Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
Organizations face mounting challenges when it comes to managing legacy data across outdated platforms while meeting evolving legal and compliance demands. In this two-part webinar based on an actual case study, we’ll explore...more
Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more
Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more
The Executive Committee of the Commercial and Federal Litigation Section of the New York State Bar Association hosted a very special guest speaker at its final meeting of 2024: The Honorable Timothy S. Driscoll from the...more
The data shows a big gap between interest in and adoption of Gen AI. While 85% of legal industry respondents believe Gen AI can be used for legal work, according to the recent Generative AI in Professional Services report...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
What’s in store for the future of AI? That’s the question we set out to answer at a16z’s New York Tech Week....more
In today's data-driven world, effectively managing data not only ensures compliance with numerous privacy laws but also enhances operational efficiency and reduces risk. "Building the Case: Get Buy-In to Minimize Data Across...more
Data, Data, Data. Data. Data. Most business processes today rely on technology, and technology generates data. Email, documents, chats, structured data, logs, etc. – companies are creating an increasing amount of different...more
Keeping up with the volume and velocity of information creation, use, storage, security, and disposition in any organization is a challenging proposition. Period. Partnership, with active collaboration, across...more
Join Canadian Institute at the Canadian Congress on Real-Time Crime Center Operations & Tech Integration to understand the fundamentals of an effective real-time crime center! Network with law enforcement professionals to...more
Interact is BACK and coming to you live this October from the historic French Quarter of New Orleans! Last year’s event may have been named a finalist for Engage Media's 2022 "Best Brand Experience,” but this year, we’re...more
Corporations make game-changing business decisions every single day. In 2021, over 23,500 merger and acquisition deals closed in the EU alone, with another 23,161 deal closures in the US....more
Data migration is a critical process that organizations must undertake for various reasons, such as reducing license costs, adopting new technologies, or consolidating multiple systems during mergers and acquisitions. The...more
According to research by the International Association of Privacy Professionals (IAPP), privacy is growing—but not fast enough. Privacy teams are growing by 12% year-over-year, but many organizations are still struggling to...more
It’s been another interesting year in the world of legal technology, and we here at Hanzo have covered a variety of topics in 2022. Last week, we covered the first 10 of our top 20 ediscovery and compliance blogs. Today we...more
It wasn’t long ago that the phrase digital transformation conjured the image of a large-enterprise corporate luminary delivering a keynote about the technological metamorphosis of their industry. Digitalization of legacy...more
Many of us have a love-hate relationship with data, specifically the complex data generated by modern cloud-based software. On one hand, it’s a necessary part of most organizations’ daily operations, especially for litigators...more
It’s common for eDiscovery professionals to talk about the “additional” use cases – beyond litigation – that have emerged in recent years for eDiscovery technology and workflows. Those use cases include data privacy...more
Recently, NAVEX hosted a webinar featuring Carol Williams, CEO and principal consultant at Strategic Decision Solutions where she discussed best practices on how to assess and mature third-party and IT risk management...more
Purchasing Resources- When I said last time that the first 70+ pages is mostly dedicated to educational resources, that includes resources on the market, a procurement approach that can be used to select vendors and...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more
Ransomware and other cybersecurity attacks have made national headlines during the past 12 months, and public pension systems are as susceptible to these attacks as any other organization. In this episode of Public Pensions &...more