A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
Cyberside Chats: Would you bury your driver's license? (with Whitney McCollum)
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
Are you overwhelmed by data mapping? Is it a daunting process for your privacy team? That's not surprising, and you are not alone. Conventional data mapping methods heavily rely on direct integrations, leading to unnecessary...more
ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more
Sharon D. Nelson, Esq., President and John Simek, Vice President of Sensei Enterprises, Inc., a national managed IT service provider, digital forensics and managed cybersecurity firm located in Fairfax, VA sit down to talk...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
Editor’s Note: The Hart Scott Rodino Act (HSR Act) is a federal law that requires companies planning to merge or acquire certain assets or voting securities to notify the Federal Trade Commission (FTC) and the Department of...more
Editor’s Note: In this insightful webcast hosted by HaystackID on April 19, 2023, our expert panel delved into the best practices for selecting, staffing, and supporting complex and high-velocity legal document reviews. The...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more
[Editor’s Note: The High Cost of Risky Business: Lessons in Vigilance from Enron, Wirecard, and Silicon Valley Bank was first published March 15, 2023 on ComplexDiscovery and is republished with permission.] Vigilance is...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more
In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more
The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
The metaverse is the latest hot topic when it comes to predictions for the next iteration of the Internet. Several big tech and gaming companies are investing in this space to build it up. It should be a best practice for...more
I'm still elated to see the return to in-person events - there is so much to share now that we're getting back together. Earlier this month, I returned to the stage at Legalweek to share ideas with the brilliant Linn Freedman...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
Editor’s Note: On December 1, 2021, HaystackID shared an educational webcast designed to present and describe a framework for deploying and enhancing organizational information governance programs....more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more
According to the 2021 ACC CLO Survey, the top three risks troubling CLO's are: cybersecurity, compliance, and data privacy. All these risks have one thing in common - data. Legal teams must effectively and defensibly manage...more
Offering tips to help legal professionals with e-discovery, Daniel Gold’s “E-Discovery Gold Nuggets” highlight the newest legal technology lessons and challenges. Originally a series of short video clips on LinkedIn, ACEDS is...more
A Strategic Cyber Discovery Framework from HaystackID™ - Provided for your review and use is a non-comprehensive overview of definitions, depictions (graphical), and descriptions that may be helpful in considering the...more
The slow adoption of remote-working culture was thrown out the window in 2020. Due to the mass work-from-home wave, the identification and adoption of cloud-based apps happened almost immediately. By June 2020, 92% of...more