BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
|
|
|
- Brett Griffith
- 10 years ago
- Views:
Transcription
1 BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013
2 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2
3 Michael Barba Managing Director, CISSP, GSNA, DFCP, EnCE, CPP Direct: Mobile: Park Avenue New York, NY Tel: Fax: EXPERIENCE SUMMARY Managing Director, BDO USA LLP Computer Forensics and Electronic Discovery Practice Over 15 Years IT Security, Investigations, Computer Forensics, and Electronic Discovery Engagements Employee Code of Conduct Investigations Intrusion Investigations Theft of Intellectual Property A Recipient of the High Technology Criminal Investigation Association Case of the Year Award Member Digital Forensic Certification Board (DFCB.org) Thirteen Years of Physical Security Managing security staff of 30 people Loan Office Defalcation Investigations Employee Code of Conduct Investigations Executive Protection Planning Page 3
4 LITIGATION & FRAUD INVESTIGATIONS Retained by Law Firms Retained by Public and Private Companies Retained by Insurance Companies Retained by Government Agencies Page 4
5 BDO CONSULTING S FORENSIC TECHNOLOGY SERVICES
6 FORENSIC TECHNOLOGY SERVICES On-Site Lab Dedicated and Secure Access and climate controlled Sophisticated and diverse tools E-discovery platform hosting capabilities State-of-the-art Scalable Page 6
7 Forensic Technology Services Computer Forensics Collection & Preservation Analyzing individuals conduct Including deletion activity, file copying, Internet browsing and wiping/secure deletion activity. Data Recovery Search live and deleted files, unallocated space and slack space, based on keywords and/or concepts and recovery. Identify known system and user files, as well as duplicate files and threads, to limit and expedite document review. Password Cracking and/or Bypassing Identify password protected and encrypted files as well as process to view content. Online investigations Social Media Threads/Tracking and Identification BDO CONSULTING, Consulting Forensic Litigation Technology & Fraud Services Investigation Services Page 7
8 Introduction Electronic Discovery Reference Model (EDRM) Volume Relevance Source: Socha Consulting and Gelbmann & Associates
9 Forensic Technology Services E-Discovery Electronically Stored Information ( ESI ) Protocol & Policies Rule 26(f), meet & confer conferences Strategy development Identification, preservation & collection Data culling (Date Filter, Search Terms, Computer Assisted Review) Data processing (Indexing, Error Correction ) Review & production Multinational, multilingual reviews 30(b)(6) fact witnesses Page 9
10 FORENSIC TECHNOLOGY SERVICES Computer Forensics & E-Discovery Identify Filter Search Review Smoking Gun Page 10
11 Forensic Technology Services Data Analytics Extract data from various systems Evaluate data quality and standardization Verify data accuracy Identify and report data anomalies Identify deviations in data patterns Organize and summarize data sets Tools & ERP Systems ACL Access AS400 Dynamics IDEA JD Edwards Oracle PeopleSoft SAP SQL Server Tableau Excel (vlookup/stats/modeling/auto mated formula review) COMPLEX DATA SETS DISPARATE DATA LARGE DATA SETS Page 11
12 FORENSIC TECHNOLOGY SERVICES Need for Computer Forensic Services Clients faced with litigation or internal issues When there is fraud detected at your client When there are allegations of fraud raised in the audit When you hear of a litigation proceeding with a large discovery component When there is a product liability class action involving consumer products When there may be a time & expense or wage & hour investigation/class action Audit clients Day to day needs When your client has: - a large volume of data - a complex dataset - disparate data Tax clients Day to day needs When you need assistance automating and analyzing large data sets Page 12
13 Current Trends: Social Media
14 CHALLENGES OF SOCIAL MEDIA Number of Accessible Computing of each individual 2010: Average of five (5) devices per person 2013: Estimation of seven (7) devices per person YouTube Fun Fact More Video was uploaded to YouTube in the past two months than if ABC, CBS, and NBC had been airing new content 24/7/365: Since 1948 Power of the Subpoena Law enforcement requests Social media sites retention policies Preservation requests what to request? Page 14
15 SOCIAL MEDIA PRESERVATION BEST PRACTICES Computing Devices (Computers, Tablets, Smart Phones) Forensic preservation of devices Proper hardware (write blockers) Proper software Training in analysis where to look and rebuilding Chain of custody physical and documentation Preservation of collected data Social Media Websites Preservation requests user and account details Subpoenas Preservation of received data Chain of custody Page 15
16 Current Trends: DATA FLOW
17 UNDERSTANDING DATA FLOW ANALYSIS Logical flow of data (enterprise, 3rd-party web-based) Instant messaging (enterprise, 3rd-party web-based) File and Print servers Phone Systems VoIP Computer Hardware External storage media (USB drives) Vendor/Cloud-hosted data Onsite, offsite, and online backup Social Media Peer-to-peer file sharing Page 17
18 CHALLENGE OF DATA MAPPING & FLOW ANALYSIS Paper Records Physical, tangible Limited locations Easier to destroy Electronic Records Virtual, intangible, dynamic Exponential growth in data volume Numerous locations Difficult to delete Metadata 2.5 terabytes of data is equivalent to approximately 146 million pages of MS Word Documents OR 58,000 Banker boxes of paper documents Page 18
19 CHALLENGE OF DATA MAPPING & FLOW ANALYSIS Continued What is Metadata? Data about data What kind of information can you get? Creation/modification date Last print date Hidden text Hidden cells Author s name Saved history And much more Page 19
20 POLICIES & RETENTION ISSUES
21 POLICIES AND RETENTION ISSUES Industry Regulatory obligations Organizational culture Business needs Risk tolerance TECHNICAL CONSIDERATIONS Local archives Hosted or enterprise solutions Functional requirements Non-functional requirements MATURITY MODEL APPROACH Understand your technology infrastructure Define the various stages within the maturity model that is applicable to your industry, organization, business needs, risk tolerance, and regulatory obligations Develop an retention policy and implement technologies that are practical and compatible with the policy Regularly re-visit and update the model as business regulations and technologies evolve Expectation of Privacy?? Page 21
22 Current Trends: RECORDS RETENTION
23 RECORDS RETENTION BEST PRACTICES Determine retention policy Many policies are OK 60 day delete Keep everything Rigorous records management Prepare process for legal holds Determine process Use technology Map out data sources Where is it and in what format TRIGGERING EVENTS Lawsuit Subpoena Preservation letter Regulatory investigation letter Reasonable Anticipation of litigation Threat of litigation Employee storms out in a huff Etc. Page 23
24 EFFECTIVE RECORDS RETENTION POLICY Establish Goals Management supported Teaming with IT, HR, and Legal Conduct a current inventory of records maintained both electronically and hardcopy Assign retention periods Include a Litigation hold period Include a destruction procedure Review the policy annually and monitor for compliance Page 24
25 PRESERVATION BEST PRACTICES Identify Key Players Select relevant date range Take preservation steps Communicate preservation obligations - OR - Use technology to take users out of the loop Immediate obligation Use data map Page 25
26 CONCLUSION BDO CONSULTING, Litigation & Fraud Investigation Services Page 26
27 ABOUT BDO CONSULTING BDO Consulting, a division of BDO USA, LLP, provides investigation, litigation, business restructuring, valuation, and risk advisory services to clients in the United States and internationally. Our highly experienced and well-credentialed professionals leverage the global industry and accounting knowledge of the BDO international network, providing rapid, strategic advice to assist our clients. To ensure compliance with Treasury Department regulations, we wish to inform you that any tax advice that may be contained in this communication (including any attachments) is not intended or written to be used, and cannot be used, for the purpose of (i) avoiding tax-related penalties under the Internal Revenue Code or applicable state or local tax or (ii) promoting, marketing or recommending to another party any tax-related matters addressed herein. Material discussed in this publication is meant to provide general information and should not be acted on without professional advice tailored to your individual needs BDO USA, LLP. All rights reserved.
Organizations today are faced with an CORPORATE COUNSEL PROVIDE AN INSIDE LOOK AT THE STATE OF E-DISCOVERY EXECUTIVE REPORT
2014 www.bdo.com EXECUTIVE REPORT CORPORATE COUNSEL PROVIDE AN INSIDE LOOK AT THE STATE OF E-DISCOVERY Survey Finds E-Discovery Effectiveness Requires Significant Improvement, While Scope and Total Cost
e-discovery Forensic Services kpmg.ch Advisory
e-discovery Advisory Forensic Services kpmg.ch e-discovery You or your client are involved in a dispute, investigation, regulatory or internal review. You need to review evidence and may need to disclose
From Chaos to Clarity.
LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Deloitte Discovery Caribbean & Bermuda Territory Guide
Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Overview The complexity and volume of data in today s corporate climate means businesses in the Caribbean & Bermuda Countries (
Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation
Records Retention & E-Discovery Preserving Electronically Stored Information for Litigation Introduction Increasingly, data is created, sent, received, and stored electronically. In fact, 89 billion business
www.istdiscover-e.com
www.istdiscover-e.com who is IST? IST ediscovery provides a full range of on-site litigation support and off-site ediscovery services that will take you from Early Case Assessment (ECA) through hosted
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
E-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
ILM et Archivage Les solutions IBM
Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance
Miguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
Are Mailboxes Enough?
Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day
ediscovery Solutions
The Radicati Group, Inc. www.radicati.com ediscovery Solutions A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright November 2010, Reproduction Prohibited 9:30 am, PT November 4, 2010
Guide to advanced ediscovery solutions
RCLS Services & Technology Guide to advanced ediscovery solutions Océ Business Services Records, Compliance and Legal Solutions Products and Services Océ Business Services has earned the reputation as
Records and Information Management and Retention
Records and Information Management and Retention Association of Corporate Counsel Nonprofit Organizations Committee Legal Quick Hit March 13, 2012 3 pm ET W. Warren Hamel Venable LLP 750 E. Pratt St. Baltimore,
Electronic Discovery
Electronic Discovery L. Amy Blum, Esq. UCLA University of California, Los Angeles 1 Topics Not Covered Best practices for E-mail E use and retention in the ordinary course of business Records Disposition
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our
Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.
TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery
What You Should Know About ediscovery
KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the
IBM ediscovery Identification and Collection
IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data
Electronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics [email protected] 410-659-3473 Table of Contents Page 1 Electronic
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
CA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Symantec Enterprise Vault E-Discovery Connectors
Symantec Enterprise Vault E-Discovery Connectors Extending chain of custody beyond Enterprise Vault Discovery Accelerator Overview Symantec Enterprise Vault Discovery Accelerator extends the basic search
Director, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
KPMG Forensic Technology Services
KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production
Financial discovery and beyond using BMMsoft EDMT Solution
Financial discovery and beyond using BMMsoft EDMT Solution USE CASE STUDY The industry is a litigation-intensive sector, so the timely iden ation of relevant business records is an imperative. This is
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
What Am I Looking At? Andy Kass
Concordance Tip Sheet August 2013 What Am I Looking At? Andy Kass Discovery is the process of requesting, producing and gleaning documents to substantiate assertions of fact in a case. Review is a deep,
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
ediscovery: The New Information Management Battleground Developments in the Law and Best Practices
Sponsored by ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Kahn Consulting Inc. (847) 266-0722 [email protected] Introduction The following
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
E-Discovery Technology Considerations
E-Discovery Technology Considerations Presented by: Dave Howard Oregon Department of Justice Deputy CIO Topics E-Discovery Process Overview Sources of Electronically Stored Information (ESI) Data Maps
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)
CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation
Best Practices in Electronic Record Retention
I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.
E- Discovery in Criminal Law
E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER
FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER Introduction Microsoft Office 365 is a new powerful office productivity solution that replaces multiple on premise
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Digital Forensics Services
Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together
Understanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
Predictability in E-Discovery
Predictability in E-Discovery Presented by: John G. Roman, Jr. National Manager, Practice Group Technology Services Nixon Peabody LLP Tom Barce Assistant Director of Practice Support Fulbright & Jaworski
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street
Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007
Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential
Solving Key Management Problems in Lotus Notes/Domino Environments
Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products
AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
capabilities statement
capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
Agenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Forensics & E-Discovery. Presented by the ASIS Information Technology Security Council
Forensics & E-Discovery Presented by the ASIS Information Technology Security Council 1 The Information Technology Security Council and its partners deliver a forum to enhance effectiveness and productivity
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover
: Discovering What There Is to Discover One of the challenges in electronic discovery is identifying the various sources of electronically stored information (ESI) that could potentially be relevant to
The Clearwell ediscovery Platform
The Clearwell ediscovery Platform Delivering Intelligent ediscovery Clearwell has been instrumental in helping us manage our in-house ediscovery practice, saving NBC Universal valuable resources in people
Meeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
SMART ARCHIVING. The need for a strategy around archiving. Peter Van Camp
SMART ARCHIVING The need for a strategy around archiving Peter Van Camp I.R.I.S. mission I.R.I.S. mission : Increase our customers productivity and knowledge through helping them better manage their documents,
Exchange Server 2010 & C2C ArchiveOne A Feature Comparison for Email Archiving
Email Archiving is critical for performance of storage, disaster recovery, compliance, litigation support and business continuity. While Exchange 2010 offers basic Email Archiving, an enhanced solution
ORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
