Plan Design: Simplicity, Scalability & Beyond the Technical Details
    + Post-Breach Discovery: Workstream Overview, Use of AI & Impact Assessment Reporting
    + HaystackID ReviewRight Protect: Post-Breach Review & Extraction Workflow

    Speakers

    + Michael Sarlo: Michael is the Chief Innovation Officer and President of Global Investigation and Cyber Discovery Services for HaystackID.

    + Mary Mack: Mary is the CEO and Chief Legal Officer of the Electronic Discovery Reference Model.

    + John Brewer: As Chief Data Scientist, John serves as the Head of Advanced Technology Services for HaystackID.

    + John Wilson: As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

    + Jenny Hamilton: As the Deputy General Counsel for Global Discovery and Privacy at HaystackID, Jenny is the former head of John Deere’s Global Evidence Team.
  • A Matter of Time? From Data Breach Discovery to Defensible Incident Responses Recorded: Jul 13 2021 75 mins
    Michael Sarlo, John Wilson, Jenny Hamilton, and John Brewer
    Webcast Description

    In this expert presentation, cybersecurity incident response, legal discovery, and privacy experts will share how organizations should be prepared to respond to a cyber-related incident, while also gaining insight into cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.

    Webcast Highlights

    + Incident Response: Overview of Services and When to Engage to Use Them
    + Identifying Sensitive Data Post Breach via Impact Assessment: Establishing Scope and Reducing Risk
    + Post Breach Discovery: HaystackID ReviewRight Protect™ Document Review Services and Technology Enablers to Support Isolation, Collation and Organization of PII/PHII Relating to Breached Entities
    + Notification and Disclosure Reporting: Obligations, Best Practices, and Methods for Streamlining Entity Notification and Disclosure

    Speakers

    + Michael Sarlo - Michael is the Chief Innovation Officer and President of Global Investigation Services for HaystackID.
    + John Wilson - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.
    + Jenny Hamilton - As the Deputy General Counsel for Global Discovery and Privacy at HaystackID, Jenny is the former head of John Deere’s Global Evidence Team.
    + John Brewer - As Lead Data Scientist, John serves as the Head of Advanced Technology Services for HaystackID.
  • Operationalizing Data Mapping: From Practices and Protocols to Proven Processes Recorded: Jun 23 2021 68 mins
    Jonathan Flood, Justine Sim, Jennifer Hamilton, and Michael Amaral
    Complex information governance challenges require a comprehensive and complete approach to understanding an organization's data profile through the lenses of compliance, privacy, and litigation. Data mapping is a critical component of this understanding. The practices, protocols, and processes around this vital component can make the difference between an organization's comfort or concern regarding its data profile.

    In this presentation industry experts will share how to consider and operationalize data mapping processes utilized in the planning, preparation, and migration of complex data sets consisting of high-risk, sensitive, and low-risk data requiring management and migration.

    Webcast Highlights

    + The Importance of Data Mapping
    + Strategy to Tactics: Data Mapping Considerations
    + Documentation and Data Mapping: A Key to Success
    + Working the Workflow: From Protocols to Processes
    + Technology Matters: Tools and Techniques
    + Overcoming Challenges: Compliance, Privacy, and Litigation
    + Reporting: From DSARs to Discovery

    Presenting Experts

    + Jonathan Flood – Mr. Flood is the Director of EU Discovery Ops at HaystackID. Jonathan is a thought leader who has worked with top-tier law firms in Ireland, in addition to vendors, financial institutions, government agencies, and regulatory bodies.

    + Justine Sim - Ms. Sim is an Information Technology Analyst for John Deere.

    + Jennifer Hamilton, JD – Ms. Hamilton is the Deputy GC for Global Discovery and Privacy at HaystackID. Jenny is the former head of John Deere's Global Evidence Team.

    + Michael Amaral - As the Director of Global Client Advisory, Mr. Amaral leads the Privacy Management Technology group at HaystackID. Mr. Amaral is a technologist with over 20 years of experience helping companies solve complex data problems in compliance, governance, privacy, and litigation matters.
  • Automating Privacy and eDiscovery Workflows: Operational Excellence as a Service Recorded: May 19 2021 84 mins
    Jonathan Flood, Susanna Blancke, Jennifer Hamilton, and David Wallack
    Managing the volume of DSAR, PII, Discovery, and Incident Response requests in today’s world of work is challenging. Many industries are seeing linear growth in these types of requests, but some are seeing an exponential increase.

