Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
Managing Large Scale Review Efficiency: Tips From a GC
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Using Technology in the Courtroom
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
Systems And The Emergence Of AI In Law Practice | Ernie Svenson | Texas Appellate Law Podcast
What Does Artificial Intelligence Mean for Ediscovery Jobs? | Eye on ESI: A.I. Edition
Review Analytics for a New Era
Join us for an exclusive webinar where we reveal iCONECT's innovative solutions in the realms of Data Governance, Cyber Incident Response, and Data Review, all meticulously crafted on the reliable iCONECT technology platform....more
In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more
In the eleventh episode of EDRM Trusted Partner, HaystackID’s podcast series, Anya Korolyov, Vice President of Cyber Incident Response and Custom Solutions at HaystackID sits down with Kaylee and Mary to talk about her...more
There’s no denying that data breaches are a major concern for organizations of all sizes, 2021 saw 1,860 data breaches occur (a record high), and 81% of those involved sensitive information like social security numbers and...more
Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and...more
The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more
In the fast-moving industry of cyber incident response, success and efficiency come from preparation. Once a matter is promoted to review, the most common request for timing is “as soon as possible.” How is a client’s desire...more
Cyber-attacks can happen to any organisation around the globe and when an incident or breach occurs, they must act quickly to determine the extent of the data exposure and notify all individuals impacted by the breach....more