Backup is for Recovery, Archiving is for Discovery: Legal and IT
David K. Isom, Shareholder, GreenbergTraurig
Judge Ronald J. Hedges, Former US Magistrate Judge
Annie Goranson: Discovery Counsel, Symantec
Sean Regan, Product Marketing Manager, Symantec
Join the world leader in backup and archiving along with distinguished legal experts to discuss the changing role of backup technology in the enterprise.
* Are you having trouble navigating to the Safe Harbor?
* How do you know when you are there?
* Do your current policies prevent you from ever getting there?
No amendment to the 2006 FRCP has generated as much discussion as Rule 37(e), the so called Safe Harbor. IT and legal organizations continue to struggle defining the role of backup while courts continue to debate whether the inaccessible argument stands. In these rough waters one of the most important things in-house counsel and IT can do is to work together to define and understand the new role of backup.
Symantec welcomes IT and legal professionals to attend as our panel of experts discuss four key elements of backup and archiving:
Backup is for Recovery, Archiving is for Discovery: Sean Regan will review how the legal process changed the way we use and view backup technology in the enterprise.
Accessible or Inaccessible: Hear from Judge Ron Hedges about the current state of the accessibility argument and how courts evaluate a safe harbor claim.
Backup and Archive Retention Policies: David Isom, the founder and co-chair of Greenberg Traurig's national eDiscovery & eRetention Practice Group will review the Phillip Adams case and the role retention and information management policies play.
Archiving and Backup: Annie Goranson, Symantec’s Discovery Attorney will discuss where corporate counsel needs to insert itself in the backup and archiving discussion.
RecordedDec 10 200959 mins
Your place is confirmed, we'll send you email reminders
Everything you do is case driven, deadlines are everything and end user experience with data whether it’s uploading or analyzing is critical. All of these things mean the business value of data is in constant flux, but data storage treat all data equally forcing you to choose between staying in budget or meeting end user service level expectations. Join Chris McCall, SVP Marketing of NexGen Storage to discuss new value-driven data management capabilities designed to help Legal Service IT providers deliver a best-in-class end user experience.
Antonio Rega, Managing Director, FTI Consulting; Scott Giordano, Esq. Corporate Technology Counsel, Exterro
The status of employees constantly changes within an organization. They go on leave, move to new positions/locations, take assignments with different business units or subsidiaries, or depart the organization altogether. Annually organizations will have 12-15% of their workforce leave their company. While employee movements are a routine element of modern business life, they take on critical significance in the context of e-discovery, where failing to properly track employees can very easily result in data spoliation and severe sanctions.
In this webcast, e-discovery experts will discuss:
- The legal ramifications of data that is deleted as a result of employees leaving or changing roles at an organization
- The proper workflows/protocols to prevent employee data from being deleted
- Importance of briefing new employees of existing legal hold obligations
- How technology can aid in preventing unwanted data deletion (a short demonstration of Exterro Fusion® will be provided)
Edwin Lee, Esq., Alvarez & Marsal; Michael Gibbons, Alvarez & Marsal; Scott Giordano, Esq., Exterro
Organizations collect data related to legal matters for a myriad of reasons, from conducting internal audits to meeting litigation/regulatory obligations to responding to serious criminal allegations. Many IT professionals falsely conflate data collection with the process of creating a bitstream image – or exact bit-by-bit copy – of a targeted data repository, creating unnecessary costs for IT and legal. In reality, each collection scenario comes with a specific set of requirements that should dictate how the data is handled and ultimately extracted.
In this webcast, legal and forensic experts will look at different types of data collections and explore the methods and technologies that support each one. They will also offer best practices for bolstering cross-departmental collaboration so that collection projects don’t place too much strain on IT resources.
Dave Packer, Director of Product Marketing, Druva; Neil Etheridge, Vice President of Product Marketing, Recommind
The dramatic shift towards mobile devices in the enterprise means that everyone today is in some form a mobile worker. Along with this comes the startling statistic that nearly 30% of enterprise data is being solely stored on these devices, decreasing visibility and increasing company data risks. When an impending litigation happens, will you know how to collect and preserve your mobile data? How will you manage this data through the handoff to processing and review without compromising data integrity? With eDiscovery costs continuing to rise, getting on top of your mobile data will be key to lowering expenses and keeping ahead of data risks.