    In this presentation, experts will share insight into the automation of unique workflows to better engage with these rapid-response projects. The timelines are short, the data volumes are larger than ever, and the reporting obligations are becoming increasingly onerous. Clients are asking for alternatives and technical solutions to a problem that is not going away any time soon.

    Webcast Highlights

    + Automation considerations and legal challenges.
    + Slowdown to speed up – tailoring the workflows.
    + We have the technology, let it do what it does best.
    + Working with outside counsel and 3rd parties to define the process.
    + These processes aren’t changing drastically but we are developing a higher quality product.
    + What Operational Excellence as a Service truly means.

    Presenting Experts

    + Jonathan Flood – Mr. Flood is the Director of EU Discovery Ops at HaystackID. Jonathan is a thought leader who has worked with top-tier law firms in Ireland, in addition to vendors, financial institutions, government agencies, and regulatory bodies.

    + Susanna Blancke, Esq. – Ms. Blancke is the Director of EU Litigation and Client Services for HaystackID. She has extensive global experience concerning cross-border eDiscovery operations and managing larger international and national eDiscovery teams and review units, remotely and on-site.

    + Jennifer Hamilton, JD – Ms. Hamilton is the Deputy GC for Global Discovery and Privacy at HaystackID. Jenny is the former head of John Deere's Global Evidence Team.

    + David Wallack, Esq., CIPP/E – David is the DPO at HaystackID and has significant experience in complex issues involving data breach, crisis management, GDPR, US privacy regulations, and US litigation discovery obligations.
  • Optimizing Public Comment Management in Environmental Impact Projects Recorded: Apr 21 2021 51 mins
    Albert Barsocchini, Tara Bellion, Cameron Tschannen, and Abigail Donohoo
    Managing public comment responses for environmental impact projects, rule changes, and permit applications requires the latest technology with comprehensive workflows to meet strict deadlines and detailed reporting.

    In this presentation, eDiscovery experts will share how to streamline and optimize the labor-intensive process of accepting and resolving public feedback using Relativity coupled with innovative workflows.

    Webcast Highlights

    + Review team considerations for public comment reviews.
    + Collection and processing of public comments.
    + Using eDiscovery technology to rapidly and automatically process and categorize public comments in the form of emails, letters, public hearing transcripts, hand-written comment cards, and social media comments.
    + Organizing public comments by name, date, topic and sub-topic, location, and project-specific criteria.
    + Building detailed first draft environmental reports that track and associate each comment to the author.

    Presenting Experts

    + Tara Bellion - Ms. Bellion is a certified Project Manager with AECOM with more than 26 years of experience as a National Environmental Policy Act (NEPA impact) assessment practitioner. (Tara.Bellion@AECOM.com - 907-750-6286)

    + Albert Barsocchini, JD, LLM, CEDS - As a Global Advisory Consultant with HaystackID, Mr. Barsocchini has more than 25 years of global legal and technology experience in discovery, digital investigations, and compliance.

    + Cameron Tschannen, Esq. - Mr. Tschannen serves as Director of Review at HaystackID. In this role, he is responsible for managing the review of electronic data at the direction or in consultation with clients and outside counsel's legal teams.

    + Abigail Donohoo, JD - Ms. Donohoo serves as Review Manager for HaystackID. She plans, deploys, and manages client review projects in cooperation with the Analytics and Review team in this role.
  • Remote Security for Distributed Workforces: Review Challenges and Considerations Recorded: Mar 17 2021 56 mins
    John Wilson, Jordan Ellington, Todd Mattson, and Michael Sarlo
    [Replay Note] Voice quality improves at approximately 3 minutes and 30 seconds into the presentation.

    In today's COVID-constrained world, it is estimated by industry analysts that now that more than 90% of all legal reviews are done remotely. This new remote world and its highly decentralized review landscape have introduced more complex security challenges demanding sophisticated security capabilities, all without changing the demanding efficiency and efficacy requirements of audit, investigation, and litigation-driven reviews.

    In this expert presentation, enterprise security experts, data and legal document review authorities, and industry-leading technology innovators will share how organizations are preparing and responding to increasing security and privacy challenges in today's remote world where distributed workforces are now the rule, not the exception.

    Webcast Highlights

    + What is Different About Remote Security? Considerations and Challenges
    + What is the Difference Between Nice to Have and Need to Have? Three Generations of Remote Security
    + Do Layers Matter? Layered Security Approach Examples and Considerations
    + From Concept to Execution: A Practical Roadmap for Secure Remote Review

    Presenting Experts

    + John Wilson, ACE, AME, CBE - CISO and President of Forensics at HaystackID
    + Jordan Ellington – Founder and CEO of SecureReview
    + Todd L. Mattson, Chief, Practice Systems & Services, Covington & Burling LLP
    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Chief Innovation Officer and President of Global Investigation Services at HaystackID
  • A Matter of Time? From Data Breach Discovery to Defensible Incident Responses Recorded: Feb 17 2021 64 mins
    Michael Sarlo, John Wilson, Jenny Hamilton, and John Brewer
    In this expert presentation, cybersecurity incident response, legal discovery, and privacy experts will share how organizations should be prepared to respond to a cyber-related incident, while also gaining insight into cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.

    Webcast Highlights:

    + Incident Response: Overview of Services and When to Engage to Use Them
    + Identifying Sensitive Data Post Breach via Impact Assessment: Establishing Scope and Reducing Risk
    + Post Breach Discovery: HaystackID ReviewRight Protect™ Document Review Services and Technology Enablers to Support Isolation, Collation and Organization of PII/PHII Relating to Breached Entities
    + Notification and Disclosure Reporting: Obligations, Best Practices, and Methods for Streamlining Entity Notification and Disclosure

    Presenting Experts:

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is the Chief Innovation Officer and President of Global Investigation Services for HaystackID

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

    + Jenny Hamilton, JD - As the Deputy General Counsel for Global Discovery and Privacy at HaystackID, Jenny is the former head of John Deere's Global Evidence Team.

    + John Brewer - As Lead Data Scientist, John serves as the Head of Advanced Technology Services for HaystackID.
  • TAR in the Real World: From Promise to Practicality Recorded: Jan 13 2021 80 mins
    Michael Sarlo, Adam Rubinger, Anya Korolyov, Seth Schechtman, Young Yu
    eDiscovery experts and commentators have championed the promise of technology-assisted review (TAR) since Judge Andrew Peck's Da Silva Moore decision in February of 2012. But exactly how is TAR faring in the real world of complex discovery? More importantly, how are the latest generation of structured and conceptual analytics tools being used to increase efficiencies and drive positive outcomes, translating TAR's promise into practical results?

    In this practical presentation, eDiscovery analytics and legal review experts will share an overview of the industry's most advanced analytics technologies and highlight recommended workflows and appropriate use cases for achieving quantifiably impactful increases in document review efficiency and accuracy.

    Webcast Highlights:

    + Structured Analytics: Threading the Email Needle
    + Conceptual Analytics: From Choices (TAR 1.0 v. 2.0) to Clusters
    + Brains and Brawn: Considering Brainspace and Relativity
    + A Good Stopping Point: The Why and When of Workflow Decisions with Continuous Active Learning

    Presenting Experts:

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Senior EVP of eDiscovery and Digital Forensics for HaystackID.

    + Adam Rubinger, JD. - As an EVP with HaystackID, Adam brings more than 20 years of experience and applied expertise in advising, consulting, and managing large-scale eDiscovery projects.

    + Anya Korolyov, Esq. - As Director of Project Management with HaystackID, Anya has 12 years of experience in eDiscovery with extensive expertise with Second Requests as an attorney and consultant.

    + Seth Curt Schechtman, Esq. - As Senior Managing Director of Review Services for HaystackID, Seth has extensive review experience, including class actions, MDLs, and Second Requests.

    + Young Yu - As Director of Client Service with HaystackID, Young is the primary strategic and operational advisor to clients in eDiscovery matters.
  • HaystackID: An Introduction Recorded: Jan 9 2021 1 min
    HaystackID Team
    HaystackID™ is the trusted eDiscovery partner for corporations and law firms facing complex, data-intensive investigations and litigation.
  • From the Enterprise to Individuals: Are You Mitigating Departing Employee Risk? Recorded: Dec 3 2020 66 mins
    John Wilson, Micheal Sarlo, and Sergio Garcia
    As harsh as it sounds, every departing employee poses a risk to your business if the transition is not correctly managed and documented. This risk ranges from inadvertent access to sensitive company information as basic as internal organizational charts to deliberate efforts to acquire and use economically essential customer lists and contracts for competitive advantage.

    In this presentation, expert investigation and eDiscovery panelists will share considerations and highlight approaches that can help organizations proactively and reactively mitigate departing employee risk in six critical areas of risk.

