Top Ten Tips for Managing e-discovery Vendors
|
|
- Neil Palmer
- 5 years ago
- Views:
Transcription
1 Top Ten Tips for Managing e-discovery Vendors Apr 03, 2013 Top Ten By Daniel B. Garrie This resource is sponsored by: By Daniel B. Garrie, Senior Managing Partner, Law & Forensics LLC, Thomson Reuters The transformation of discovery into e-discovery has wreaked havoc on the practice and business of law, creating more money for vendors at large and for some lawyers irrespective of the economy. It is virtually impossible to have litigation without some amount of e-discovery. From the s sent between employees around LIBOR, to digital footprints left by high-tech criminals in the New York Times breach, to employees involved in contentious divorce proceedings, the digital world is involved. This has led to a third party in the relationship between lawyers and litigants the e-discovery vendor. Today, e-discovery can be fully outsourced or done entirely internally, or some place in between. Irrespective of where you fall in the spectrum, at some point your corporation will undoubtedly involve one or more e-discovery software and/or vendors. This article provides ten tips for counsel to consider when evaluating e-discovery software or services. Of course, these are broad and general tips and require tweaking to be effective within your company. 1. Weigh the legal risks and your company culture to see if bringing an e-discovery solution in-house, or just a component of the solution, is a good idea. One of the most common reasons a company fails to deploy an e-discovery solution is the company culture. Some legal departments are structured such that the idea of being responsible for managing discovery is simply not part of the job description. Other companies struggle to get outside counsel on-board and acquiesce to using the solution their outside firm uses, and while this is happening less and less, it s still happening. Other times the system is purchased, but the champion of the tool leaves the legal department and the eight figure system simply dies on the vine. It is critical before looking at e-discovery solutions that counsel is aware of the corporate culture within which they are operating. For example, I have advised several global companies to utilize a managed service approach to e-discovery because the company culture lent itself better to utilizing vendors. By outsourcing a large portion of their IT functions it made delivery of any e-discovery solution a great deal more complex.
2 2. Try before you buy. Companies should follow the try before you buy principle, meaning they should test the e-discovery solution using an old case, not a case provided by a vendor. The vendor is never going to provide a case that is not going to work, because if it fails you will not buy the solution. In-line with this concept, counsel should encourage as many people in the legal department to test the new software before it is purchased. Ideally, counsel should bring in the end users of the software, or the team members who will work directly with outside vendors to make sure they have input in the review and selection process. Often these end users have a better idea of how the solution will be utilized and will most likely have a wish list of improvements for future software purchases. 3. Verify that the e-discovery solution you are buying is being used by the person selling it. You should never purchase an e-discovery solution from a vendor whose own legal team does not use the product. In addition, do not hesitate to ask around and see what other companies are using for their in-house software and outside vendor services. It is rare that an e-discovery solution provider will provide you with a bad reference. Thus, I strongly suggest that you reach out thru your network and ask to speak with people who have bought and used the system as they often will be able to deliver an unvarnished view. When you reach out to them, it is useful to consider asking questions that include: how easy or hard the e-discovery solution was to install, how much work is required to manage the e-discovery solution, and what would they do differently if they were starting from scratch. In addition, you should also ask about the skill level of the vendor, customer service, and overall abilities of an e-discovery solution or outside e-discovery service provider. I recommend having the conversation face-to-face. It is certainly a conversation that can save counsel a great deal of money, time, and headache. 