costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com

Size: px
Start display at page:

Download "costs maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com"

Transcription

1 Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response Program Essentials Page 4 futurelawoffice.com The Advantages of Utilizing Project Professionals Page 6

2 Table of Contents Introduction...1 e-discovery: Escalating Costs, Increasing Scope...1 Developing a Strategy...2 Best Practices: How One Legal Department Manages e-discovery...3 e-discovery Response Program Essentials...4 The Advantages of Utilizing Project Professionals...6 Conclusion...6 About Future Law Office...7 About Robert Half Legal...7 Appendix A: Legal, Staffing and e-discovery Experts....8 Appendix B: Endnotes...8

3 Introduction Robert Half Legal s Future Law Office research program tracks important trends and developments in the legal field. This year, we examine how law firms and corporate legal departments are responding to economic pressures and changes in client expectations. Future Law Office: Best Practices for Taming e-discovery explores how legal departments are proactively managing e-discovery while limiting risks and containing associated costs. The report includes the insights of Robert Half Legal s staffing and recruiting professionals, and features interviews with other well-respected experts in the legal field. Additional information, including a video interview with attorneys Charles Volkert, executive director of Robert Half Legal and Joel Wuesthoff, a director with Protiviti Inc., and a leader in the firm s Litigation, Restructuring and Investigative Services group, can be found at e-discovery: Escalating Costs, Increasing Scope Electronic discovery generally consumes the lion s share of time and resources for firms involved in pretrial litigation preparation. According to a Litigation Cost Survey of Major Companies, prepared for the 2010 Conference on Civil Litigation at Duke Law School, the total annual aggregate spend on litigation by large corporations was $4.1 billion dollars. One-quarter of companies outside legal fees were for costs related to attorney review and discovery. 1 It seems likely e-discovery- and litigation-related expenses will only continue to escalate in the coming years. Analysts predict that the e-discovery market will hit $1.5 billion by In the face of this rising tide, legal departments are seeking ways to minimize e-discovery risk and manage costs. Yet for many organizations, e-discovery remains a reactive process. Few companies have implemented formal, proactive programs that enable them to manage the e-discovery process efficiently and cost-effectively. When it comes to spending on e-discovery, planning is paramount to managing costs, notes attorney Joel Wuesthoff, a director with Protiviti Inc., a global consulting firm. Based in New York, Wuesthoff is a leader in the firm s Litigation, Restructuring and research legal Investigative Services group. Legal departments are realizing that the downstream cost is often a direct corollary of how proactive they ve been in managing the data the company is required to keep and purging the excess, says Wuesthoff. 3 Legal departments are realizing that the downstream cost is often a direct corollary of how proactive they ve been in managing the data the company is required to keep and purging the excess. Joel Wuesthoff, director, Protiviti e-discovery Future Law Office Robert Half Legal 1

4 Developing a Strategy J. Henry Walker IV, partner at Kilpatrick Townsend & Stockton LLP, cautions against legal departments handing over every aspect of e-discovery to an outside law firm or service provider. The client absolutely needs to be integrally involved in the process, he says. If the department has the expertise to lead the process in-house, do it. If not, in-house counsel still needs to be engaged and apply good project management skills to make sure the project stays on track. 4 The most successful companies are proactive about strategizing for e-discovery, says attorney Charles Volkert, executive director of Robert Half Legal. Part of this strategy involves determining how e-discovery initiatives will be managed, he notes. Unless a legal department is large enough to have an in-house expert, the best solution is to partner with a third party that has the necessary expertise, Volkert says. Maybe that means hiring a consultant who can take the department all the way through the project. Or maybe it means selecting items off the e-discovery menu that the department would like additional assistance with. Whatever the case, it s very important to find a resource the department can work with. 5 The most successful companies are proactive about strategizing for e-discovery. Charles Volkert, executive director, Robert Half Legal Lawyers were asked, What is the greatest challenge faced by your law firm/company when it comes to e-discovery project management? Their responses: Assembling resources 12% Collecting data Managing risks 7% 25% Keeping pace with legislative changes/court decisions 6% Having trained personnel for e-discovery 2% Other 2% 19% 21% Containing costs Don t use e-discovery 6% Don t know/no answer Source: Survey of 350 lawyers among the largest law firms and corporations in the United States and Canada. The survey was commissioned by Robert Half Legal and conducted by an independent research firm. Future Law Office Robert Half Legal 2

