Tuesday, March 24, 2015

Form Outline of a Plan for Predictive Coding



 An article from the e-Discovery Team® Blog authored by Subject Matter Expert Ralph Losey, Esq.

http://e-discoveryteam.com/car/form-outline-of-a-plan-for-predictive-coding/

Friday, March 20, 2015

ACEDS Metro New York Panel Event - April 7th, 2015 - Cybersecurity and the Legal Profession

 
 
Registration Link:
http://www.aceds.org/ny-metro-chapter/

ACEDS NY Metro Chapter Event – Cybersecurity
When: April 7, 2015, 6:00PM-8:00PM

Where: Winston and Strawn Office, 200 Park Avenue New York, NY 10166-4193
Cybersecurity:  Can a law firm and/or an e-discovery service provider protect a corporate client’s sensitive data during litigation?

Issues that will be discussed include: protecting a corporate client’s sensitive data when it is the control of a law firm or e-discovery service provider; tips on preventing a cyberattack; required responses when there has been a data breach; data privacy rights when there has been a hacking incident; best practices for ensuring that a data chain of custody is secure and complete; preparing for an increase in demands from corporate clients for improved security protocols by outside counsel firms and litigation support service providers.

This event gives attendees the chance to learn from experts and network with fellow e-discovery colleagues.

The ACEDS NY Metro Chapter is offering a promotional 15% discount on membership to the NY Chapter to anyone who attends the event and joins that day.  Make the check for $165 payable to ACEDS NY Metro and fill out your membership application at the door.

Moderator:
Scott M. Cohen, CEDS
Director of E-Discovery Support Services at Winston & Strawn, he is responsible for all aspects of the firm’s litigation support technology, e-discovery operations and document review center management. Throughout his career, he has worked in a consultative capacity with law firms and corporate legal departments enabling them to effectively leverage technology in all legal practice areas. With a focus on e-discovery, records management, and litigation readiness, he advises firm lawyers and clients on a wide variety of technical issues relating to discovery in complex litigation.


Speakers (More Detailed Bio Provided Below for Each Panel Speaker):
Gary Kibel, Esq.
Gary Kibel is a partner in the Digital Media, Technology & Privacy groups of Davis & Gilbert LLC. Mr. Kibel regularly counsels clients with respect to privacy and data security; new media/advertising law; and information technology matters.


Chase Cunningham
As the threat intelligence lead for FireHost, Dr. Chase Cunningham (CPO USN Ret.) proactively seeks out cyber threat tactics and technical indicators of various threat groups. He is regularly cited as an expert on cyber security and contributes to white papers and other publications. He is also the co-author of The Cynja, a comic designed to educate children about security threats and online best practices.


Dana Post, Esq.
Dana Post serves as Special Counsel, E-Discovery and Data Management at Freshfields Bruckhaus Deringer US LLP in New York. As a member of the firm’s cybersecurity practice, she counsels clients on cybersecurity preparedness and data breach litigation strategy.





Detailed Speaker Bio Information:

Gary Kibel, Esq.:

Gary Kibel is a partner in the Digital Media, Technology & Privacy groups of Davis & Gilbert LLC. Mr. Kibel regularly counsels clients with respect to privacy and data security; new media/advertising law; and information technology matters.

Mr. Kibel is a Certified Information Privacy Professional (CIPP) and advises clients in many industries regarding privacy and data security issues, including, internal information security policies, contractual obligations and requirements, security breaches and incident responses, audits, cross-border data transfers and other matters in connection with an organization's collection, storage and use of data in all aspects of its business. He also co-chairs the International Association of Privacy Professionals' (IAPP) New York City KnowledgeNet group. In addition, Mr. Kibel has been recognized by The Legal 500 U.S. (2012-2014) in the area of privacy and data protection.

Mr. Kibel advises interactive companies, advertising agencies, media providers and other commercial entities regarding transactions for interactive advertising, behavioral advertising, social media, programmatic media buying, mobile marketing, affiliate marketing, data collection and usage, and other emerging products and services. Mr. Kibel counsels both providers of information technology services and customers for such products and services regarding complex technology and intellectual property issues such as software and content licensing, enterprise technology implementations, consulting services, independent contractor relationships, outsourcing and development projects.

Prior to becoming an attorney, Mr. Kibel was an information systems analyst in the Investment Banking Division of Merrill Lynch & Co.


Chase Cunningham:

As the threat intelligence lead for FireHost, Dr. Chase Cunningham (CPO USN Ret.) proactively seeks out cyber threat tactics and technical indicators of various threat groups. He is regularly cited as an expert on cyber security and contributes to white papers and other publications. He is also the co-author of The Cynja, a comic designed to educate children about security threats and online best practices.

Prior to joining FireHost, Cunningham was the chief of cyber analytics for Decisive Analytics Corporation in Arlington, VA, where he acted as the principal lead on several research and development efforts. In this role, he led the authoring of a comprehensive paper on cyber workforce framework implementation that has been adopted by a partner nation as its cornerstone cyber future framework initiative. Cunningham also was the lead computer network exploitation expert for the U.S. Joint Cryptologic Analysis Course in Pensacola, FL. His work was critical in developing the newly founded cyber training curriculum now used by the Department of Defense and different intelligence agencies’ military subcomponents.

Cunningham medically retired from the U.S. Navy in 2011. His time in the military was spent in direct operational support of U.S. Intelligence agency operations abroad. In his last assignments as a chief cryptologic technician, Cunningham managed all research and development of cyber entities to assess threat vectors, network forensics, and methodologies of cyber actors across the intelligence community. Cunningham also acted as the senior cyber/Digital Network Intelligence (DNI) analyst for many new mission threads. He handled all DNI reporting, analytics, coordination, and research. His analysis prompted action from various intelligence community agencies, including Federal Bureau of Investigation, Treasury, Central Intelligence Agency, Defense Intelligence Agency, Office of Naval Intelligence, Transportation Security Administration, Department of Homeland Security, and the National Security Agency.

Chase's Articles








Chase's Blog




Chase's Videos



Dana Post, Esq.:

Dana Post serves as Special Counsel, E-Discovery and Data Management at Freshfields Bruckhaus Deringer US LLP in New York.   As a member of the firm’s cybersecurity practice, she counsels clients on cybersecurity preparedness and data breach litigation strategy.  She is also responsible for counseling global companies on privacy issues arising in cross-border litigations including under the data protection laws in Europe, Asia and Latin America, blocking statutes, and bank secrecy laws.  Finally, Dana advises clients on their e-discovery obligations including the preservation, collection, processing, review, and production of electronic information.    In addition to being a member of The Sedona Conference WG 6, she is a member of the International Association of Privacy Professionals and Women in eDiscovery organization.   She is a frequent lecturer on e-discovery and the data protection laws including at Pace Law School.

Publications:

·         Clapper v. Amnesty’s impact on the harm threshold,” The Privacy Advisor, February 24, 2015.

·         Hong Kong puts restrictions on cross-border transfers: are you compliant?,” The Privacy Advisor, January 27, 2015.

·         The long arm of the EU Data Protection directive,” Computing Magazine, September 29, 2014.

·         Anticipate litigation after data breaches,” Law Technology News, August 26, 2014.

·         Net neutrality, the FCC’s new approach for net neutrality in the US vs. EU and member state regulation,” Computer Law Review International, August 19, 2014.

·         “Discovery, Disclosure, and Data Transfer in Asia: China and Hong Kong,” prepared for 6th Annual Sedona Conference® International Programme On Cross-Border Discovery & Data Protection Laws.

·         Cybersecurity in the boardroom: the new reality for directors,” The Privacy Advisor, May 27, 2014.

·         Plaintiffs alleging only “future harm” following a data breach continue to face a high bar,” The Privacy Advisor, January 28, 2014.



·         “Expert Q&A on Social Media and Employment Litigation: Ethical Considerations for Management Defendants,” PLC Labor & Employment, April 2013.

·         Will computers soon replace your lawyer?” Thomson Reuters, June 5, 2012.

·         Navigating cross-border e-discovery and European privacy laws,” DRI, May 30, 2012.

·         NY Appellate Division continues to press ‘Zubulake’ EDD Standard,” Law Technology News, March 8, 2012.

·         “‘Voom’ Court adopts ‘Zubalake’ Standard for preserving electronic data,” New York Law Journal, March 7, 2012.