In this session you will hear about:
- How the new frontier of mobility is altering approaches to data governance
- New ways to extend enterprise visibility to data, without disrupting productivity
- The technologies and partnerships forging to address eDiscovery for mobile data
Weisen Li, Sr. Business Development Manager, Box; Roger Angarita, Sr. Product Management, Guidance Software
Corporations around the globe are adopting cloud solutions as a secure way to store and share information. At the same time, their legal and IT departments are challenged to develop a comprehensive e-discovery strategy for ongoing litigation, arbitration, and internal regulatory investigations.
In this one-hour webinar, Guidance Software and Box® team up to present the integration that enables streamlined, defensible discovery of ESI stored on Box with EnCase® eDiscovery. The webinar will cover:
-Goals and requirements for secure cloud storage
-Complexities associated with e-discovery collection from the cloud
-How to deploy an EnCase eDiscovery/Box integrated solution
-A case study on an organizations currently using this integrated solution
Calvin Zito, Storage and Social Media Expert, HP; David Scott, SVP and GM HP Storage; Jason Buffington, Sr Analyst, ESG
In a recent report, 39% of storage professionals said that data backup and recovery is a business challenge and 27% said it is a top IT priority. As the volume, variety, and velocity of data growth continues, legacy Backup, Recovery and Archiving (BURA) solutions are failing to keep pace.
As the cost and complexity of protecting data continues to rise, more data is at risk. Join @HPStorage Guy Calvin Zito and a panel of experts as they discuss how BURA must be transformed to fit the New Style of IT.
Chad Thibodeau, Director of Alliances, Cleversafe; Sebastian Zangaro, Storage Architect, HP
Big data is not only changing the way organizations store data but archive it as well. Attend this webinar to learn:
- how big data is driving requirements for big archives
- how SNIA and CDMI supports a standardized interface for cloud storage
- how to best deploy and implement a big data archive with cloud storage providers
- why using public cloud storage providers can result in tremendous cost savings, while ensuring security and availability
Mark L. Olsen, Senior Product Marketing Manager, Symantec
Join us to learn how Symantec can help with archiving and eDiscovery cloud initiatives. Depending on your strategic IT initiatives, Symantec can offer your organization either cloud based or on-premise solutions to meet your archiving and eDiscovery requirements. Learn about the options available to you from Amazon.com and Symantec to meet these important challenges with solutions from the #1 archiving and eDiscovery vendor.
Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:
* What’s the ideal reporting structure?
* Are CIOs an endangered species?
* How is IT perceived by CXOs and the business units?
* What and who drive technology innovation?
* How do new technologies impact the evolving relationship?
Register now – and bring questions for our panelists to address during the Q&A.
With over 4 million users worldwide, Adobe EchoSign is the leading electronic signature provider, delivering efficiency and security to your the signing process for any document, contract or form. For operations such as finance, HR or legal, EchoSign enables streamlined operations, and for sales EchoSign offers accelerated revenue acquisition and improved customer satisfaction. See how EchoSign has transformed brand name companies from all industries - Aetna, Cigna, Facebook, Google, Time Warner Cable -- as well as thousands of small and medium businesses.
Barry Murphy, Co-Founder & Principal Analyst, eDiscoveryJournal & David Bayer, Dir. eDiscovery Solutions Marketing, Autonomy
When confronted with fast-moving, large complex matters, or a series of internal investigations, the corporate legal department must move quickly to identify and collect potentially relevant information, assess the company’s position and attendant risks, and if required proceed to a cost-effective document review.
This webinar will explore how organizations can leverage proactive governance policies and analytics-based early case assessment capabilities to take better control of discovery. Attorneys must efficiently identify, collect and process large volumes of information, slice and dice the data set to assess the merits, potential liabilities and costs of a matter, and filter the reviewable document set to minimize the cost of document review. And document review itself needs to leverage advanced technologies and methodologies to drive efficient and high-productivity review.