4. Perform a cost benefit analysis of your existing e-discovery vendor services. Before buying an e-discovery solution or using an e-discovery vendor anything, it is important to understand the cost-benefit dynamic. high cost + low benefit = do not purchase low cost + high benefit = purchase solution high cost + high benefit = depends low cost + low benefit = depends Today, counsel often assumes that bringing a solution in-house will deliver value and lower costs, but it is critical that counsel validate this assumption before acting. Counsel should know the answers to these questions: How much money do you currently spend with outside vendors on each case in identifying, collecting, or preserving data? How much do you spend on e-discovery vendors for the other components of the e-discovery process? What is the cost to purchase, implement, and adopt an e-discovery solution for some or part of the e-discovery? What impact does having an in-house e-discovery cost have on your legal spend? Answer these questions by going to the accounting department and running a few reports to get an accurate estimate. If this is not available, then alternative paths exist, such as meeting with the CFO of your company to determine the current spend to e-discovery vendors. Our experience has suggested that if you spend more than $5,000 per-case with an e-discovery vendor to identify, collect, or preserve and you have more than 20 active matters a year, it might pay to evaluate bringing some of the e-discovery activities in-house. While bringing e-discovery in-house sounds daunting, the reality is that although front-end work for counsel and technologists exists, the times savings, peace of mind, and the monetary cost savings can be substantial and often outweigh the initial costs incurred in setting up and getting an
3 e-discovery solution operating. Counsel should be mindful when calculating the monetary cost that the total cost of ownership of an e-discovery solution is more than just the software itself. Counsel must be mindful that there will be technology costs (storage, server, and head-count) and legal costs (in-house person to manage and oversee the process). A company can incur the following costs depending on the e-discovery solution or service being sourced: Purchase new technology assets to administer the solution (e.g., Purchase a machine and several additional software applications to ensure litigation hold software operates properly); additional technology head count to support the machine; hire someone to administer the legal holds and ensure the litigation hold solution software is being utilized by counsel. While the total cost of using an e-discovery vendor or e-discovery system is higher than just the prices of the software, additional benefits are realized that go beyond being able to administer compliant legal holds, including: Avoiding the need to retain counsel to administer the litigation hold beyond validating that you are preserving as required; knowing that the company has mitigated the real-world risk that comes with an ad-hoc litigation hold system; saving money by avoiding the costly exercise of working with outside counsel of chasing down IT or employees to ensure the litigation hold letter was delivered arguably this is priceless. The above highlights some of the additional costs and benefits that should be included when calculating the cost-benefit of bringing e-discovery in-house. 5. Testing, Testing, Testing: scalability, security, usability, accuracy, and etc. While everything should work in the demo, it should also be tested with larger data sets, and preferably with your own data. If the e-discovery provider or software vendor says it is going to cost a couple of bucks to run a proof of concept: pay it. Why? It is better to pay a little up front than to go all in with a single software solution or vendor, only to lose your shirt (and your data!) in the process. This tip applies whether you are testing e-discovery software or an outside vendor service. The problem with using vendor data to run a test, is that their data is meant to highlight how smooth and efficient their software is. But the real world is anything but smooth sailing, especially when it comes to e-discovery. Using data from a prior case will give you an idea of how the software compares to prior software, as well as if the testing software is challenged with the same hurdles as the previous software. 6. Before you buy e-discovery software make sure you have the internal protocols and processes to address the use of e-discovery software or services. Preparation is the best preventative measure you can take. Make sure internal case handling protocols map to the software or services you are using. Maintaining a clear schedule of tasks and checklists will keep all parties on the same page and timeline, as well as clearly define expectations for each team member. These internal protocols should also include detailed plans on managing pre-litigation tasks, such as issuing a litigation hold notice. If you don't have protocols and process addressing vendor software or services, every time the software is used by a different member of the legal team, a different ad hoc process will emerge. This translates to more time and money spent re-documenting the e-discovery process and members of the legal team being given multiple sets of instructions on how to run a case. 7. Identify an internal owner of the e-discovery system. It is critical that there is an internal owner working with their fellow in-house counsel, outside counsel, and other vendors and is responsible for managing the system on a daily basis, resolving issues, and ensuring that the system is being used.
4 While it may seem counter-intuitive to bring in yet another person to the process, having a single person responsible for the coordination of identification, preservation, collection, search, and production of ESI will help you realize substantial savings and lower e-discovery risks overall. Often, this individual can also prove to be an invaluable resource in assisting their in-house colleagues and outside counsel in the often complex search and production process. 8. Investigate the long term viability an e-discovery solution or vendor. Software and technology changes rapidly, unlike the long-term nature of litigation. Consequently when evaluating an e-discovery solution or vendor, it is critical that counsel perform a risk analysis to ensure that the vendor is financially stable, meaning they are unlikely to file for bankruptcy. You do not want to invest in software only for it to disappear from the market. While it is possible to put software code in escrow, this is a high-risk solution. A company should also be mindful of the fact that it is very possible the software provider or solution provider will be acquired, as there is a great deal of activity in the e-discovery vertical, so counsel should make sure that the contract terms cover the life cycle of the caseload or provide a process by which the company can migrate to another vendor or solution. 9. Involve the Chief Information Officer in the selection process. Today, the gap between IT and legal is certainly shrinking, which is great for many reasons. However, if counsel engages IT after a solution is selected, they risk the solution not actually working. Almost all e-discovery solutions require some IT support, which usually translates into headcount to ensure the systems are available to run an e-discovery solution. Of course, any e-discovery system is handling sensitive documents, so ensuring the security of the environment within which the e-discovery solution is also tantamount and usually requires input from IT at some level. For example, when a company buys an e-discovery identification and collection platform, it will most likely require internal IT assets to assist legal in identifying and collecting data. Another benefit of dialoging with IT pre-purchase is that counsel will get a better grasp of the support costs. For example, we know of several great e-discovery predictive coding solutions that operate great in Windows environment, but when they are run in a non-windows environment installing software patches and updates can be a bit trickier and require additional costs. 10. Verify that the company s demand is sufficient to justify the investment. Often overlooked when selecting an e-discovery software solution is whether your company s case load justifies bringing such a system in-house, even if the budget is available. It is prudent for counsel to verify that the company s case load is sufficient to justify the investment and share this information with the technology stakeholder as well, to avoid IT purchasing a solution that is not necessary. At larger companies, the case load assessment requires counsel to reach across different legal groups to determine the current case load, and while this process may seem tedious it is essential. For example, a mid-size company might think that they do not have an active enough case docket to justify buying an e-discovery solution. However, if the legal team reaches out to the compliance department such a solution might be a huge cost saver, because that department is managing dozens of internal investigations and would benefit by having an in-house e-discovery platform to manage such investigations. With this tip, unlike evaluating the cost-benefit for the legal department, the focus is on ascertaining the internal demand for an e-discovery solution across the entire organization. The information in this Top Ten should not be construed as legal advice or legal opinion on specific facts and should not be considered representative of the views of its authors, its sponsors, and/or the ACC. This Top Ten is not intended as a definitive statement on the subject addressed. Rather, it is intended to serve as a tool providing practical advice and references for the busy in-house practitioner and other readers.
5 Reprinted with permission from the Association of Corporate Counsel (ACC) 2013 All Rights Reserved.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationTOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell
Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationIsaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.
Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This
More informationCLIENT INTAKE - CONFLICT OF INTEREST
CLIENT INTAKE - CONFLICT OF INTEREST SAMPLE INTAKE SHEET I CONFLICT OF INTEREST FORM Initial Client Consultation Interview Form The purpose of an initial consultation is for the attorney to understand
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationTHE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK
THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK 03 Introduction 04 Step 1: Preparing for a breach CONTENTS 08 Step
More informationRINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.
RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology
More informationIt s Not If But When: How to Build Your Cyber Incident Response Plan
CYBER SECURITY USA It s Not If But When: How to Build Your Cyber Incident Response Plan Lucie Hayward, Managing Consultant Michael Quinn, Associate Managing Director each day seems to bring news of yet
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationCYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE
CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return
More informationEndpoint Security Can Be Much More Effective and Less Costly. Here s How
Endpoint Security Can Be Much More Effective and Less Costly Here s How Contents Introduction More is not always better Escalating IT Security Budgets Ineffective management Need of the hour System management
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More informationa publication of the health care compliance association MARCH 2018
hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance
More informationSEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks
SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks By Richard A. Blunk (Thermopylae Ventures, LLC) and Apprameya Iyengar (Morrison Cohen LLP) The SEC has continued
More informationThe Upside to Active Mail Management - Five Reasons to Actively Manage Mail
The Upside to Active Mail Management - Five Reasons to Actively Manage Mail A White Paper from Avalon Introduction As we are all aware, the state of mail management in most organizations is not good. Most
More informationChoosing the Right Cloud Computing Model for Data Center Management
Choosing the Right Cloud Computing Model for Data Center Management www.nsi1.com NETWORK SOLUTIONS INCOPORATED NS1.COM UPDATING YOUR NETWORK SOLUTION WITH CISCO DNA CENTER 1 Section One Cloud Computing
More informationH O W T O I N S T R U C T Y O U R NEW USERS GUIDE TO INSTRUCTING PROCESS SERVER
H O W T O I N S T R U C T Y O U R NEW USERS GUIDE TO INSTRUCTING YOUR PROCESS SERVER PROCESS SERVER The Process Serving Industry Despite being an integral part of the litigation process, the process serving
More informationFirst Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations
Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service
More informationTurning Risk into Advantage
Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview
More informationMaking the case for SD-WAN
Making the case for SD-WAN A practical guide to getting buy-in for your new network New challenges require a new network It isn t just that enterprise IT is changing rapidly it s that it s changing in
More informationCLOUD COMPUTING PRIMER
CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS
More informationCLOUD VoIP. A new competitive edge for your business. 10 Reasons why your business needs ASG Cloud PBX
CLOUD VoIP. A new competitive edge for your business 10 Reasons why your business needs ASG Cloud PBX 1 Outrageously Affordable Lower Your Total Cost of Ownership 2 Minimal IT Support Required Business
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationSECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1
SECURITY AUTOMATION BEST PRACTICES A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 Introduction The best security postures are those that are built
More informationIncident Response and Cybersecurity: A View from the Boardroom
IT, Privacy & Data Security Webinar Incident Response and Cybersecurity: A View from the Boardroom Gerard M. Stegmaier, Reed Smith Partner IT, Privacy & Data Security Samuel F. Cullari, Reed Smith Counsel
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationSolutionary helps prepare for the inevitable
Solutionary helps prepare for the inevitable Analyst: Wendy Nather 22 May, 2013 There's FUD (fear, uncertainty and doubt), and there's reality. In some cases, the difference is only in how you point it
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10
More informationACCENTURE & COMMVAULT ACCENTURE CLOUD INNOVATION CENTER
& COMMVAULT CLOUD INNOVATION CENTER HYBRID CLOUD MANAGEMENT & OPTIMIZATION DATA MANAGEMENT CLOUD INNOVATION CENTER PUSHING CUSTOM CLOUD SOLUTIONS TO THE MAX. 2 CLOUD INNOVATION CENTER Cloud delivers undeniable
More informationNick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture
Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this
More informationContractors Guide to Search Engine Optimization
Contractors Guide to Search Engine Optimization CONTENTS What is Search Engine Optimization (SEO)? Why Do Businesses Need SEO (If They Want To Generate Business Online)? Which Search Engines Should You
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More informationRecovery ROI: Doing More with Less. How to Save Time and Money when Recovering
Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How
More informationIT Risk: Are You Prepared?
IT Risk: Are You Prepared? Presented by Jennifer Griveas and Michael Gray Who We Are Jennifer Griveas, Esq., is the Chief Human Resources Officer and General Counsel for the Eliza Jennings Senior Care
More informationARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER
EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been
More informationCisco Director Class SAN Planning and Design Service
Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking
More informationChapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC
Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post
More informationGET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.
GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More informationAon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary
Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As
More informationSecurity Automation Best Practices
WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough
More informationarchiving with Office 365
Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder
More informationSECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation
SECURITY AUTOMATION BEST PRACTICES A Guide to Making Your Security Team Successful with Automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough Nut to Crack
More informationGetting Off Windows XP Is More Important Than Windows Vista vs. Windows 7
Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationRed Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization
Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking
More informationLosing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data
Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com
More informationTHE DEFINITIVE GUIDE
THE DEFINITIVE GUIDE TO OPTIMIZE YOUR EMAIL MARKETING Mailrelay.com KEYS TO OPTIMIZE YOUR E-MAIL MARKETING 01 WHAT TO INCLUDE IN YOUR NEWSLETTERS? 02 HOW TO ACHIEVE A HIGH AVERAGE OF VIEWS? 03 HOW OFTEN
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More information10 Step Checklist for Your Next Website Redesign
10 Step Checklist for Your Next Website Redesign Introduction Introduction Every now and then your website needs a refresh. There are many good reasons for a website redesign, whether it s a rebranding,
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More information2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action
2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com
More informationSAPtips. Journal. Creating a Well-Developed Master Data Management Solution in BW. August/September 2005 Volume III Issue 4. SAPtips.
Page 1 Creating a Well-Developed Master Data Management Solution in BW By Arthur Pat Pesa, arthurpesa, inc Editor Note: Pat Pesa delivers another one-two-three punch with his discussion of developing,
More informationSECURITY THAT FOLLOWS YOUR FILES ANYWHERE
SECURITY THAT FOLLOWS YOUR FILES ANYWHERE SOLUTIONS FOR EVERY INDUSTRY VERA FOR FINANCIAL SERVICES Financial services firms are more likely to be targeted in a cyberattack than other organizations. Changes
More informationHybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro
Hybrid Cloud 1 contents 3 Hybrid IT: the path to the Cloud HPE & Microsoft: the strongest commitment to the Hybrid cloud 4 5 Accelerate your business with the hybrid cloud offered by HPE and Azure Why
More informationHOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT
HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationHow to Write an MSSP RFP. White Paper
How to Write an MSSP RFP White Paper Tables of Contents Introduction 3 Benefits Major Items of On-Premise to Consider SIEM Before Solutions Security Writing an RFP and Privacy 45 Benefits Building an of
More informationARCHIVE ESSENTIALS
EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has
More informationMaking trust evident Reporting on controls at Service Organizations
www.pwc.com Making trust evident Reporting on controls at Service Organizations 1 Does this picture look familiar to you? User Entity A User Entity B User Entity C Introduction and background Many entities
More informationConsolidating servers, storage, and incorporating virtualization allowed this publisher to expand with confidence in a challenging industry climate.
ENGINEERED SOLUTIONS A PUBLISHING SUCCESS STORY DOING MORE WITH LESS Consolidating servers, storage, and incorporating virtualization allowed this publisher to expand with confidence in a challenging industry
More informationJanuary How to Ensure Your Organization s Mail Process is Compliant
January 2016 How to Ensure Your Organization s Mail Process is Compliant Executive Summary Executive Summary This white paper provides an overview of compliance for mail processing. It focuses on the role
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationGrab Your Hard Hat Ten Steps for Successful Web Site Construction
Grab Your Hard Hat Ten Steps for Successful Web Site Construction By Deborah J Hoard After a recent conversation with my brother-in-law, who is a construction project manager, I realized how similar are
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationAchieving & Maintaining E-Discovery Fitness
Advice from Fortune 1000 E-Discovery Experts: Achieving & Maintaining E-Discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Advice from Counsel is sponsored by: Introduction Introduction Fitness
More informationMcAfee Total Protection for Data Loss Prevention
McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure
More informationSword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017
Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World September 20, 2017 The information and opinions expressed by our panelists today are their own, and do not necessarily represent the views of
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationIntroducing Enterprise Architecture. into the Enterprise
Introducing Enterprise Architecture into the Enterprise Washington - 21st October 2003 Chris Greenslade Chris@Architecting-the-Enterprise.com Introducing Enterprise Architecture 1 of 28 TA P16 1 Approach
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationMove Up to an OpenStack Private Cloud and Lose the Vendor Lock-in
Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Peace, commerce and honest friendship with all nations; entangling alliances with none. -Thomas Jefferson Introduction In business and
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationNext Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today
: What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal
More informationOPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement
MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As
More informationCloud-based data backup: a buyer s guide
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi Cloud-based data backup: a buyer s guide How to choose a third-party provider to develop, implement and manage your data backup solution
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More information<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.
Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More information4 Hidden Budget-Killing PDF Software Pitfalls. And how to avoid them
4 Hidden Budget-Killing PDF Software Pitfalls And how to avoid them 1 Do you know the real cost of your PDF software? It s more than some line items on a budget. Hidden PDF software costs can eat away
More informationGeneral Data Protection Regulation (GDPR) The impact of doing business in Asia
SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer
More informationPROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION
PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION INSIGHTS The EU s new data protection regulation, known as the GDPR (General Data Protection Regulation), can impact your
More informationWhite Paper. How to Write an MSSP RFP
White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current
More informationMaking. the Most of FedRAMP. Industry Perspective INDUSTRY PERSPECTIVE
Making INDUSTRY PERSPECTIVE the Most of FedRAMP Industry Perspective 1 Executive Summary When the Federal Risk and Authorization Management Program (FedRAMP) launched in 2012, cloud computing was a fairly
More informationCISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.
Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationVisual Studio Subscriptions Administration Guide
Visual Studio Subscriptions Administration Guide 2 Contents INTRODUCTION... 4 ROLES AND RESPONSIBILITIES OF A VISUAL STUDIO SUBSCRIPTIONS ADMINISTRATOR... 4 BENEFITS AND LIMITATIONS OF VISUAL STUDIO SUBSCRIPTIONS...
More informationHow to choose a website design firm
How to choose a website design firm 22 questions to ask before engaging in an important partnership Website development projects can be fraught with risk. Organizations often wonder: How can we be sure
More information