5 Best Practices: How One Legal Department Manages e-discovery Whenever AMEC has a case that requires e-discovery, Scott D. Nader, the company s legal counsel, evaluates costs and determines how much of the e-discovery risk management they can do internally without becoming a litigation company. 6 We can t completely manage e-discovery ourselves, nor can we give it all to a law firm and pay $400 an hour for a first-year associate to look at it, he says. The legal department will do one-off employment termination or a three- to four-custodian review itself, but generally does not handle larger matters internally. Nader has developed a few strategies to effectively manage e-discovery, including: Bringing the company s IT department on board. The most important thing to do is integrate the IT department into the legal function. You need points of contact who are responsible for litigation holds of documents. AMEC uses forms to track and do data mapping to figure out which custodians hold relevant information and where it is located. It s also important to cross-train lawyers and IT professionals, Nader notes. Lawyers need to understand the architecture of the storage system you re using. And we need to teach senior IT people about litigation requirements, so neither department is surprised when things come up down the road, he says. Ask your outside firm for better pricing models. We need to look at how to break an e-discovery problem into small bites and price it right with an outside firm to make sure we re getting a reasonably accurate set of deliverables, says Nader. Maybe you do that through a reduced rate for document review and a higher rate for high-end legal thought. That s what we re coming to our outside firm for. legal minimize costs research e-discovery hiring Future Law Office Robert Half Legal 3

6 e-discovery Response Program Essentials In addition to the recommendations provided by Scott Nader and Charles Volkert, Joel Wuesthoff and Henry Walker offer the following suggestions for legal departments that are setting up e-discovery response programs: Start with records management. Companies that do not build a strong records management plan typically experience greater e-discovery costs and risks. So, in terms of controlling expenditures, records management is the key piece, notes Wuesthoff. You need to know what information or data the company has, where it s stored, who owns it and why you re keeping it. And you have to have a process in place for keeping or getting rid of it if you don t need it, he says. Don t forget about off-site data. A simple example is hosted by an outside provider. Does the provider retain copies of messages? And, if so, then for how long? Wuesthoff says. In the future, we ll see a lot more discovery of voice mail, , text messaging and social media applications, and much of it will be housed outside the company. A report by The 451 Group, which analyzes IT innovation for businesses, predicted that cloud archiving (storage of corporate data off the company premises) will grow from a $193 million to $664 million market by Leverage technology. Companies should implement technology that automates the preservation, management and maintenance of electronically stored records, according to Wuesthoff. This makes it easier for the legal department to classify records when responding to litigation. Have a data retrieval plan. Legal departments should have a thoughtful process, says Walker. It s all right to preserve documents broadly, but then in-house counsel has to do its absolute best to narrow the scope of what they bring in to be reviewed and processed. Know ahead of time how to handle the data. Critical to the e-discovery process is to have a plan early on as to how you re going to handle the data, Walker says. Then you can execute that plan and modify it as necessary, making sure you have the best resources in place at the right prices. Obtain e-discovery training. Lawyers have a duty to be competent and educate themselves so they can do what s correct and reasonable when it comes to e-discovery issues, notes Wuesthoff. Provide clear guidelines for employees. Employees shouldn t be making judgment calls about which documents they should or shouldn t save, counsels Wuesthoff. One goal of the e-discovery program is to remove subjectivity. Take decision-making out of the hands of individual employees and move it to the legal department. Exercise caution when handling e-discovery in-house. The more work a legal department does itself, the more risk issues it s creating and the more likely it is that in-house lawyers will be called on to testify later, Wuesthoff notes. It s not a good position to be in testifying about your own methodologies. Your bias will be challenged. Lawyers have a duty to be competent and educate themselves so they can do what s correct and reasonable when it comes to e-discovery issues. Joel Wuesthoff, director, Protiviti Future Law Office Robert Half Legal 4

7 Lawyers were asked, For which of the following matters are you most likely to hire lawyers on a project basis versus hiring full time? Their responses: * United States Litigation Discovery Bankruptcy/foreclosure 14% 17% 35% Intellectual property Labor and employment General business/corporate law Other Don t know /no answer Do not hire on a project basis 3% 5% 10% 13% 13% 33% Canada Litigation 37% General business / corporate law Labor and employment Intellectual property Discovery Restructuring / insolvency Other Don t know /no answer 14% 11% 9% 6% 6% 9% 7% Do not hire on a project basis 32% *Multiple responses were permitted. Source: Survey of 350 lawyers among the largest law firms and corporations in the United States and Canada. The survey was commissioned by Robert Half Legal and conducted by an independent research firm. Future Law Office Robert Half Legal 5