In this webinar attendees will learn:
• How to leverage information governance policies to drive efficient early case assessment
• How a meaning-based computing platform intelligently integrates data from disparate sources to help minimize risk and reduce costs
• How to use different analytical technologies to accelerate legal decision-making
• How archives and legal repositories can efficiently manage large data volumes and multiple data formats while accelerating data identification and collection for fast-moving investigations
• How an integrated, unified discovery platform can facilitate collaboration between Legal, IT, Compliance, and Records Management
Bridget Charles, Information Management, HP & Josef Elliott, Managing Director, Oyster IMS
You create it and store it. You manage it and retrieve it. You buy it and sell it. Information is the fuel that drives your business: it’s one of your greatest assets. But it can also be a liability. Having a records management solution in place, that spans electronic records and emails as well as physical records helps all organizations to not only reduce the risks they are exposed to, but to improve staff productivity while managing their records consistently and efficiently.
Why does this matter? Well, not least because of the frequency with which poor information management and bad record-keeping practices are cited by regulators such as the FSA in the prosecution of their member firms. And not only that but the Information Commissioner now has the power to fine any business up to £500,000 in relation to poor information management practices – and the fines have already begun. Having a consistent, relevant and compliant records and information management infrastructure can not only mitigate these risks but also help improve process quality, increase efficiency and recognize significant cost savings at an operational level.
But with real concerns on how to seamlessly (and consistently) integrate data from multiple sources and how to ensure that this data is integrated and embedded into business process, organizations are often confused as to how they can move towards an infrastructure-led approach to managing all corporate information.
Attend this Webinar and you will hear:
• How to plan and implement an RM solution that spans physical and electronic records
• The steps to take to ensure a solution that has the ability to provide consistent, organization-wide RM
• How other organizations have embraced RM to provide real business benefits
Eric J. Sinrod; Partner, Duane Morris & Co-Host of TechLaw10 Podcasts
The target of discovery in civil litigation now is electronic data. The failure to respond effectively to electronic discovery demands can lead to significant monetary sanctions, adverse case results, and even jail time. The failure to have one’s electronic discovery house in order can mean that efforts to respond to electronic discovery demands can be extremely burdensome and expensive as repeat fire drills. This presentation will explain the current state of the law and technology when it comes to electronic discovery and will provide guidance on how best to effectively handle electronic discovery in civil litigation to minimize expense and to optimize case results.
Sharon D. Nelson; Esq. and John W. Simek; Sensei Enterprises Inc., President and Vice President
The use of social media evidence in electronic discovery has escalated dramatically in the last year. There are indeed “nuggets of gold” in social media evidence, but you don’t necessarily mine them without peril. There’s a way to do it correctly and a way to get yourself in trouble, perhaps by inadvertently doing something unethical or perhaps by simply not knowing how to obtain the evidence appropriately. Our experts will discuss the role of the Electronic Communications Privacy Act and the Stored Communications Act in dealing with social media evidence and they will also help you understand when to go to the social media provider and when to go to the user to procure your evidence. Case law is new in this area, but recent cases are instructive, and this session will discuss a few of the most noteworthy cases.
Browning E. Marean; DLA Piper LLP (US) & William Kellermann; Wilson Sonsini Goodrich & Rosati
A litigation hold is a process used by companies to advise their employees of pending or anticipated litigation and of their obligation to preserve relevant records . Recent case law and changes to Federal and State rules highlight the critical importance of these litigation holds. This webinar will focus on the design, implementation and maintenance of effective holds, all steps in avoiding evidence spoliation and foreclosing the possibility of punitive sanctions.
Robert Bond, Partner, Speechly Bircham (UK);
Julie Lewis, President, CEO and Founder, Digital Mountain (US);
James Moeskops, Managing Director, Legal Support Services, Millnet International (UK
Katey Wood, Research Associate, Information Management, the 451 Group
•How to take a strategic approach to developing and enacting defensible retention policies and litigation hold procedures
•How to efficiently implement retention/destruction policies and litigation holds using archives and automated data identification and collection technologies
•How to quickly identify potentially relevant discovery and compliance data with early case assessment technology that works hand-in-hand with custodian repositories, collection mechanisms and automated policies
•How to provide outside counsel secure access to the review data set in an easy-to-use, scalable, hosted review platform that supports multiple matters, multiple project teams and automated workflow to accelerate review.
hiFred is Associate Director of Consulting for Iron Mountain Digital. In this capacity, he advises corporations and law firms on electronic discovery process creation, risk mitigation, and litigation and regulatory readiness related to information management and complex eDiscovery challenges. To prepare for litigation and regulatory needs, Fred works with clients to develop and implement programs designed to promote efficient, effective and defensible litigation response and eDiscovery best practices.
Prior to joining Iron Mountain Digital, Fred was Senior Counsel for Repligen Corporation, a publicly-traded biopharmaceutical company, concentrating on the development of novel therapeutics for neurological disorders. As in-house counsel for Repligen, Fred handled several patent and commercial disputes of significant consequence for the Company. Most recently, Fred worked with and oversaw outside counsel on two large patent lawsuits that both resulted in highly successful settlements for Repligen. In the course of those and other litigations, Fred developed and managed all aspects of Repligen’s litigation readiness and eDiscovery program.
The risks associated with spoliation of evidence are causing organizations everywhere to examine their procedures for evidence preservation. This seminar will offer step by step guidance for instituting and maintaining effective legal holds. Participants will gain a timely foundation for policy changes through the review of recent court decisions.
Sean Regan; Symantec, Director of Product Marketing, Information Management
Join this session to learn how one organization responded to an E-Discovery request in 20 minutes while dramatically reducing costs. Hear how a sound information management strategy can help organizations delete with confidence and discover efficiently. Topics covered include, backup, archiving, e-discovery, review and export.
David Stevens; Carnegie Mellon University, Storage Manager/Team Lead
Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe. With the update to the Federal Rules of Civil Procedure (FRCP) a storage professional now has even more pressure to potentially know the content inside those files. This session helps the storage professional understand the changes to the Federal Rules of Civil Procedure (FRCP). We will also look at an e-Discovery request from the perspective of a storage professional. Finally, we will provide some recommendations on how to prepare for an e-Discovery request.
In 2015, charitable donations to colleges and universities reached an all-time high of $40.3 billion. As university endowments seek greater returns in a diverse international marketplace, the challenges from investing in funds in high-risk jurisdictions increase exponentially.
Join Kroll Associate Managing Director John Arvanitis and guest Michael A. Lukasek, CPA, Managing Director of the University of Pennsylvania’s Office of Investments, to discuss how to build a world-class compliance program for endowments. Participants in this webinar will gain insights into topics including:
Best practices for vetting and engaging with investments and fund managers in high-risk jurisdictions.
How to establish protocols in preparation for the compliance requirements of the changing regulatory environment.
Three reasons why you join us on July 15
1. Regulatory regimes around the world are evolving and expanding. Higher education endowments must ensure compliance with not only all federal and state laws, but increasingly, foreign regulations as well.
2. Recently, a number of legislative proposals have been advanced that seek to regulate endowment activity and revoke tax-exempt status, leading to heightened scrutiny of and public visibility into endowments and their activities.
3. Expanding into high-return but high-risk jurisdictions can also intensify reputational risks to institutions.
“Shift Left”- A New Age of eDiscovery – Analytics and ECA
Sponsored by LexisNexis
More than 90% of all cases settle prior to trial, and Early Case Assessment (ECA) can allow an organization to estimate risk when deciding whether to prosecute or defend a case. Employing analytics during ECA can reduce costs and enable more informed judgements during the early stages of discovery. In this interactive panel discussion, our team of experts will discuss their experience in employing ECA and the new age of integrating analytics early in the process. The discussion will include:
· Strategies on performing an ECA risk/benefit analysis;
· A new way of thinking: employing analytics in ECA?
· How does technology fit in to the process? We will include a discussion of challenges and lessons learned.
