News & Analysis as of

Data Protection Discovery Data Security

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

CloudNine

My Experience at the Washington DC Masters Conference

CloudNine on

The Masters Conference in Washington, DC, on April 17th, 2024, was a bustling event with crowded sessions throughout the day. The agenda featured a diverse range of topics, such as Modern Data, Link Files, eDiscovery Case...more

Onna Technologies, Inc.

10 best practices for implementing an effective data governance framework

Data is likely your organization’s most valuable asset — or, at least, it could be. But chances are that it’s also one of your most underused and underappreciated assets. Every data source has the potential to yield a...more

EDRM - Electronic Discovery Reference Model

Secure Design: A Matter of Responsibility and Diligence

Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more

Association of Certified E-Discovery...

Technocat Tidbits: How to Manage PII in eDiscovery

Hey there, cyber sleuths! TechnoCat, Cat Casey, here, ready to uncover some digital secrets! As we’ve chatted before, eDiscovery is the Sherlock Holmes of the digital age....more

Association of Certified E-Discovery...

Technocat TidBits: What is PII?

Hey there, cyber sleuths! Your friendly neighborhood TechnoCat, Cat Casey, here to talk about a vital player in our eDiscovery game: PII, or Personally Identifiable Information. And folks, it’s not just about the usual...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

Onna Technologies, Inc.

The best data retention policy template to get you started (Updated)

Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more

CloudNine

Key Takeaways on eDiscovery/eDisclosure, Info Governance and Collaboration from The Master’s Conference in London

CloudNine on

Exceeding Corporate Client Expectations - The first session of the conference, moderated by Richard Clark from CloudNine, focused on introducing new ways of deepening the relationship between corporate in-house and outside...more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

Association of Certified E-Discovery...

[Webinar] Demo: Exterro is Better Than Ever, Come See Why - May 24th, 1:00 pm - 2:00 pm EDT

Since its founding 2008, Exterro has continued to innovate and improve its best-in-industry end-to-end e-discovery platform. Exterro’s recent acquisition of Zapproved strengthens their commitment to empowering customers to...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

EDRM - Electronic Discovery Reference Model

Castles in the Cloud? Single-Tenant Architecture: A New Paradigm for Cloud Security

Single-Tenant Architecture: A New Paradigm for Cloud Security - Alarm bells rang when  several respected ediscovery providers announced they had shut down their sites due to security breaches. The causes were different for...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode VI - Cyber Fundamentals: The New Cybersecurity Triad

Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

EDRM - Electronic Discovery Reference Model

5 Steps to Protecting Ediscovery Data When an Employee Exits

Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

EDRM - Electronic Discovery Reference Model

[Webinar] Managing Data Related Procedures Inside Corporate! - September 27th, 1:00 pm - 2:15 pm ET

Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more

Reveal

5 Rules to Inform Legal Technology Selection

Reveal on

Whether you’re a partner at a law firm, General Counsel at a Corporation, or a leader of legal services within a government agency, you can’t accomplish the goals of your legal team efficiently and effectively without...more

Lighthouse

New Opportunities, New Risks: A Disrupted Workforce Reshapes the Data Landscape

Lighthouse on

In case the complexities of corporate data weren’t creating enough turbulence to keep corporate and legal teams up at night, along comes a prolonged pandemic to really shake things up. Because now, a complex data landscape...more

Reveal

Go Build Bridges: Sharing Ideas at Legalweek

Reveal on

I'm still elated to see the return to in-person events - there is so much to share now that we're getting back together. Earlier this month, I returned to the stage at Legalweek to share ideas with the brilliant Linn Freedman...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

Association of Certified E-Discovery...

What’s Coming for Legal Departments in 2022?

Corporate legal departments have seen some significant changes over the past couple of years. The ongoing explosion of data volumes and rapid adoption of new communications technologies have made e-discovery operations more...more

58 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide