Remove Conference Remove Education Remove Insurance Remove Presentation
article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Earlier this month I had the honor and privilege of speaking at the MERv conference with Dr. Gregory S. Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders.

article thumbnail

Learnings from ALM/Law.com Legalweek 2024: Six Key Takeaways

eDiscovery Daily

This was not the same old Legalweek, or “LegalTech New York,” as the conference was referred to in years past. present yourself as a gift…and put into energy solving someone’s problem,” he said. We agree with Kassi Burns, who concluded her podcast created post conference with these words: “I hope this painful moment leads to progress.”

CMS 41
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learning from ALM/Law.com Legalweek 2024: Six Key Takeaways

eDiscovery Daily

This was not the same old Legalweek, or “LegalTech New York,” as the conference was referred to in years past. present yourself as a gift…and put into energy solving someone’s problem,” he said. We agree with Kassi Burns, who concluded her podcast created post conference with these words: “I hope this painful moment leads to progress.”

CMS 41
article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

However, basic cybersecurity tools and practices, like patching , strong passwords , and multi-factor authentication (MFA), “can prevent 80 to 90% of cyberattacks,” said Anne Neuberger, deputy national security advisor for cyber and emerging technologies, during a White House press conference in Sept. Cyberattack Statistics.

article thumbnail

Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance

Information Governance Perspectives

In May of 2020 I was honored to speak at the MERv conference with John Frost of Box on the topic of Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance. Below are some excerpts from my transcribed remarks. Some other components here… internal monitoring and auditing.

article thumbnail

Court Grants Defendant’s Motion to Compel Various Records from Plaintiff in “Slip and Fall” Case: eDiscovery Case Law

eDiscovery Daily

In April 2018, the parties met and conferred three times regarding the outstanding releases, as well as the plaintiff’s responses to the defendant’s amended second set of requests for production of documents. 26(b)” and granted the defendant’s request for that information.

Privacy 31
article thumbnail

Gleanings from LegalTech NY

Positively RIM

The conference sessions, despite a penchant for hyperbole, are where the rubber meets the road (to coin a phrase). The presenters/panelists ranged from consultants to practitioners to government experts. F For example, why do my dental and vision insurance work off my social security number? Nuix sponsored it.