Surviving E-Discovery: Five Strategies for Information Security
Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.
RecordedSep 3 200839 mins
Your place is confirmed, we'll send you email reminders
Just when corporations began to stabilize their IT services, an explosion of new technologies emerge--economically compelling, but presenting general counsel with new legal complexities. This program outlines key strategies for managing the legal risks of doing business “in the cloud” as privacy and e-discovery collide with “unified communications“, VoIP, email-to-voice mail, etc.
E-discovery presents new challenges when discovery procedures collide against legal privacy requirements and the increased use of cloud computing solutions. Learn what these challenges are, and emerging business and technology solutions for achieving compliance
E-Discovery is creating enormous new forces upon limited corporate resources, yet vendors, law firms and consultants continue to resist delivering functional, responsive solutions to the real problems inside companies. This provocative keynote reveals 10 critical truths regarding the current market, and how companies must respond in order to truly gain control of their organizations and their information.
Unified communications challenge companies to navigate an increasing portfolio of laws governing content, monitoring and interception of communications and accessing stored records. Courts are also challenging the use of effective security on new UC solutions. Learn more in this valuable webcast.
Learn about the authoritative and powerful new tools that arm lawyers to ask the right questions . . . and discover the digital record with powerful accuracy.
In this interview, we will learn some of the stories that motivated the new book designed to arm lawyers with the tough questions with which to challenge electronic business records.
Host: David Courvoisier
Guest: Jeffrey Ritter, Esq.
E-Discovery is proving to be the litmus test for evaluating whether IT governance is actually working. Learn the critical questions that e-discovery requires to be answered, and how to leverage e-discovery to launch and improve IT governance projects and programs.
Security professionals are squarely on the firing line as courts increasingly demand that digital evidence--including e-mail--be authentic and reliable in order to be admitted into the court. THIS PROGRAM HAS BEEN RESCHEDULED FROM FEBRUARY 10 DUE TO PERSONAL ILLNESS.
Echelon One CEO Bob West interviews Jeffrey Ritter, Esq., the author of a new book on the critical e-discovery questions, and uncovers the critical defensive strategies to be employed.
Until now, no tools have emerged that allow lawyers, IT professionals, records managers and e-discovery specialists to literally see their challenges--and plan their success! THIS BROADCAST IS BEING RESCHEDULED TO FEB. 20 DUE TO PERSONAL ILLNESS
This webcast introduces the CastleQuest Discovery Maps and how they are being used to transform the strategies and battle plans of today's e-discovery challenges.
Learn from Jeffrey Ritter, the creator of the CastleQuest Discovery Library, 10 winning strategies for how the CastleQuest Maps can deliver the path forward.
Understanding the critical business impacts of e-discovery is vital -- this program enables information security professionals to learn how to show new value for their programs and reduce e-discovery risks.
As the pressure for organizations to become PCI compliant increases, there are a number of common myths and mistakes around this process.
Brian Serra, Accuvant’s PCI Program Manager, will identify these myths and mistakes and how to address them.
Topics of discussion include:
• Understanding the 12 major requirements
• The complexity of PCI compliance
• The enforcement of PCI compliance
• PCI policy and standards requirements
• Significant control sets
Based on the nationally recognized best-seller, this program surveys the critical importance of evaluating the e-discovery capabilities of outside law firms and the economic risks of making the wrong choice. 13 key topics to investigate through dialogue and competitive bidding are reviewed. Extensive audience questions are encouraged!
CIOs, IT architects and lawyers will learn important strategies for identifying and controlling compliance risks arising from the launch of Software as a Service (SaaS) applications.
Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.
Webcasts for Legal, IT and E-Discovery professionals
Our webcasts deliver authoritative analysis and key strategies for how to gain control over-- and win--the battles in litigation over finding and trusting electronic information as evidence.
Surviving E-Discovery: Five Strategies for Information SecurityJeffrey Ritter, CEO, Waters Edge[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Surviving E-Discovery: Five Strategies for Information SecurityJeffrey Ritter, CEO, Waters Edge[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins