Membership Video Library

Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type

8/27/2015

(August 13, 2015) Presented by Don Galvez, Esq., Alex Khoury, Esq. and Paul Zimmerman, Esq. via Webinar. In this 60-minute WebEx, our speakers discussed how to prepare your cyber security plan by executing the following: Factors of good retention & deletion policies, Change default credentials and avoid shared credentials, Protecting against social engineering and manipulation and Creating an incident response plan,.


9/3/2015

(September 3, 2015) Presented by Don Galvez, Esq., Alex Khoury, Esq. and Paul Zimmerman, Esq. via Webinar. In this 60-minute WebEx, our speakers discussed: What is Cyber Liability Insurance? How do you find the best Cyber Liability Insurance policy? How should you negotiate sublimits? How do you address coverage gaps? How can you curb risks going forward?


10/29/2015

(October 29, 2015) Presented by Judge Michael Putnam, Paul Zimmerman, Esq. and Melissa Rogozinski, Statewide in Alabama. In this 90-minute CLE, our speakers discuss: Acknowledging the Reality of ESI, Standard for Malpractice, Fear Factors, Competence & Cooperation, Preservation & Privilege.
Authentication



3/14/2014

(March 14, 2014) Presented by Scott Dangler, Esq. and Ben Acuff, Esq. in Tampa, FL. Legal speaks in Latin and IT speaks in Greek; teaching the two to communicate has its inherent challenges, such as lingo, objectives, roles, and responsibilities. This presentation offers tips for success in identifying and interviewing custodians, developing a litigation hold compliance plan, determining the scope of relevant documents, and performing a privilege review…


5/6/2014

(May 6, 2014) Presented by Donna Chesteen, Esq. and Jim Lancaster in Orlando, Florida. BYOD (or Bring Your Own Device), although popular for many reasons, presents challenges and risks. This presentation provides a detailed examination of the most common pitfalls of BYOD, such as: not part of the company network, different types of devices, data breach and security issues, proprietary data on personal devices, data storage, employment issues, data ownership, eDiscovery and forensic issues…


5/9/2014

(May 9, 2014) Presented by Tessa Jacob, Esq. and John Benson, Esq. in Kansas City, MO. An introduction of eDiscovery case management addressing the communication barriers between legal and IT, identifying and interviewing custodians, preparing a legal hold, working with clients on ESI requests, and vendor selection…


ESI Roundtable

Community | Cooperation | CLEs

Contact Us

P.O. Box 1103
Birmingham, Alabama 35201
Phone: (205) 873-1234

On the Web

Follow us!

Simple Follow Buttons