Saturday, December 13, 2014
Saturday, December 6, 2014
Empire Discovery to Sponsor 6th Annual Legal Industry Toys For Tots Event
Please join Life Preservers Project and the NYC Chapter of Women In eDiscovery for our annual holiday party.
We ask our guests to donate an unwrapped toy for a child ages birth to 16, as we will be collecting toys during our party for underprivileged children in the tri-state area.
We will be joined by two Marines who will be collecting the toys throughout the evening.
Thank you in advance for your support and we look forward to you joining us as we celebrate the holiday season!
Happy Holidays,
Thank you to our Sponsors:
CLICK HERE TO REGISTER FOR THE EVENT
Wednesday, November 19, 2014
Empire Enhances Client Offerings with RED and TOTAL CONTROL
Empire Discovery is one of the fastest growing eDiscovery and
consulting companies in the United States. We
are proud to present RED - our Relativity
Managed Services Review Product, as well as TOTAL CONTROL - our all-in,
per document pricing:
Law firms and Corporations are constantly
searching for cutting edge technology with a limited budget.
Many are forced to use internal tools that often struggle to
meet their demands.
kCura’s Relativity is an industry
leading application being used by 99 of
the TOP 100 AM
LAW firms. However, the added value of bringing Relativity in-house can
sometimes be overshadowed by the investment necessary in
software, personnel and infrastructure. That is why we created RED.
RED allows you to use Relativity with:
- No long term contract required
- No minimum data requirements
- No Relativity license to buy
- No hardware to buy
- No IT burden
- No staff to hire
All-Inclusive
Per Document Pricing
One of the biggest challenges law firms and corporations face today is how to defensibly reduce the amount of data that must be ultimately reviewed for responsiveness, while at the same time predicting and managing the costs of electronic discovery.
At Empire Discovery, we specialize in
reducing data volume and controlling costs at every step of the discovery
process.
TOTAL CONTROL is an all-inclusive,
per document discovery solution that provides end-to-end discovery and
attorney review for one, low predictable per document price.
- Early Case Assessment
- Data Processing
- Hosting
- Analytics
- Attorney Review
- Productions
CERTIFICATIONS AND SECURITY FOR RED AND TOTAL CONTROL
Tuesday, November 4, 2014
Empire Discovery Launches RED
Relativity Managed Services
Law firms and Corporations are constantly searching for cutting edge technology with a limited budget. Many are forced to use internal tools that often struggle to meet their demands. kCura’s Relativity is an industry leading application being used by 99 of the TOP 100 AM LAW firms.
However, the added value of bringing Relativity in-house can sometimes be overshadowed by the investment necessary in software, personnel and infrastructure. That is why we created RED.
RED allows you to use Relativity with:
- No long term contract required
- No minimum data requirements
- No Relativity license to buy
- No hardware to buy
- No IT burden
- No staff to hire
Wednesday, September 17, 2014
Friday, August 15, 2014
Congratulations to Steve Wallrapp on Achieving Xera Administrator Certification
Administrator Certification, designed to equip administrators with the tools necessary to manage any type of review, is available to individuals employed by a company with an XERA server, or an affiliated partner. The course covers all of XERA’s features, empowering administrators to set up efficient workflows and maximize the user experience. Classes are designed for litigation support analysts, database and project managers, and others who want to learn how to create databases, load data and manage their iCONECT servers.
Wednesday, August 13, 2014
Empire Discovery Opens New York Document Review Center
New York, NY - August 13, 2014 - Empire Discovery, a leading national eDiscovery and consulting company announced today the opening of its Document Review Center in New York City.
Empire will provide document review project management and review teams to law firms and corporate legal departments.
“Our Review Center is designed to streamline the document review process, improve productivity and reduce legal spend in a secure and defensible manner.” says Frank Canterino, CTO & Co-Founding Partner.
The New York Document Review Center is strategically located in Midtown Manhattan, easily accessible to many of our clients and conveniently located to major public transportation.
About Empire Discovery
Empire Discovery is a leading eDiscovery and consulting firm. We have assembled an elite team of professionals focused on providing you with the best solutions to meet the needs of your cases. Our team of experts has more than 50 years of combined litigation support experience. At Empire, we believe superior client service, fast turnaround times, and quality results are what make a difference.
We offer a full life cycle eDiscovery process from Collection, Early Case Assessment, Processing, Hosting, Review and Production we work hand in hand with our clients to determine the best solutions for their needs.
Empire Discovery is headquartered in New York, with regional offices in Washington DC, Philadelphia and Austin, Texas. For more information contact us at info@empirediscovery.com
Empire Discovery is headquartered in New York, with regional offices in Washington DC, Philadelphia and Austin, Texas. For more information contact us at info@empirediscovery.com
Tuesday, August 12, 2014
Empire Discovery Launches TOTAL CONTROL
|
Tuesday, August 5, 2014
Empire Discovery Upgrades to Relativity 8.2
New York, NY- August 5, 2014 - Empire Discovery, a leading national eDiscovery company and Relativity Premium Hosting Partner announced today it has upgraded to kCura’s latest release—Relativity 8.2
"We are very excited to implement the latest Relativity upgrade," says Kevin Karapetian, Director of Hosting and Relativity Certified Administrator, "We look forward to informing our clients regarding the new features and enhancing their workflow."
A few highlights of Relativity 8.2 include:
* Stratified sampling in computer-assisted review, which ensures training sets include a conceptually diverse selection of documents, resulting in fewer training rounds and shorter review times.
* A new, intuitive security settings interface that makes it easy for users to set and understand permissions at a glance, and allows for greater delegation of admin rights,so case teams no longer have to rely on a small pool of system admins to accomplish specific tasks for a project.
* A web version of Relativity Binders that allows users to access searchable PDFs of their most important case documents anywhere, any time, and on any PC, Mac, or tablet.
About Empire Discovery
Empire Discovery is a leading eDiscovery and consulting firm. We have assembled an elite team of professionals focused on providing you with the best solutions to meet the needs of your cases. Our team of experts has more than 100 years of combined litigation support experience. At Empire, we believe superior client service, fast turnaround times, and quality results are what make a difference.
We offer a full life cycle eDiscovery process from Collection, Early Case Assessment, Processing, Hosting, Review and Production we work hand in hand with our clients to determine the best solutions for their needs.
Empire Discovery is headquartered in New York, with regional offices in Washington DC, Philadelphia and Austin, Texas. For more information contact us info@empirediscovery.com
Monday, July 28, 2014
Battle of the Titans Webinar
"Best in Breed vs. End to End"
Tuesday, September 16, 2014 - 1pm ET
Considering an end to end solution or building your custom tool kit?
. Discussion and
definition(s) - "end to end" vs. "best in breed".
. What does it mean to a Firm, Corporation or Service Provider.
. Workflow Comparisons - Can you achieve the same goals with different methodologies?
. How to determine what works best for you.
. What does it mean to a Firm, Corporation or Service Provider.
. Workflow Comparisons - Can you achieve the same goals with different methodologies?
. How to determine what works best for you.
Join us for an interactive panel featuring:
Stephen Dooley | Sr. Manager of Electronic Discovery
and Litigation Support – Sullivan & Cromwell LLP
Frank Canterino | CTO & Co-Founding Partner, Empire
Discovery
Ian Campbell | President & Co-Founder, iCONECT
Development
Christopher Redlich | Litigation Support Manager -
Americas, Allen Overy, LLP
Moderated by:
Alexander Lewis | Senior Manager, iCONECT
Development
*More information to come as we get closer to the event
Sunday, July 27, 2014
Webinar- Fortifying the Corporation and Law Firm Against Cyber Threats: Steps to Establish an Effective and Economic Cybersecurity Regime
1:00 PM - 2:30 PM ET
This program’s has CLE-credit eligibility
Panelists
Frank Krahn –Director of Investigations, Legal Discovery &
Internal Audits, Mayo Clinic
Scott Larson – Principal, Larson Security, Member of Empire
Consulting Group and former Head of the FBI’s Computer Investigations and
Infrastructure Protection Program .
Robert A. Messemer – Chief Security Officer, Nielson
David Zetooney – Partner at Bryan Cave and Leader of the Firm’s
Global Privacy & Security Practice
Stefen Whitwell – Principal, Empirical Solutions, Inc. &
Member of Empire Consulting Group
Moderator
Robert Alan Eisenberg- Director, Empire Consulting Group
About the
event
The Empire Consulting
Group (ECG) – a consortium of experts in eDiscovery and Data Security –
frequently strives to provide guidance and services in areas that are not
sufficiently addressed within both these disciplines.
It is an article of
faith for The Group that it will aggressively seek to shed as much illumination
as we can upon these gaps in knowledge and service.
In this regard, ECG
together with Bloomberg/BNA, is privileged to present a webinar on July 31st 2014
from 1:00 pm to 2:30 pm EST. The program focuses on cybersecurity
in the law firm environment in particular, an area that has not, to date, been
sufficiently addressed. The program also explores data security in a
corporate setting as well.
Our clients, colleagues
and friends can register for this program - Fortifying the Corporation and Law Firm Against Cyber
Threats: Steps to Establish an Effective and Economic Cybersecurity
Regime (click on this link for a program description)
- at a discount of 20% off the standard registration fee. To obtain this
discounted registration, please follow the instructions below:
Single registrant
discount via promo code:
- Navigate
to the registration page for the program on the Bloomberg BNA website:
http://www.bna.com/fortifying-corporation-law-w17179890827/.
- Choose
“Live webinar” from the drop-down menu and add it to the cart. (At
this point, you may be asked to create an account. If so, please be
certain to complete all required fields. If you have an existing
account but have forgotten your password, this link will lead to a place
where a new one can be set: https://profile.bna.com/profile/forgotpw.)
- Type
the promo code LGAUEBR4 into the specified field.
The dollar amount will be decreased by 20 percent, and then click
upon "Proceed to check out" to complete the process. An
automatically-generated email will arrive containing the connectivity
information to be used the day of the program.
Thursday, July 24, 2014
Congratulations to Robert Ryan on Achieving XERA Sales Certification
The iCONECT Certification Program was designed to equip administrators and consultants with the necessary tools to manage any type of review using the XERA document review platform. By covering all of XERA’s features, they empower administrators and consultants to set up efficient workflows and maximize the user experience, helping to solidify XERA as the go-to platform for any review.
Friday, July 18, 2014
The Times are A-Changing for Law Firm CyberSecurity
IN THE REALM OF CYBER SECURITY BREACHES, THE TIMES HAVE BEEN A-CHANGING AND -ESPECIALLY FOR LAW FIRMS - NOT AT ALL FOR THE BETTER.
Article By Scott Larson, CISSP, CISM, CIPP, AME Larson Security, LLC
& Robert Eisenberg, Managing Director, Empire Consulting Group
Before the news-grabbing hype of today’s ”cyber-espionage” Advanced Persistent Threats (APT) and massive, often criminal syndicate-led, credit card data breaches and long before the nefarious activities resulting in recent criminal indictments of Chinese military agents implicated in commercial cyber criminality, the authors began to see large multinationals, that had emerged from massive mergers and acquisitions, together with their prominent outside law firms, becoming cybersecurity targets in the late 1990’s. However, such activities, in those early days of cyber lawlessness, were the exception to the more commonplace network intrusions and theft of intellectual property cases of the time. Credit cards and long distance calling cards have always been a target of criminals, but the more “talented” cybersecurity bad actors of some 15 years ago were harbingers of much worse things to come. Indeed, the cyber pirates who were collecting proprietary data from and eavesdropping upon law firms and corporations were highly sophisticated for that era, although they were – thankfully - few in number. That was then, when one of the co-authors, Scott Larson, supervised the Computer Investigations and Infrastructure Protection Program at the Federal Bureau of Investigation (FBI). Fast forward 15 plus years to today and Scott will tell you that this higher level of sophistication on the part of attackers has become all too common.
And, in fact, unlike that earlier era and given the global reach of the Internet, premier law firms of today have become “Tier One” targets for cybersecurity threats.
It is not that many firms are unschooled in the realm of Electronically Stored Information (ESI). Law firms understand segmentation of data to avoid potential conflicts. Moreover, for many law firms, client engagement databases and systems for “Conflicts Checks” are well established. Unfortunately, the same tools and vigor that are being applied to a firm’s conflicts and engagement management arenas are, frequently, not being utilized for the information security and data protection ecosystem of these same law firms.
Why not?
Naturally enough, law firms have focused their technical personnel and other resources on litigation, conflict management and eDiscovery and many have been successful in these arenas. However, much less focus is being dedicated to what is referred to as the “Security Maturity Model (SMM). On the other hand, clients are becoming increasingly concerned with SMM and at present expect law firms to be as familiar with advanced data security issues, as they are with more “traditional” legal services. In the realm of Regulatory and Reputational Risk,clients are now requiring HIPAA Business Associate (BA) or ISO27002 Information Security Management System (ISMS) audits to meet the needs of their businesses. Also sought is the ability to aid in compliance with Payment Card Industry Data Security Standard (PCIDSS), HIPAA/HITECH Act and the EU Data Protection Act. Also expected is strict compliance
with a growing plethora of contractual obligations compelling outside counsel to assure that all appropriate protective measures are in place.
An additional factor in compelling both clients and law firms to confront a fraught state of reality in the cybersecurity field is the persistence of what is referred to as “The Advanced Persistent Threat” (APT).1 We have seen this threat grow exponentially during the last ten years, well before Google’s public disclosure of Operation Aurora in 20102 made APT a common acronym within the information security lexicon. Law firms, internal patent repositories and other holders of intellectual property are the primary targets of adversaries utilizing APT.
What issues should be primarily addressed and what should be done by a law firm or other organization to meet these potential threats?
To begin with, merely scanning systems for security vulnerabilities on a reactive and intermittent basis is not sufficient. Indeed, vulnerability scanning on an annual or even quarterly basis for external and internal network purposes does not provide proper safeguards. Rather, configuration management, network segmentation (protecting the entity’s “golden eggs”), and network security monitoring within firewalls and switches are essential for mid-to-large size organizations. That is not to say that scanning and perimeter security are unnecessary. It just, frequently, is not good enough. The problem is that the anti-virus software utilized for security (recent studies have revealed that such software detects less than 40% of incidents) and newly developed ”shiny” appliances like log aggregation systems known as Security Incident Event Management (SIEM) Systems are expensive and, what’s worse, the events that are detected are frequently ignored due to a lack of trained personnel or an organization’s information security analyst that has been re-assigned for another priority. Fortunately, however, an organization will need to rely much less upon such costly and occasionally ineffective technology if regularly scheduled network security monitoring and other routinely engaged cyber-investigatory services are deployed.
As mentioned, the appliances that are presently touted are inevitably very costly and some are of questionable efficacy. The new hot security tool of today is an appliance with “intelligent” logical and historical indictors to aid in network defense. These are both almost prohibitively expensive and may have a limited useful life. Rather, it is suggested that an organization start small, but systematically, in securing its cybersecurity environment; get a “health check” first, before the organization invests in any “heavy machinery”. First, look to leverage the systems and personnel already in place with a “doctor” who makes house calls to your office.
Moreover, hire trusted individuals to access and review an organization’s data. One should be cautious of the Big Data enterprises who claim to have every solution for an organization’s cybersecurity needs. Seek a smaller, , adaptive, well-trained group with a multi-discipline range to advise you for whatever.
1 Advanced Persistent Threat (APT) is a set of clandestine and continuous computer hacking assaults, targeting a specific entity. APT usually targets organizations and nations for business and political motives. APT processes require a high degree of covertness over an extended period of time and often turn the victims IT infrastructure into a digital espionage collection station that “phones home” via a covert data channel(s).
22 Operation Aurora was a cyber-attack conducted by advanced persistent threat actors originating from, in or near Beijing, China and believed to be affiliated with the Chinese military. The recent indictment of five Chinese military hackers by a grand jury on May 19, 2014 in western Pennsylvania (USDC, W. Penn., Criminal No. 14-118) underscores the prevalence and severity of the threat.
comes your way. The group you select should help find solutions whether internally or by leveraging outside resources.
Finally, develop a plan to conduct a Security Gap Analysis for the law firm before an incident occurs or a major client determines your security does not measure up to your competition.
Article By Scott Larson, CISSP, CISM, CIPP, AME Larson Security, LLC
& Robert Eisenberg, Managing Director, Empire Consulting Group
Before the news-grabbing hype of today’s ”cyber-espionage” Advanced Persistent Threats (APT) and massive, often criminal syndicate-led, credit card data breaches and long before the nefarious activities resulting in recent criminal indictments of Chinese military agents implicated in commercial cyber criminality, the authors began to see large multinationals, that had emerged from massive mergers and acquisitions, together with their prominent outside law firms, becoming cybersecurity targets in the late 1990’s. However, such activities, in those early days of cyber lawlessness, were the exception to the more commonplace network intrusions and theft of intellectual property cases of the time. Credit cards and long distance calling cards have always been a target of criminals, but the more “talented” cybersecurity bad actors of some 15 years ago were harbingers of much worse things to come. Indeed, the cyber pirates who were collecting proprietary data from and eavesdropping upon law firms and corporations were highly sophisticated for that era, although they were – thankfully - few in number. That was then, when one of the co-authors, Scott Larson, supervised the Computer Investigations and Infrastructure Protection Program at the Federal Bureau of Investigation (FBI). Fast forward 15 plus years to today and Scott will tell you that this higher level of sophistication on the part of attackers has become all too common.
And, in fact, unlike that earlier era and given the global reach of the Internet, premier law firms of today have become “Tier One” targets for cybersecurity threats.
It is not that many firms are unschooled in the realm of Electronically Stored Information (ESI). Law firms understand segmentation of data to avoid potential conflicts. Moreover, for many law firms, client engagement databases and systems for “Conflicts Checks” are well established. Unfortunately, the same tools and vigor that are being applied to a firm’s conflicts and engagement management arenas are, frequently, not being utilized for the information security and data protection ecosystem of these same law firms.
Why not?
Naturally enough, law firms have focused their technical personnel and other resources on litigation, conflict management and eDiscovery and many have been successful in these arenas. However, much less focus is being dedicated to what is referred to as the “Security Maturity Model (SMM). On the other hand, clients are becoming increasingly concerned with SMM and at present expect law firms to be as familiar with advanced data security issues, as they are with more “traditional” legal services. In the realm of Regulatory and Reputational Risk,clients are now requiring HIPAA Business Associate (BA) or ISO27002 Information Security Management System (ISMS) audits to meet the needs of their businesses. Also sought is the ability to aid in compliance with Payment Card Industry Data Security Standard (PCIDSS), HIPAA/HITECH Act and the EU Data Protection Act. Also expected is strict compliance
with a growing plethora of contractual obligations compelling outside counsel to assure that all appropriate protective measures are in place.
An additional factor in compelling both clients and law firms to confront a fraught state of reality in the cybersecurity field is the persistence of what is referred to as “The Advanced Persistent Threat” (APT).1 We have seen this threat grow exponentially during the last ten years, well before Google’s public disclosure of Operation Aurora in 20102 made APT a common acronym within the information security lexicon. Law firms, internal patent repositories and other holders of intellectual property are the primary targets of adversaries utilizing APT.
What issues should be primarily addressed and what should be done by a law firm or other organization to meet these potential threats?
To begin with, merely scanning systems for security vulnerabilities on a reactive and intermittent basis is not sufficient. Indeed, vulnerability scanning on an annual or even quarterly basis for external and internal network purposes does not provide proper safeguards. Rather, configuration management, network segmentation (protecting the entity’s “golden eggs”), and network security monitoring within firewalls and switches are essential for mid-to-large size organizations. That is not to say that scanning and perimeter security are unnecessary. It just, frequently, is not good enough. The problem is that the anti-virus software utilized for security (recent studies have revealed that such software detects less than 40% of incidents) and newly developed ”shiny” appliances like log aggregation systems known as Security Incident Event Management (SIEM) Systems are expensive and, what’s worse, the events that are detected are frequently ignored due to a lack of trained personnel or an organization’s information security analyst that has been re-assigned for another priority. Fortunately, however, an organization will need to rely much less upon such costly and occasionally ineffective technology if regularly scheduled network security monitoring and other routinely engaged cyber-investigatory services are deployed.
As mentioned, the appliances that are presently touted are inevitably very costly and some are of questionable efficacy. The new hot security tool of today is an appliance with “intelligent” logical and historical indictors to aid in network defense. These are both almost prohibitively expensive and may have a limited useful life. Rather, it is suggested that an organization start small, but systematically, in securing its cybersecurity environment; get a “health check” first, before the organization invests in any “heavy machinery”. First, look to leverage the systems and personnel already in place with a “doctor” who makes house calls to your office.
Moreover, hire trusted individuals to access and review an organization’s data. One should be cautious of the Big Data enterprises who claim to have every solution for an organization’s cybersecurity needs. Seek a smaller, , adaptive, well-trained group with a multi-discipline range to advise you for whatever.
1 Advanced Persistent Threat (APT) is a set of clandestine and continuous computer hacking assaults, targeting a specific entity. APT usually targets organizations and nations for business and political motives. APT processes require a high degree of covertness over an extended period of time and often turn the victims IT infrastructure into a digital espionage collection station that “phones home” via a covert data channel(s).
22 Operation Aurora was a cyber-attack conducted by advanced persistent threat actors originating from, in or near Beijing, China and believed to be affiliated with the Chinese military. The recent indictment of five Chinese military hackers by a grand jury on May 19, 2014 in western Pennsylvania (USDC, W. Penn., Criminal No. 14-118) underscores the prevalence and severity of the threat.
comes your way. The group you select should help find solutions whether internally or by leveraging outside resources.
Finally, develop a plan to conduct a Security Gap Analysis for the law firm before an incident occurs or a major client determines your security does not measure up to your competition.
Tuesday, July 15, 2014
Empire Consulting Group & Bloomberg/BNA Webinar July 31st 1:00 pm to 2:30 pm EST.
The Empire Consulting Group (ECG) – a consortium of experts
in eDiscovery and Data Security – frequently strives to provide guidance and
services in areas that are not sufficiently addressed within both these
disciplines.
It is an article of faith for The Group that it will
aggressively seek to shed as much illumination as we can upon these gaps in
knowledge and service.
In this regard, ECG together with Bloomberg/BNA, is
privileged to present a webinar on July 31st 2014 from 1:00 pm to
2:30 pm EST. The program focuses on
cybersecurity in the law firm environment in particular, an area that has not,
to date, been sufficiently addressed.
The program also explores data security in a corporate setting as well.
Our clients, colleagues and friends can register for this
program - Fortifying
the Corporation and Law Firm Against Cyber Threats: Steps to Establish an
Effective and Economic Cybersecurity Regime (click on this link for a program description)
- at a discount of 20% off the standard registration fee. To obtain this discounted registration,
please follow the instructions below:
Single registrant discount via promo code:
- Navigate to the registration
page for the program on the Bloomberg BNA website: http://www.bna.com/fortifying-corporation-law-w17179890827/.
- Choose “Live webinar”
from the drop-down menu and add it to the cart. (At this point, you
may be asked to create an account. If so, please be certain to
complete all required fields. If you have an existing account but
have forgotten your password, this link will lead to a place where a new one
can be set: https://profile.bna.com/profile/forgotpw.)
- Type the promo code LGAUEBR4
into the specified field. The dollar amount will be decreased by
20 percent, and then click upon "Proceed to check out" to
complete the process. An automatically-generated email will arrive
containing the connectivity information to be used the day of the program.
Monday, July 14, 2014
Congratulations to the Empire Team on Achieving iCONECT Xera Accreditation
Empire Discovery is proud to announce it has received multiple iCONECT Certifications:
Kevin Karapetian - XERA Certified Administrator
Frank Canterino - XERA Sales Certified
The iCONECT Certification Program was designed to equip administrators and consultants with the necessary tools to manage any type of review using the XERA document review platform. By covering all of XERA’s features, they empower administrators and consultants to set up efficient workflows and maximize the user experience, helping to solidify XERA as the go-to platform for any review.
Friday, July 4, 2014
Spanning the Globe - A look at eDiscovery on Four Continents
A free webinar featuring a panel of eDiscovery experts from all over the world. Coming this summer! Stay tuned for more details.
Thursday, June 26, 2014
Watch our Webinar- Back to the Future with ECA
Today, ECA is integrated into platforms that support the whole case life cycle. What exactly does that mean and what is the problem with ECA within the traditional, linear, multi-tool approach?
Moderated by:
Robert Eisenberg – Director, Empire Discovery & Founding Chair of Georgetown Law’s Advanced E-Discovery Institute
Robert Eisenberg – Director, Empire Discovery & Founding Chair of Georgetown Law’s Advanced E-Discovery Institute
Panelists:
Christopher Redlich – Litigation Support Manager- Americas, Allen Overy LLP
Frank Canterino – Chief Technology Officer & Co-Founding Partner, Empire Discovery
Jo Sherman – Chief Executive Officer & Founder, EDT
Manuel Almonte – E-Discovery Project Manager, Greenberg Traurig LLP
David Lapresi – E-Discovery & Litigation Support Manager, Phillips Lytle LLP.
Christopher Redlich – Litigation Support Manager- Americas, Allen Overy LLP
Frank Canterino – Chief Technology Officer & Co-Founding Partner, Empire Discovery
Jo Sherman – Chief Executive Officer & Founder, EDT
Manuel Almonte – E-Discovery Project Manager, Greenberg Traurig LLP
David Lapresi – E-Discovery & Litigation Support Manager, Phillips Lytle LLP.
Tuesday, June 24, 2014
Free Early Case Assessment Webinar - Wednesday, June 25th at 12:00 PM
Can you save more with early case assessment?
We're talking about new approaches law firms and corporations are taking this
Wed. Join us!
Moderated by:
Robert Eisenberg - Director, Empire Discovery & Founding Chair of Georgetown Law's Advanced E-Discovery Institute
Panelists:
Christopher
Redlich - Litigation Support Manager- Americas, Allen Overy LLP
Frank
Canterino - Chief Technology Officer & Co-Founding Partner, Empire Discovery
Jo
Sherman - Chief Executive Officer & Founder, EDT
Manuel
Almonte - E-Discovery Project Manager, Greenberg Traurig LLP
David
Lapresi - E-Discovery & Litigation Support Manager, Phillips Lytle
REGISTER HERE
Subscribe to:
Posts (Atom)