Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
Managing Large Scale Review Efficiency: Tips From a GC
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Using Technology in the Courtroom
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
Systems And The Emergence Of AI In Law Practice | Ernie Svenson | Texas Appellate Law Podcast
What Does Artificial Intelligence Mean for Ediscovery Jobs? | Eye on ESI: A.I. Edition
Review Analytics for a New Era
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more
In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more
In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more
Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more
Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more
A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more
Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more
From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more
What the heck is a “SWOT” analysis? And, why do you need one? A “SWOT” analysis is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats associated with an organization or a...more
Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more
A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more
Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more