Shielding the Organization from Data Risk & E- Discovery Failures

Size: px
Start display at page:

Download "Shielding the Organization from Data Risk & E- Discovery Failures"

Transcription

1 Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America, Inc. Matthew Fisher, Global Head of Records and Information Management, Diageo North America, Inc. Moderator: Jason Ray, Managing Director, FTI Technology legalweekshow.com legaltechshow.com #Legalweek17 #Legaltech

2 Audience Poll #1 Where do you work? Choose one: 1. Corporate/In-House 2. Law Firm 3. Service Provider 4. Other 2

3 Audience Poll #2 What is your role? Choose one: 1. Lawyer 2. Litigation Support 3. Compliance/Security 4. IT/Technologist 5. Paralegal 6. Consultant 7. Other 3

4 Computing Paradigm s Changes

5 Creating Chaos in the Enterprise Technical Diversity A new Apple App is submitted for approval every two minutes New companies and new applications appear faster than packaged software can be modified Minimal IT expense, instant scalability, and (almost) free software Workplace Changes Mobile, global workforce puts new demands on data storage and access + = Lines blurring between professional data owned by a company or by an individual Many users do not know how to (or want to) maintain multiple identities Lack of Corporate Control IT and Legal departments do not know their data universe Users can easily move, share or delete data Collection tools cannot keep pace with new applications

6 Legal Requirements: Not a priority for public app developers Critical features for legal compliance and discovery are often missing or unreliable Rapid changes targeted at the key customers break tools used for legal management Every system has unique challenges in accessing information Every messaging systems has individual interfaces and logging mechanisms Apps often have no real search capability and do not index external links or attached files systems and archives (including Google and evault) do not support complex legal searches 6

7 Today s Biggest Data Risks Hacks, data leaks, privacy violations Migration to cloud and especially O365 Shadow IT Unchecked data volumes Non-traditional data types and sources BYOD/Mobile Texting and Private Messaging Work Collaboration Platforms Social media Incomplete data preservation efforts 7

8 Audience Poll #3 Which of the following do you think creates the biggest data risk? Choose one: 1. Hacks/leaks 2. Migration to cloud and especially O Shadow IT 4. Unchecked data volumes 5. Non-traditional data types and sources 6. Incomplete data preservation efforts 8

9 Cost vs Risk Balance Eliminating risk Sometimes to the detriment of cost-savings Where is the middle ground? Keeping costs down Cost pressure is bad and getting worse 9

10 Audience Poll #4 In today s climate, which is more important; eliminating risk or controlling cost? Choose one: 1. Eliminating Risk 2. Controlling Cost 10

11 In-House Legal Department - Recommended Best Practices Know your systems Where/what/how much/who manages How are they organized and used? Knowing your organization = lower costs and higher value information Make regular data deletion a part of your process Routine and consistent remediation Less volume and less risk More up to date knowledge of business process Train your staff on data best practices Don t text or use chat apps for business processes Keep personal and company data separate on BYO devices What does Litigation Hold mean and what are the expectations around it? Have a playbook for when litigation is contemplated Have a standard, vetted process for 80-90% of cases and treat the 10-20% outliers on an individual basis Make sure affirmative documentation is part of that process Custodian interviews are key To control scope and target high value information Employ a baseline set of questions plus customized queries for specific matters Especially important for cases involving mobile, app and chat data 11

12 Audience Poll #5 Which of the following do you currently utilize? Choose all that apply: 1. Systems/data map 2. Regular data remediation 3. Staff training on data preservation & litigation hold 4. Updated BYOD policy 5. Playbook for data handling during litigation 6. Custodian interview template 12

13 Outside Counsel Recommended Best Practices Close coordination and collaboration between client and firm Be clear on methods and scope Share documentation for litigation hold, preservation and collection Define clear roles and responsibilities Have a baseline e-discovery process Have a summary description of your baseline process than can be shared with your client Make sure the process has appropriate controls When dealing with clients unused to litigation, provide additional information Field a team with the right tools and skills Key team members with enough training and experience that you would be comfortable having them testify Able to focus on the case to ensure success Engage specialists for case specific needs 13

14 Consultants & Vendors - Recommended Best Practices Clear and consistent communication between law firms, vendors and clients is key Clients included on s to counsel at a minimum during scoping, preservation and collection Affirmative documentation of all specifications and controls Clear approvals of all collection and culling decisions Minimize surprises Regular updates about budget estimates and requirements Frequent cross checks to identify process gaps Proactive follow up on pending decisions and actions Find efficiencies Listen to requirements and propose solutions instead of just executing instructions Recommend methods to reduce costs including culling, analytics, TAR, or early fact finding approaches Move data to near line or offline when possible to reduce unnecessary hosting 14

15 Audience Poll #6 Which of the following do you currently utilize? Choose all that apply: 1. Summary description of baseline processes for data management during litigation 2. Documented specifications and controls on your current data collection/management process 3. Regularly-scheduled, consistent updates between client, law firm and consultant/vendor? 4. Documented process for cross-checks, decisions and approvals for data management during litigation 15

16 Ethical Considerations What level of technological expertise should a lawyer reasonably be expected to have in 2017? What types of e-discovery practices or omissions could put a lawyer in danger of violating these rules? ABA Model Rules: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. California Ethics Opinion: Attorneys handling e-discovery should be able to perform (either by themselves or in association with competent co-counsel or expert consultants) the following: initially assess e-discovery needs and issues, if any; implement/cause to implement appropriate ESI preservation procedures; analyze and understand a client s ESI systems and storage; advise the client on available options for collection and preservation of ESI; identify custodians of potentially relevant ESI; engage in competent and meaningful meet and confer with opposing counsel concerning an e-discovery plan; perform data searches; collect responsive ESI in a manner that preserves the integrity of that ESI; and produce responsive non-privileged ESI in a recognized and appropriate manner. 16

17 Q&A 17

18 Thank You 18

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response

More information

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,

More information

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive

More information

Achieving & Maintaining E-Discovery Fitness

Achieving & Maintaining E-Discovery Fitness Advice from Fortune 1000 E-Discovery Experts: Achieving & Maintaining E-Discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Advice from Counsel is sponsored by: Introduction Introduction Fitness

More information

Law Prac ce Management MCLE Mee ng ARC May 27, 2014

Law Prac ce Management MCLE Mee ng ARC May 27, 2014 Law Prac ce Management MCLE Mee ng ARC May 27, 2014 11:45 AM Noon Sign In/Lunch 11:55 AM Noon Welcome/Introductions Michael Calabrese, Chair Charles Wentworth, Co-Chair Noon 1:00 PM Program Discovering

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

Meta-Discovery Presents Challenges for Producing Parties

Meta-Discovery Presents Challenges for Producing Parties Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : Ariana J. Tadler, Kevin F. Brady, and Karin Scholz Jenson* THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26 Obligations, Court

More information

BUILT FOR THE STORM. AND THE NORM.

BUILT FOR THE STORM. AND THE NORM. BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification 2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification Presenters Jared Hamilton CISSP CCSK, CCSFP, MCSE:S Healthcare Cybersecurity Leader, Crowe Horwath Erika Del Giudice CISA, CRISC,

More information

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )? Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

CONFLICT OF INTEREST SYSTEMS

CONFLICT OF INTEREST SYSTEMS CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every

More information

CLOUD COMPUTING BY DENNIS KENNEDY

CLOUD COMPUTING BY DENNIS KENNEDY BY DENNIS KENNEDY A recent Gartner report forecasts a growth of 18% in spending on public clouds across all businesses for 2017, similar to that in 2016. Other surveys show that the use of cloud computing

More information

Optimisation drives digital transformation

Optimisation drives digital transformation January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information

Playing in the Big (Data) Leagues: Consumer Data Mining Data Privacy and Compliance

Playing in the Big (Data) Leagues: Consumer Data Mining Data Privacy and Compliance Playing in the Big (Data) Leagues: Consumer Data Mining Data Privacy and Compliance Presented by Charlie Bingham, Legal and Corporate Affairs -Enterprise Partner Group, Microsoft Corporation Rachel Reid,

More information

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics

Finding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing

More information

Measuring Your. E-Discovery Program. Against Industry, 2015

Measuring Your. E-Discovery Program. Against Industry, 2015 Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and

More information

Deloitte Discovery Caribbean & Bermuda Countries Guide

Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your

More information

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING

ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING EMAIL ARCHIVING FIRST STEPS TOWARDS ENTERPRISE INFORMATION ARCHIVING 2013 2014 2015 2016 2017 Worldwide Email Accounts (M) 3,899 4,116 4,353 4,626 4,920 Business Email Accounts (M) % Business Email Accounts

More information

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

VMware Cloud Operations Management Technology Consulting Services

VMware Cloud Operations Management Technology Consulting Services VMware Cloud Operations Management Technology Consulting Services VMware Technology Consulting Services for Cloud Operations Management The biggest hurdle [that CIOs face as they move infrastructure and

More information

Victor Stanley and the Changing Face

Victor Stanley and the Changing Face Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu R E F E R E N C E L I B R A R I A N Jane Larrington Faculty Services & Reference Librarian jlarrington@ sandiego.edu 619.260.4766 Dangers of metadata for the uninitiated attorney Professional responsibilities

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

Uptime and Proactive Support Services

Uptime and Proactive Support Services Uptime and Proactive Support Services We ll accelerate your journey to sustainable IT optimisation and ensure that your technology is delivering all that it can. We ll keep your IT infrastructure up and

More information

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks @CompTIA_UK Housekeeping Login and connect to the audio when logging in: Find audio information under

More information

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Education Brochure. Education. Accelerate your path to business discovery. qlik.com

Education Brochure. Education. Accelerate your path to business discovery. qlik.com Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

New CEPIS Mission

New CEPIS Mission New CEPIS Mission 2016-2020 Contents: 1 Introduction... 3 2 CEPIS Today... 3 3 CEPIS Tomorrow... 3 1.1 Mission Statement... 3 1.2 Target Audiences... 3 1.3 Strategy... 4 1.3.1 Promoting High Standards

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Cisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How

Cisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

7 Ways to Save Big Money on ediscovery

7 Ways to Save Big Money on ediscovery 7 Ways to Save Big Money on ediscovery You Don t Have to Break the Bank to Get Great Results A Computing Source White Paper December 2016 The volume of electronically stored information (ESI) continues

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

White Paper. Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection

White Paper. Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection White Paper Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection Table of Contents Introduction....3 Positive versus Negative Application Security....3 Continuous Audit and Assessment

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

AACE Certification Background, Overview and Process Rocky Mountain Section September 22, Ken Cressman EVP PMP CCP Robert Van Gundy PMP PSP EVP

AACE Certification Background, Overview and Process Rocky Mountain Section September 22, Ken Cressman EVP PMP CCP Robert Van Gundy PMP PSP EVP AACE Certification Background, Overview and Process Rocky Mountain Section September 22, 2016 Ken Cressman EVP PMP CCP Robert Van Gundy PMP PSP EVP 1 AACE Certification Background A Portfolio of Distinction

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

The Migration HANDBOOK

The  Migration HANDBOOK The Email Migration HANDBOOK GETTING STARTED: Important Email Migration Considerations Email migration provides some important benefits for any organization, particularly for those that are moving to the

More information

Enabling Innovation in the Digital Economy

Enabling Innovation in the Digital Economy White Paper Business Agility Enabling Innovation in the Digital Economy Business Agility White Paper Enabling Innovation in the Digital Economy Five Steps to Implementing a Software-defined Infrastructure

More information

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning Week Six IT Audit Planning IT Audit Planning Process Institute of Internal Audit Standards - Section 2010: Planning The chief audit executive must establish a risk-based plan to determine the priorities

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

Top Ten Tips for Managing e-discovery Vendors

Top Ten Tips for Managing e-discovery Vendors Top Ten Tips for Managing e-discovery Vendors Apr 03, 2013 Top Ten By Daniel B. Garrie This resource is sponsored by: By Daniel B. Garrie, Senior Managing Partner, Law & Forensics LLC, Thomson Reuters

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

Three Common Techniques for E-Discovery Preservation

Three Common Techniques for E-Discovery Preservation www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

2015 HFMA What Healthcare Can Learn from the Banking Industry

2015 HFMA What Healthcare Can Learn from the Banking Industry 2015 HFMA What Healthcare Can Learn from the Banking Industry Agenda Introduction- Background and Experience Healthcare vs. Banking The Results OCR Audit Results Healthcare vs. Banking The Theories Practical

More information

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1 PLEASE NOTE This is an interactive panel, and we will be conducting voting throughout. To make voting easy, please register NOW, before the panel starts. To register: - Text the phrase MICHAELBERWA428

More information

Transform Your Enterprise Search and ediscovery on the AWS Cloud.

Transform Your Enterprise Search and ediscovery on the AWS Cloud. Transform Your Enterprise Search and ediscovery on the AWS Cloud. Welcome Sheri Sullivan Senior Partner Marketing Manager Amazon Web Services Webinar Overview Submit Your Questions using the Q&A tool.

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

Design Build Services - Service Description-v7

Design Build Services - Service Description-v7 Design Build Services - Service Description Hyper-scale clouds, such as Microsoft s Azure platform, allow organizations to take advantage of flexible, cost-effective cloud solutions that have the power

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

CA Services Partner. Implementation Enablement. Eugene Banks FY18

CA Services Partner. Implementation Enablement. Eugene Banks FY18 CA Services Partner Implementation Enablement Eugene Banks FY18 Without partners, CA Services and Education would be unable to scale to meet the growing demands of the business. If our strategy is effective,

More information

ESTABLISHING THE PILLARS. of a Successful Data Governance Program

ESTABLISHING THE PILLARS. of a Successful Data Governance Program ESTABLISHING THE PILLARS of a Successful Data Governance Program 1 TABLE OF CONTENTS DATA GOVERNANCE IN THE ENTERPRISE 3 TAG AUDITING 4 GOVERNANCE DOCUMENTATION 6 COMPLIANCE TESTING 8 DATA GOVERNANCE BOARD

More information

CLOUD COMPUTING READINESS CHECKLIST

CLOUD COMPUTING READINESS CHECKLIST CLOUD COMPUTING READINESS DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO 1 CONTENTS INTRODUCTION

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Table of Contents. Why Get Secure Messaging? Secure Messaging Business Advantages

Table of Contents. Why Get Secure Messaging? Secure Messaging Business Advantages Table of Contents Introduction 03 Secure Messaging Overview 04 Why Get Secure Messaging? 05 Secure Messaging Key Features 06 Secure Messaging Business Advantages 08 APPRIVER.COM Secure Messaging for Law

More information

Saving Time Amanda McPherson, CCBIA Vice President/Internal Audit Manager Colorado East Bank & Trust

Saving Time Amanda McPherson, CCBIA Vice President/Internal Audit Manager Colorado East Bank & Trust Saving Time Amanda McPherson, CCBIA Vice President/Internal Audit Manager Colorado East Bank & Trust Life before ACL GRC Life before ACL GRC Where do I start? In the beginning Dry erase board Word documents

More information

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals

More information

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies. RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Trustwave Managed Security Testing

Trustwave Managed Security Testing Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to

More information

Embedding Privacy by Design

Embedding Privacy by Design Embedding Privacy by Design Metric Stream Customer Conference May 12, 2015 TRUSTe Data Privacy Management Solutions 1 Today s Agenda Privacy in the Context of GRC Data Privacy Management and Top Privacy

More information

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled effectively. Contents Introduction.... 3 Primary Bring Your Own

More information

Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

Autofill and Other Disasters: The Ethics of Inadvertent  Disclosures Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)

More information

deep (i) the most advanced solution for managed security services

deep (i) the most advanced solution for managed security services deep (i) the most advanced solution for managed security services TM deep (i) suite provides unparalleled threat intelligence and incident response through cutting edge Managed Security Services Cybersecurity

More information