8 The Advantages of Utilizing Project Professionals Any stage of e-discovery that requires a large number of lawyers or support staff whom the department does not have in-house is a potential area for project professionals to handle, notes Volkert. Large-scale litigation matters, mergers and acquisitions, due diligence those are all areas where it may make sense to use a project team in a dedicated space, he says. Legal departments should consider where they are in the process, how much data they have to review, how they re going to cull it down to a manageable level for review, and how they ll get through all of it. Knowing when to outsource is a critical judgment call for legal departments. Complex litigation that falls outside a single jurisdiction, spans borders or involves complex databases, social media or cloud computing is a prime candidate for handing over to outside counsel or outsourcing to experts who can navigate the legal, technical and procedural issues, says Wuesthoff. In addition, certain aspects of e-discovery are especially conducive to being outsourced, says Walker. The core gathering process from custodians can be handled by a third party, as well as the physical processing of documents for review. And, of course, the actual review itself is another area that s typically outsourced. Departments can realize considerable cost savings in those areas. Conclusion Moving forward, demand will only increase for legal professionals experienced in organizing and managing e-discovery initiatives. In addition to seeking individuals with such expertise, law firms and legal departments will need to implement tools and processes to handle data before and throughout the life span of a litigation case. The most successful companies will be proactive about planning for e-discovery and implement strategies that allow them to minimize risk to the organization while controlling costs. To find their way through an ever-changing e-discovery landscape, companies should map out flexible guidelines and processes that are predictable, reasonable and defensible. legal research minimize costs e-discovery Future Law Office Robert Half Legal 6

9 About Future Law Office Best Practices for Taming e-discovery is part of the Future Law Office project, an annual research initiative conducted by Robert Half Legal that examines key trends in the legal profession. This report is based on interviews with experts in law firm and corporate legal department management, as well as our own legal staffing specialists throughout North America and other professionals in the field of law. Our findings also are based on information from state and national legal publications and associations. Robert Half Legal regularly commissions surveys of lawyers on a variety of workplace and legal management issues. Relevant statistics from these studies, which include responses from lawyers among the top law firms and corporate legal departments in the United States and Canada, are cited throughout this paper. All sources, including experts and articles consulted by Robert Half Legal, are listed in the Appendices. About Robert Half Legal Robert Half Legal is the premier provider of highly skilled legal professionals for law firms and corporate legal departments. We place lawyers, paralegals, law clerks and legal support professionals on a temporary, project and full-time basis in the United States and Canada. The company has built long-standing relationships with leading professional associations, including the Association for Certified E-Discovery Specialists, Association of Corporate Counsel, Association of Legal Administrators, and Minority Corporate Counsel Association. Robert Half Legal is a division of Robert Half International, a recognized leader in professional staffing services since Future Law Office Robert Half Legal 7

10 Appendix A: Legal, Staffing and e-discovery Experts Charles A. Volkert, Esq., executive director, Robert Half Legal Scott D. Nader, legal counsel, AMEC J. Henry Walker IV, partner, Kilpatrick Townsend & Stockton LLP Joel Wuesthoff, Esq., director, Protiviti Inc. Appendix B: Endnotes 1. Litigation Cost Survey of Major Companies. Lawyers for Civil Justice, Civil Justice Reform Group, U.S. Chamber Institute for Legal Report, presented to the Advisory Committee on Civil Rules, Standing Committee on the Rules of Practice and Procedure, Judicial Conference of the United States at the 2010 Civil Litigation Conference, Duke Law School. 2. Koblentz, Evan. E-discovery Market Predicted to Reach $1.5B in Law Technology News, May 23, Interview with Joel Wuesthoff, Esq., director, Protiviti Inc., Jan. 13, Interview with J. Henry Walker IV, partner, Kilpatrick Townsend & Stockton LLP, Jan. 31, Interview with Charles A. Volkert, Esq., executive director, Robert Half Legal, Jan. 7, Interview with Scott D. Nader, legal counsel, AMEC, Dec. 13, Cloud Archiving: A New Model for Enterprise Data Retention, The 451 Group, October research results maximize e-discovery Future Law Office Robert Half Legal 8

11 roberthalflegal.com 2884 Sand Hill Road Menlo Park, CA Connect with us: 2011 Robert Half Legal. An Equal Opportunity Employer. RHL-1111

Shielding the Organization from Data Risk & E- Discovery Failures

Shielding the Organization from Data Risk & E- Discovery Failures Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Getting Your Privacy House in Order

Getting Your Privacy House in Order Getting Your Privacy House in Order Lisa J. Sotto Ewa Abrams Victoria King Partner Associate General Counsel Global Privacy Officer Hunton & Williams LLP Tiffany & Co. UPS (212) 309-1223 (212) 230-5351

More information

Deloitte Discovery Caribbean & Bermuda Countries Guide

Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

Meta-Discovery Presents Challenges for Producing Parties

Meta-Discovery Presents Challenges for Producing Parties Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.

More information

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations Background The NALA Certifying Board provides oversight for the development and ongoing maintenance of the Certified

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Compliance Program Assessment Overview of Findings. Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016

Compliance Program Assessment Overview of Findings. Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016 Compliance Program Assessment Overview of Findings Report to the Audit and Risk Committee of the Teachers Retirement Board June 8, 2016 Kaplan & Walker LLP 2 Law firm specializing in counseling organizations

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

THE SEDONA CONFERENCE JUMPSTART OUTLINE : T H E S E D O N A C O N F E R E N C E W O R K I N G G R O U P S E R I E S SM THE SEDONA CONFERENCE JUMPSTART OUTLINE : Questions to Ask Your Client & Your Adversary to Prepare for Preservation, Rule 26

More information

Get more out of technology starting day one. ProDeploy Enterprise Suite

Get more out of technology starting day one. ProDeploy Enterprise Suite Enterprise Suite Get more out of technology starting day one 1 Secure the path to a future-ready data center The landscape faced by IT managers and business leaders today can be daunting to navigate. Continually

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

The Case for Virtualizing Your Oracle Database Deployment

The Case for Virtualizing Your Oracle Database Deployment June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the

More information

Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below.

Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below. Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below. NYSTEC Labor Category Not to Exceed Rates exclusive of travel for NYSTEC FY 2017 Not to Exceed Rates exclusive

More information

BUILT FOR THE STORM. AND THE NORM.

BUILT FOR THE STORM. AND THE NORM. BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration

The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of

More information

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal

More information

Evolution of the ICT Field: New Requirements to Specialists

Evolution of the ICT Field: New Requirements to Specialists Lumen 2/2017 ARTICLE Evolution of the ICT Field: New Requirements to Specialists Vladimir Ryabov, PhD, Principal Lecturer, School of Business and Culture, Lapland UAS Tuomo Lindholm, MBA, Senior Lecturer,

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Certified Business Analysis Professional (CBAP )

Certified Business Analysis Professional (CBAP ) Certified Business Analysis Professional (CBAP ) 3 Days Classroom Training PHILIPPINES :: MALAYSIA :: VIETNAM :: SINGAPORE :: INDIA Content Certified Business Analysis Professional - (CBAP ) Introduction

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 SECURITY AUTOMATION BEST PRACTICES A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 Introduction The best security postures are those that are built

More information

Modern Compute Is The Foundation For Your IT Transformation

Modern Compute Is The Foundation For Your IT Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Helping shape your future

Helping shape your future www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting

More information

Simplifying IT through Virtualization

Simplifying IT through Virtualization E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Microsoft Business Certification Professional Development

Microsoft Business Certification Professional Development Microsoft Business Certification Professional Development Proficiency = Profits Certified employees drive organizational success. Microsoft Business Certification ensures your workforce can deliver. The

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment

IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment Gard Little Chad Huston THIS IDC MARKETSCAPE EXCERPT FEATURES DELL EMC IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

Florida Board of Governors General Office Legislative Budget Request

Florida Board of Governors General Office Legislative Budget Request Florida Board of Governors General Office 2018-2019 Legislative Budget Request Funding of $9.16 million is needed to support the 65 authorized positions and associated operating expense for the Board Office.

More information

Evolve Your Security Operations Strategy To Account For Cloud

Evolve Your Security Operations Strategy To Account For Cloud Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES A Guide to Making Your Security Team Successful with Automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough Nut to Crack

More information

Measuring Your. E-Discovery Program. Against Industry, 2015

Measuring Your. E-Discovery Program. Against Industry, 2015 Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and

More information

Security Automation Best Practices

Security Automation Best Practices WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough

More information

Three Common Techniques for E-Discovery Preservation

Three Common Techniques for E-Discovery Preservation www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...

More information

Achieving & Maintaining E-Discovery Fitness

Achieving & Maintaining E-Discovery Fitness Advice from Fortune 1000 E-Discovery Experts: Achieving & Maintaining E-Discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Advice from Counsel is sponsored by: Introduction Introduction Fitness

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD?

CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? CORPORATE PERFORMANCE IMPROVEMENT DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? DOES CLOUD MEAN THE PRIVATE DATA CENTER IS DEAD? MASS MIGRATION: SHOULD ALL COMPANIES MOVE TO THE CLOUD? Achieving digital

More information

Commercial Catalog & Pricelist. Effective Date: January 1, 2019

Commercial Catalog & Pricelist. Effective Date: January 1, 2019 Commercial Catalog & Pricelist Effective Date: January 1, 2019 TABLE OF CONTENTS Table of Contents... 2 Introduction to Edaptive Computing, Inc.,... 3 Corporate History & Purpose... 3 Principal Officers

More information

CASL Notice. About Allegis Group. Effective Date: January 1, 2017

CASL Notice. About Allegis Group. Effective Date: January 1, 2017 CASL Notice Effective Date: January 1, 2017 Allegis Group, Inc. and its subsidiaries worldwide (collectively, "Allegis Group", or "we", "us" and "our") are committed to compliance with Canada s Anti- Spam

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

CA Services Partner. Implementation Enablement. Eugene Banks FY18

CA Services Partner. Implementation Enablement. Eugene Banks FY18 CA Services Partner Implementation Enablement Eugene Banks FY18 Without partners, CA Services and Education would be unable to scale to meet the growing demands of the business. If our strategy is effective,

More information

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery

More information

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Digital Transformation Drives Distributed Store Networks To The Breaking Point Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority

More information

2017 Trends in Datacenter and Critical Infrastructure

2017 Trends in Datacenter and Critical Infrastructure PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Business Case for Training and Certification

Business Case for Training and Certification Business Case for Training and Certification Jim Shea, CEO, CDI Online LMS Services www.iaop.org What is Professional Certification and who is providing it? Definition of Professional Certification Professional

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report

2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report 2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report page 1 Web Analytics Association 2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report Prepared by the Web

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Certification. Forensic Certification Management Board. Robert J. Garrett, Director

Certification. Forensic Certification Management Board. Robert J. Garrett, Director Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is

More information

Implementing the EMS Education Agenda for the Future: A Systems Approach. A Priority for the NASEMSO

Implementing the EMS Education Agenda for the Future: A Systems Approach. A Priority for the NASEMSO Implementing the EMS Education Agenda for the Future: A Systems Approach A Priority for the NASEMSO Objectives Review the development of the EMS Education Agenda for the Future (EAoF) Identify the elements

More information

Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP.

Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP. 2019 Advance Your Career. Be recognized as an industry leader. Get ahead of the competition. Validate your expertise with CBIP. Get Started Today Be recognized as an industry leader. Distinguishing yourself

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

General introduction to. IP Working Group. China-Italy Chamber of Commerce

General introduction to. IP Working Group. China-Italy Chamber of Commerce General introduction to IP Working Group China-Italy Chamber of Commerce CICC IP Working Group: Coordinator Davide Follador is promoter and current Coordinator of the IPWG. Davide Follador served as commissioned

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

Astrium Accelerates Research and Design with IHS Goldfire

Astrium Accelerates Research and Design with IHS Goldfire CASE STUDY Astrium Accelerates Research and Design with IHS Goldfire Sponsored by: IDC David Schubmehl Dan Vesset May 2014 IDC OPINION The challenges facing workers in most organizations today are immense.

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Uptime and Proactive Support Services

Uptime and Proactive Support Services Uptime and Proactive Support Services We ll accelerate your journey to sustainable IT optimisation and ensure that your technology is delivering all that it can. We ll keep your IT infrastructure up and

More information

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues 1 Managing the Security Function Chapter 11 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Top Management Support Top-Management security awareness briefing (emphasis on brief)

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Facilities Master Plan Toronto Public Library Board Consultation

Facilities Master Plan Toronto Public Library Board Consultation STAFF REPORT INFORMATION ONLY Facilities Master Plan Toronto Public Library Board Consultation Date: May 28, 2018 20. To: From: Toronto Public Library Board City Librarian SUMMARY The purpose of this report

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Effective Cyber Incident Response in Insurance Companies

Effective Cyber Incident Response in Insurance Companies August 2017 Effective Cyber Incident Response in Insurance Companies An article by Raj K. Chaudhary, CRISC, CGEIT; Troy M. La Huis; and Lucas J. Morris, CISSP Audit / Tax / Advisory / Risk / Performance

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information