    Webcast Areas of Focus

    + Access to Regulated Data (PII)
    + Competitive Analysis Compromise
    + Intellectual Property Loss
    + Loss of Data Subject to Legal Hold
    + Proprietary Information Access
    + Trade Secret Misappropriation

    Presenting Experts

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Senior EVP of eDiscovery and Digital Forensics for HaystackID.

    + Sergio Garcia Jr., RCA, NCE, NeDC, AME, CBE, CMO - As VP or Forensics at HaystackID, Sergio is an eDiscovery veteran with 19 years of experience in working directly with corporations and AmLaw 200 firms across the full EDRM spectrum.
  • The Dynamics of Antitrust Agency Investigations: A Second Request Update Recorded: Oct 14 2020 76 mins
    Michael Sarlo, Mike Quartararo, John Wilson, Anya Korolyov, Seth Schechtman, and Young Yu
    HSR Act-driven Second Request responses require an uncommon balance of understanding, expertise, and experience to successfully deliver certified compliant responses. Recent FTC and DOJ updates, coupled with the increasing velocity of requests, make current expertise more crucial than ever in this unique discovery area.

    In this presentation, expert investigation, eDiscovery, and M&A panelists will present updates and considerations for managing Second Request responses to include tactics, techniques, and lessons learned from fourteen recent responses.

    Webcast Highlights

    + Defining Second Requests: The Requirement and Task
    + Context for Consideration: The Prevalence of Requests Over Time
    + A Different Type of Discovery: Characteristics of Second Requests
    + Recent DOJ and FTC Updates: From the Practical to Tactical
    + Managing Second Requests: A Provider’s Perspective

    Presenting Experts

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Senior EVP of eDiscovery and Digital Forensics for HaystackID.

    + Mike Quartararo - Mike currently serves as the President of ACEDS, which provides training and certification in eDiscovery and related disciplines to law firms, corporate legal, and the broader the legal community.

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.

    + Anya Korolyov, Esq. - As Director of Project Management with HaystackID, Anya has 12 years of experience in eDiscovery with extensive expertise with Second Requests as an attorney and consultant.

    + Seth Curt Schechtman, Esq. - As Senior Managing Director of Review Services for HaystackID, Seth has extensive review experience, including class actions, MDLs, and Second Requests.

    + Young Yu - As Director of Client Service with HaystackID, Young is the primary strategic and operational advisor to clients in eDiscovery matters.
  • Hatch-Waxman and eDiscovery: Turbo-Charging Pharma Collections and Reviews Recorded: Sep 16 2020 67 mins
    Michael Sarlo, John Wilson, Albert Barsocchini, and Vazantha Meyers
    Navigating Hatch-Waxman legislation can be complex and challenging from legal, regulatory, and eDiscovery perspectives. The stakes are high for both brand name and generic pharmaceutical manufacturers as timing and ability to act swiftly in application submissions and responses many times mean the difference between market success or undesired outcomes.

    In this presentation, expert eDiscovery technologists and authorities will share information, insight, and proven best practices for planning and supporting time-sensitive pharmaceutical collections and reviews so Hatch-Waxman requirements are your ally and not your adversary on the road to legal and business success.

    Webcast Highlights

    + NDA and ANDA Processes Through the Lens of Hatch-Waxman
    + ECTD Filing Format Overview For FDA (NDA/ANDA Submissions)
    + Information Governance and Collections Under Hatch-Waxman
    + Dealing with Proprietary Data Types and Document Management Systems at Life Sciences Companies
    + Streamlining the Understanding of Specific Medical Abbreviations and Terminology
    + Best Practices and Proprietary Technology for Document Review in Pharmaceutical Litigation

    Presenting Experts

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Sr. EVP of eDiscovery and Digital Forensics for HaystackID.

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and infotech veteran with more than two decades of experience.

    + Albert Barsocchini, Esq. - As Director of Strategic Consulting for NightOwl Global, Albert brings more than 25 years of legal and technology experience in discovery, digital investigations, and compliance.

    + Vazantha Meyers, Esq. - As VP of Managed Review for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.
  • On the Case? eDiscovery Case Law Update for the First Half of 2020 Recorded: Aug 19 2020 69 mins
    Doug Austin, Ashish Prasad, and Vazantha Meyers
    Needless to say, 2020 has been a very unusual year. But, despite court closings, there are still several notable and important case law decisions related to eDiscovery best practices and data privacy concerns. What do you need to know about the cases to prepare for the second half of 2020?

    In this presentation led by eDiscovery Today’s Doug Austin, industry eDiscovery authorities will cover key case law developments during the first half of 2020 to identify important rulings that may impact how you conduct discovery going forward.

