News & Analysis as of

EDRM Cybersecurity

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 159 | Shawn Belovich of HaystackID sits down with Kaylee & Mary

In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more

Epiq

Moving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response

Epiq on

Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

EDRM - Electronic Discovery Reference Model

[Webinar] Top Trends in Corporate Investigations and What to Expect in 2023 - December 15th, 1:00 pm ET

In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more

HaystackID

[Webcast Transcript] Are You a Team Player? Managing Enterprise Messaging Data in eDiscovery

HaystackID on

Editor’s Note: On November 16, 2022, HaystackID shared an educational webcast on the proliferation of enterprise messaging content in the COVID-era, a proliferation accelerated by the pre-existing industry trend of legal...more

HaystackID

[Webcast Transcript] Data Forensic Investigations Exploitation by Concept Searching

HaystackID on

Editor’s Note: On February 16, 2022, HaystackID shared an educational webcast designed to present and explore the foundations of analytics and highlight workflows, methods, and applications that can be leveraged in compliance...more

HaystackID

[Webcast Transcript] Ransomware, Incident Response, and Cyber Discovery: History, Solutions, and AI Workflows

HaystackID on

Editor’s Note: On August 11, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more

Association of Certified E-Discovery...

Weekly Trends Report – 9/18/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 6/5/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 5/29/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 5/22/2019 Insights

Insight into where e-discovery, information governance, cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 5/2/2019

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 4/24/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trend Report – 4/11/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trend Report – 4/3/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trend Report – 3/20/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 2/20/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 2/13/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Bradley Arant Boult Cummings LLP

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide