article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. My conclusion is that CTFs are intrinsically an eSport with the attribute of having a strong educational value. Capture the Flag events, a collective obsession. In the hacking communities, CTF events have always been the practitioner’s favorite. This is true in gaming, and especially true in CTF events. education games serious games

article thumbnail

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

Both events were at South Texas College of Law in downtown Houston. The event was a huge success, with a reported total of 239 attendees (considerably more than last year’s inaugural event). After two years, it may be safe to say that this annual event has already become the most significant eDiscovery conference in the Houston area! We look forward to next year’s event! If so, you absolutely have to attend next year’s event!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

Today is the start of the The Master’s Conference DC event! It’s almost two days of educational sessions covering a wide range of topics! This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. GDPR, blockchain and big data are also significant topics for the event. Click here for more information on remaining scheduled events for the year.

article thumbnail

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

And, it’s time for another The Master’s Conference DC event! It’s almost two days of educational sessions covering a wide range of topics! This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. GDPR, blockchain and big data are also significant topics for the event. Click here for more information on remaining scheduled events for the year.

article thumbnail

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

CloudNine uses RingCentral (which is built on Zoom) and I have noticed a couple of issues dialing into meetings this week, but was able to circumvent them by using computer audio instead. Electronic Discovery Industry Trends

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). In between are concepts about things like storage media, how computers store data, how file types and file formats are identified, different types of metadata, what happens to files when they’re deleted and how they can be recovered, and so forth.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

The Electronic Code of Federal Regulations defines vital records as the essential agency records that are needed to meet operational responsibilities under national security emergencies or other emergency conditions (emergency operating records) or to protect the legal and financial rights of the Government and those affected by Government activities (legal and financial rights records). What would happen to your work in the event of bankruptcy or a change in ownership?

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

On July 3, 2018, plaintiff tendered a document request for, among other things, “surveillance footage, recordings or other video…that refer or relate to any events alleged in Plaintiff’s Complaint.” In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. Case Law Electronic Discovery Preservation Sanctions

article thumbnail

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

as it “targets a British citizen with rehashed allegations about a British company regarding events that occurred in Britain a decade ago.” which was formed in the breakup of HP’s corporate computing divisions from its printer and PC business in 2015) praised the indictment. “HPE Electronic Discovery Ethics Industry Trends

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Court Upholds Decision Not to Compel Plaintiff to Produce Unredacted Narrative of Events : In Kratz v. Case Law Electronic Discovery

article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

Actually, it started yesterday, with a few events, including the Welcome Reception and the Beer and Basics: e-Discovery 101 and Relativity Fundamentals session (serving beer and wine at an education session is OK with me!). Speakers Include: David Horrigan – Discovery Counsel and Legal Education Director, Relativity, Justice Tanya Kennedy , New York Supreme Court – New York County, U.S. Electronic Discovery Industry Trends

article thumbnail

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

After the plaintiff left the vessel, defendants located a computer file supposedly created by the plaintiff, containing text messages, emails, and photographs dated October 2013 to July 2014 that seemed to reflect drug transactions and a volatile relationship, but the plaintiff (in his deposition) denied fighting with his girlfriend and denied punching through the wheelhouse window. Case Law Electronic Discovery Mobile Devices ProportionalityIn Delgado v. Tarabochia, et al.,

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

” The crates and boxes being delivered to his erstwhile office space were mostly computers and other high-priced items ordered from 10 different Office Depot credit cards that also were not in his name.

article thumbnail

Tom O’Connor of the Gulf Coast Legal Technology Center: eDiscovery Trends 2018

eDiscovery Daily

Quite frankly, in those conferences in many cases, you have sessions that are more educational and less advertising. So, a lot of people are choosing to go to Relativity Fest or Ipro’s user conference or forensics conferences or ILTA, which has great educational content. They understand that there’s some computer technology in play. I would try to get them in the fold for this event because they’re getting good attendance.

article thumbnail

The Personnel File: Retention & Best Practices

The Texas Record

Trigger Event. Retention periods are all across the board, and the trigger event (employee termination, end of calendar year, etc.) So how does an RMO reconcile all these different retention periods and trigger events, in a way that makes disposition simple and efficient? Depending on how and where your personnel records are stored, you can choose to group files based on their trigger events (e.g.

article thumbnail

Reporting back from the 2022 ARCHIVES*RECORDS Conference

Archive-It

Many more attended the numerous plenaries, education and incubator sessions, council meetings, mini-theaters, social hours, and so on online. Here are but a few of the innumerable highlights from the three-day event, as witnessed in-person by Julie Rosier (JAR) and online by Tanya Ulmer (TU).

IT 26
article thumbnail

European Data Privacy Day Expert Panel Provides 30-Year Retrospective on UK Data Protection

Hunton Privacy

A panel comprised of the current UK Information Commissioner, Christopher Graham; his three predecessors, Eric Howe CBE, Elizabeth France CBE and Richard Thomas CBE; and the UK Minister of State for Justice, Lord McNally, spoke at the event and provided a retrospective on data protection in the United Kingdom since the Information Commissioner’s Office’s (“ICO’s”) inception in 1984.

article thumbnail

How should you investigate a data breach?

IT Governance

This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. The scene of the incident will generally provide you with the clues you need to work out – or at least make an educated guess regarding – who was responsible for the breach and how it occurred. Digital Guardian recently asked a group of cyber security experts what the most important step is following a data breach.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. This is referred to as “edge computing.”

article thumbnail

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. While the California legislation is one of the first attempts to regulate the use of AI technology, it is deemed to fall short of expectations in two respects: Surprisingly, the legislation does not provide for penalties in the event of an infringement.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

For instance, by educating a customer about how much more money he’s paying for his excessive AC use at peak summer hours, the electric utility can motivate him to reduce use at peak times. Electric utilities in the United States are a major source of CO2 – they created 1.55

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

And now, kids were streaming into their office and getting food education, medical care, my work in Uganda had immediate life changing results right away, Vamosi: You might not think of hackers as charitable people as individuals who might be working to make the world a better place.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Apple founder Steve Wozniak interview, answers your Tweeted questions By Oliver Marks | July 10, 2008, 9:08pm PDT Summary At the San Francisco Social Networking Conference today, Steve Wozniak, Apple co founder and personal computer legend, shared some fascinating insights into the modern world of social networking and mobile phones. What kind of computer and car you have, what kind of skills you have, and that you can look up people nearby that fit a certain profile.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Ollam: The Dutch had sometimes been doing what they called a village tent at Dutch events at a big campground. There's a huge cost and everything going to an ICS village event.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. If you think that your data has been anonymised, according to the computational privacy group at Imperial College, you will be wrong.

GDPR 120
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education.

article thumbnail

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

MAYHEM MOVES TO PRODUCTION WITH THE DEPARTMENT OF DEFENSE

ForAllSecure

As a young professor, I spent 4 weeks every summer visiting these sites as part of the (unremarkably named) Computer Science Study Group , a research program run by DARPA and the Institute for Defense Analysis. I didn’t even have to turn off my electronics during takeoff!

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

And now it was like how can I contribute back to Tibet and put material out and help other people maybe join in the same way I did by not traditional means like, it wasn't really college or anything that got me into electronics. You can see when a chip is actively computing and when it's not.

article thumbnail

OCR and Health Care Industry Cybersecurity Task Force Publish Cybersecurity Materials

Hunton Privacy

lists key steps that an organization must undertake in the event of a cyber attack. The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) and the Health Care Industry Cybersecurity Task Force (the “Task Force”) have published important materials addressing cybersecurity in the health care industry. The OCR checklist , entitled “My entity just experienced a cyber-attack! What do we do now?,”

article thumbnail

What Real Users Love About Their Payroll Department Tools

IGI

Automatic tax payment schedules electronic payments of withheld taxes to the government, helping companies maintain tax compliance. Features: QuickBooks Desktop Pro provides multi-monitor support on up to three computers. I use ADP RUN for payroll processing of two different companies, and it’s intuitive and easy to do what I need to do,” according to an ADP RUN review by an administrator in computer software.

article thumbnail

IDEA 2008: An Interview with Andrew Hinton

ChiefTech

As Event Coordinator for IDEA , I fill a variety of roles, including the Interviewer of IDEA Presenters (which I proudly share with Liz Danzico). Andrew’s blog is Inkblurt and don’t be surprised if you end up engrossed in it and feel as if you are getting a free education! I talked them into getting a computer (a Mac Plus), and buying a database package (something called Double Helix), and letting me build a client accounts system for them.

article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Topics Sony PlayStation 3 , Sony Playstation , Conference , Office 2.0 , Collaboration , Groupware , Game Players , Enterprise Software , Software , Consumer Electronics , Personal Technology , Oliver Marks Blogger Info Oliver Marks Bio Contact Biography Oliver Marks Oliver Marks provides seasoned independent consulting guidance to companies on the effective planning of Enterprise 2.0

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Clearly some proprietary information should be tightly controlled and guarded, and providing satisfactory legal access to events and evidence should be carefully thought through. Direct communication in the USA hasnt been a relationship killer in the USA Think Direct communication lends itself to electronic communication but not necessarily to email.

article thumbnail

Openness | ZDNet

Collaboration 2.0

Although Supernova is a somewhat rarified and idealistic/futurist event, JP’s talk was real world pragmatism - Osmosoft , a BT open source unit, was also represented at the conference and ran a Tiddlywiki community user group later that week at the same venue. The challenges facing Jive’s prospects are well characterized by Sam - locked down, silo’d work methods make it a misery working in a blizzard of electronic paperwork and email.