    Webcast Highlights

    + Can simply viewing the lock screen on a criminal defendant’s mobile device violate the Fourth Amendment?
    + How can GDPR affect the ability to put pictures of loved ones on social media?
    + How should the use of ephemeral messaging apps be managed during litigation?
    + Does the Government have 37 years to crack an iPhone to obtain evidence from it?
    + Can a party be forced to use Technology-Assisted Review?
    + What should requesting parties consider when requesting native form of production?
    + Does GDPR protect a European citizen from having to respond to discovery requests in the US?
    + Can a court still issue significant sanctions for spoliation of ESI without intent to deprive?

    Presenting Experts

    + Doug Austin - Editor of eDiscovery Today: Doug is an established eDiscovery thought leader with over 30 years of experience providing eDiscovery best practices, legal technology consulting, and technical project management services to numerous commercial and government clients.

    + Ashish Prasad - Vice President and General Counsel for HaystackID

    + Vazantha Meyers, Esq. - Vice President of Discovery Services for HaystackID
  • Handling Non-Traditional Data Sources in eDiscovery Recorded: Jul 15 2020 76 mins
    Michael Sarlo and John Wilson
    You’ve heard about Alexa potentially becoming a witness in a criminal trial, but what about all the other new and unusual sources of data that may be useful as you prepare to commence or defend against litigation? With data originating from Slack to talking refrigerators and from robots, doorbells, thermometers, and other IoT devices, what does the potential deluge of data look like, and how are you going to collect, process, review, and produce it?

    Join our panel of experts as we explore some of the non-traditional data sources that litigants are faced with today and what they may face in the future.

    Webcast Highlights

    + Non-Traditional ESI Fundamentals and Considerations
    + Audio and Video Discovery
    + Cloud Data, Collaboration Suites
    + Short Message Collaboration
    + The Expanding Internet of Things (IoT)

    Presenting Experts

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is a Partner and Executive Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.

    + John Wilson, ACE, AME, CBE

    As Chief Information Security Officer and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and information technology veteran with more than two decades of experience working with the US Government and both public and private companies.
  • The Only Thing Constant is Change: An eDiscovery Technology and Tools Update Recorded: May 20 2020 38 mins
    Ashish Prasad, Todd Haley, and Vazantha Meyers
    Today, standardized collection, processing, and review processes and protocols are becoming commonplace. However, the technologies and tools that provide efficiencies and enhancements to these eDiscovery processes and protocols are continuing to evolve.

    In this presentation, expert eDiscovery technologists and authorities will provide an overview of current technologies for data analytics, artificial intelligence, process automation, and data enhancement. They will also offer practical considerations for implementing current technologies and evaluating emerging technologies.

    Webcast Highlights

    + A View from the Bench: How the Courts Are Considering New Technologies
    + Considering Forensic Analysis: New Technologies and Approaches
    + Beyond Tradition: An Update on Audio, Video, and Foreign Language Analysis
    + Emerging Data Types: Analyzing the New With the Latest Tools
    + Faster Review and Faster Decisions: Enhancing Document Review

    Presenting Experts

    + Ashish Prasad

    As VP and GC for HaystackID, Ashish is regarded as among the leading experts on discovery in the US. He has served as Litigation Partner, Founder and Chair of the Mayer Brown LLP Electronic Discovery and Records Management Practice, Founder and CEO of Discovery Services LLC, and VP and GC of eTERA Consulting.

    + Todd Haley

    As Executive Vice President and General Manager for eDiscovery Operations for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery.

    + Vazantha Meyers, Esq.

    As Vice President of Managed Review for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.
  • The Accelerating Acceptance and Necessity for Remote Collections and Reviews Recorded: Apr 22 2020 67 mins
    Michael Sarlo, John Wilson, and Seth Schechtman
    Advances in remote eDiscovery technologies coupled with developments that are restricting the ability of organizations to support traditional onsite eDiscovery operations are accelerating the acceptance of remote collections and remote legal document reviews. However, not all remote-centric collections and document review technologies, processes, and providers are equal, and knowing how to compare different approaches may mean the difference between litigation or investigation success or failure. In this expert presentation, remote collection and review experts will share information, insight, and experiences designed to benefit leaders and organizations as they consider remote eDiscovery in our new remote world.

    Webcast Highlights

    + Defining Remote eDiscovery: Definitions, Differences, and Decisions
    + Considering Remote Collections: Targets, Tasks, and Technologies
    + Reviewing Remotely: From Reviewer Selection to Secure Technologies
    + Remote eDiscovery Best Practices: Practical Considerations and Recommendations

    Presenting Experts

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Senior EVP of eDiscovery and Digital Forensics for HaystackID.

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience working with the US Government and both public and private companies.

    + Seth Curt Schechtman - As Senior Managing Director of Review Services for HaystackID, Seth has 15 years of industry and 13 years of big law experience focused on legal review supporting multimillion-dollar review projects including class actions, MDLs, and Second Requests.
  • Gotcha! How Things Can Go Wrong in eDiscovery Projects and How to Fix Them Recorded: Mar 25 2020 66 mins
    Vazantha Meyers and Todd Haley
    As the volume, velocity, and variety of data continues to increase, accelerate, and expand, the potential that things can go wrong in complex eDiscovery projects is on the rise. To avoid the "gotchas" that can accompany increasingly complex projects, systematic and defensible processes need to be proactively developed to mitigate risks, and creative solutions must be implemented quickly when "gotchas" occur.

    In this expert-led presentation, eDiscovery and legal document review authorities will present practical solutions to help legal, IT, and business professionals avoid the "gotchas" through reliable project management approaches and creative issue resolution methods. Using a combination of real-world case studies and examples, presenters will share workable solutions to help prevent eDiscovery issues.

    Webcast Highlights

    + The Stages of eDiscovery: Some "Gotchas" at Each Stage
    + Practical Principles: Creating a Proactive Environment for Mitigating Risks
    + Developing Standard Operating Procedures and Quick Reference Guides: Standardizing Proper Avoidance and Resolution Approaches
    + Case Studies: How Have "Gotchas" Been Avoided or Corrected in Real Matters

    Presenting Experts

    + Vazantha Meyers, Esq.

    As Vice President of Discovery Services for HaystackID, Vazantha has extensive experience in advising and helping customers achieve their legal document review objectives.

    + Todd Haley

    As Executive Vice President and General Manager for eDiscovery Operations for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery.
  • Anatomy of a Second Request: Managing Antitrust Agency Second Requests Recorded: Feb 26 2020 70 mins
    Michael Sarlo, John Wilson, Mike Bryant, Seth Schechtman, Anya Korolyov, and Kevin Reynolds
    Hart-Scott-Rodino Act-driven Second Request responses require an uncommon balance of understanding, expertise, and experience to successfully deliver certified compliant responses based on FTC or DOJ mandates, guidance, and deadlines.

    In this presentation expert investigation, eDiscovery, and M&A panelists will present actionable considerations for managing responses to antitrust agency Second Requests to include tactics, techniques, and lessons learned from twelve recent responses.

    Webcast Highlights

    + Defining Second Requests: The Requirement, Task, and Prevalence
    + A Different Type of Discovery: Five Second Request Characteristics
    + Managing Second Requests: A Provider’s Perspective
    + Anatomy of a Second Request: The Elements and Execution of Recent Requests

    Presenting Experts

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is a Partner and Senior EVP of eDiscovery and Digital Forensics for HaystackID.

    + John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience working with the US Government and both public and private companies.

    + Mike Bryant - Mike currently serves as an operating advisor as part of Knox Capital Holdings and focuses on private equity investments.

    + Seth Curt Schechtman - As Senior Managing Director of Review Services for HaystackID, Seth has 15 years of industry and 13 years of big law experience focused on legal review supporting multimillion-dollar review projects including class actions, MDLs, and Second Requests.

    + Anya Korolyov - A Senior Consultant with HaystackID, Anya has 12 years of experience in eDiscovery and has managed large-scale complex projects in health care, anti-trust, and patent infringement litigations, as well as navigated Second Requests as an attorney and senior consultant.

    + Kevin Reynolds: A Senior Project Manager with HaystackID.
Educational and entertaining eDiscovery webcasts and updates.
Educational and entertaining webcasts and updates on computer forensics, early case insight, and legal review from the specialized eDiscovery services firm that is big enough to matter and small enough to care. Regular content includes briefings and presentations designed to help legal professionals find, learn, and listen to their data when they face complex, data-intensive investigations and litigation. Learn more at HaystackID.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From Ransomware to Cyber Discovery: History, Solutions, and AI Workflows
  • Live at: Aug 11 2021 4:00 pm
  • Presented by: Mike Sarlo, Mary Mack, John Brewer, John Wilson, and Jenny Hamilton
  • From:
Your email has been sent.
or close