Earlier this year, hundreds of senior compliance leaders told Kroll and Ethisphere what they perceive to be their greatest risks in our 2016 Anti-Bribery and Corruption Report. Do you share the same challenges? Are you aware of or giving the requisite attention to new risks that have emerged? More important, what are the most effective ways to stay ahead of bribery and corruption challenges in 2016 and beyond?
In this interactive webinar on June 22, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.
Join in the conversation with Kevin Braine and Joe Spinelli from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concerns over personal liability. All participants will also receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
When the EU’s highest court invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of organizations were left scrambling, including law firms, legal service providers, and corporations involved in litigation and investigations. In addition, the proposed EU-wide General Data Protection Regulation (GDPR) may severely limit the data that can be legally transferred outside of the EU. Recently, the EC and the U.S. Department of Commerce announced an agreement to replace the Safe Harbor agreement on transatlantic data flows with a new EU to U.S. “Privacy Shield.” In this webinar, international law experts will review the Privacy Shield and GDPR, with a focus on the tensions they create for multi-national organizations trying to meet U.S. discovery and investigation obligations.
* M. James Daley, Senior Counsel, Seyfarth Shaw LLP
* Emily R. Fedeles, Associate, BakerHostetler
* Kenneth J. Withers, Deputy Executive Director, The Sedona Conference
Vietnam continues to be a major foreign direct investment destination in Asia Pacific. The country has positive macro-economic factors demonstrated by its solid and continued GDP growth, a number of free trade agreements, improving infrastructure and a young demographic and low labor costs which has encouraged businesses to relocate there. However, there remain a number of potential uncertainties and risks for inbound investors given the new government administration following the Communist Party of Vietnam’s 12th National Congress in January. The geo-political situation around the South China Sea is also an issue for those operating in Vietnam, and limitations in obtaining information and disclosures can present challenges to parties executing transactions.
Join Kroll and Duane Morris to learn about the risks and opportunities offered by Vietnam. Richard Dailly, Managing Director at Kroll, Giles Cooper, Partner, and Manfred Otto, Associate at Duane Morris will share more about Vietnam as an investment destination, what the legal and political risks are of doing business there and how the new administration and free trade agreements could affect inward foreign investment. They will also address the complexities of running a business in Vietnam, reviewing operational risks from investigations Kroll has conducted, Duane Morris's experiences with respect to due diligence of Vietnamese partners, compliant and workable solutions.
Cybersecurity Threats and Client Confidential Data: Navigating Risks and Ethical Obligations
Today's digital landscape is rife with constantly-evolving cybersecurity threats. No organization is immune, and all types of corporate data may be at risk, from personal information about customers and employees to intellectual property, litigation materials, business plans - even financial forecasts. Recent high profile data leaks have put a spotlight on law firm security. As custodians of a treasure trove of confidential client data, law firms and legal service providers often are prime targets for cyber criminals seeking access to highly valuable sensitive information.
In this fascinating webinar, we'll examine how ethical and professional obligations apply to the privacy and security of client data attorneys maintain, and discuss the types of incidents that frequently lead to significant breach events, including emerging and growing threats such as ransomware and phishing scams. We'll also use a real-world scenario to explore what typically happens when a breach occurs and consider steps lawyers and service providers may take to help safeguard their clients' data.
* William F. Auther, Partner, Bowman and Brooke LLP
* Melinda L. McLellan, Counsel, BakerHostetler
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Sponsored by LexisNexis, this webinar will focus on using analytics and visualizations to gain better insight into your data:
Big Data plays a big role in litigation for many law firms and organizations. Having the ability to cull down your data earlier in the litigation cycle enables your firm or organization to work more efficiently and competitively. Technology is increasingly playing a key role in helping firms and organizations effectively identify and manage the data most important to your litigation. This session will discuss the emerging trends around analytics in eDiscovery, and how your firm or organization can implement best practices to ensure the highest quality results at a lower cost than traditional document reviews.
* Krista Fuller, Director of Product Management, LexisNexis
* Ryan Bilbrey, Managing Director, OmniVere
* George Socha, Co-Founder, EDRM
* Tom Gelbmann, Co-Founder, EDRM
Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?
Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.