Learn More about Next-Generation Managed Review with ReviewRight® from HaystackID®

14483
tested true

Breaches, Responses, and Challenges: Cybersecurity Essentials That Every Lawyer Should Know

Virtual , United States

Every large corporation and organization today face the significant threat of cybersecurity incidents. However, most practitioners who handle litigation and investigation matters are unfamiliar with the basics of responding to cybersecurity incidents and the challenges associated with incident response and post-data breach requirements.

Governance, Privacy and Exposure: Understanding Information Governance, Data Privacy, and Data Breach Exposure

Virtual , United States

Organizations today, both private and public, should be excited about what is happening with their data and their networks, as advancements in technology have finally caught up with the requirements necessary to handle and manage via controls and classification, any volume of data, regardless of magnitude, in any repository, in any geography, behind the firewall or in the cloud or in a hybrid environment. However, there are risks that must be considered.

Out of the Breach and Into The Fire! The Importance of Discovery Intelligence in Sensitive Data Discovery

Virtual , United States

Finding, understanding, and addressing sensitive information ranging from personally identifiable information (PII) to protected health information (PHI) and acting on the challenges and requests it drives has fast become a necessity for cybersecurity, information governance, and eDiscovery professionals in today’s data-driven world.

[Webcast] Data Forensic Investigations Exploitation by Concept Searching

Growing data volumes for corporate investigations and compliance create a critical need for methods, technologies, and processes to quickly analyze massive amounts of communications and information. One such technology is conceptual analytics, which corporations and government agencies have used to assist with cyber discovery, information governance, and legal discovery audits, investigations, and litigation.

[Webcast] The Hierarchy of Technology-Assisted Review: From Active Learning to Optimal Results

As leading legal departments and law firms move from asking about Technology-Assisted Review (TAR) to asking for it, it is increasingly essential for legal discovery, information governance, and cybersecurity professionals to have a firm grasp of the practical aspects of Active Learning (AL). It is also crucial for those professionals to apply matter-specific and geographically driven nuances to the application of AL to ensure optimal investigation and litigation results.

[Webcast] From Strategy to Tactics: Data Remediation at Private Equity and Hedge Funds

Virtual , United States

Private Equity and Hedge Funds are notorious for never deleting anything unless required because that information may be needed in the future. Unfortunately, due to an exponential growth in cyber-attacks coinciding with exponential growth in data, firms continue to fall behind, and enterprise risk management efforts suffer without the ability to know the differences between the values of various information assets that they maintain.

[Webcast] You’ve Got to Move It: Data Protection and Privacy with Cross-Border Transfers

Virtual , United States

As borders blur and businesses expand, many companies face accelerating challenges in data protection, privacy, and cross-border transfers. Dealing with each of these areas on its own can be daunting, and addressing each of these areas together can be downright discouraging. However, with a solid understanding of requirements, roles, and responsibilities, information governance and legal discovery professionals can successfully navigate the difficulties of cross-border transfers and translate compliance challenges into business opportunities.

[Webcast] CFIUS Compliance: Your Organization’s Growth and Investment Strategy May Be a Matter of National Security

Virtual , United States

The Committee on Foreign Investment in the United States (CFIUS) is a U.S. government interagency committee with the responsibility to review foreign investments in U.S. businesses and real estate transactions for national security implications. CFIUS is ultimately concerned with protecting the national security of the U.S. via a National Security Agreement (NSA) with the business. With a solid understanding of CFIUS requirements, roles, and responsibilities, IT Security, Compliance, Privacy, Information Governance, and Legal Discovery professionals can successfully navigate the difficulties of CFIUS compliance challenges and fulfill business objectives.

[Webcast] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

Virtual , United States

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management especially since they have become major targets for bad actors seeking to profit by stealing data or encrypting data for ransom. Law firms also have unique data challenges associated with managing highly confidential and sensitive client data, alongside firm-generated privileged documents and work product, while ensuring stringent security and compliance measures. This presentation focuses on capabilities within Microsoft’s M365 Purview and its integration with Microsoft’s Zero Trust framework and security solutions as a means for law firms to improve control over their electronically stored information.