Conference Schedule

New York 2013

January 29, 2013 ET and SS

Select your agenda view:
At-a-Glance Timeline

Emerging Technology


Information Governance: Reduce the Pain of Your Next Case

By the time a summons arrives, it's usually too late to fix the hidden risks and problems in your data. But there will always be a next time, so it pays to prepare. Learn how your organization can use advanced information governance technology to reduce the pain of eDiscovery and take proactive steps to avoid the difficulties of previous litigation experiences.


  • Barclay Blair, President & Founder, ViaLumina and co-author of "Information Nation"


  • Duke Alden, JD, Vice President, Global Information Governance, Aon
  • Bob Lewis, Director Cyber Forensics & Investigations, Barclays
  • Stephen Stewart, Chief Technology Officer at Nuix


Hacked! Cyber-Threats to Lawyers, Law Firms and their Clients

Join Alon Israely, Esq., CISSP and Lawrence Husick, Esq., for this riveting presentation. Recent incidents in which lawyers and law firms have been the target of hacking by foreign agents have highlighted risks that clients face when they entrust their information to their outside counsel. Legal Week reports that 1 in 5 law firms have suffered a cyber attack in the past 12 months. This may be the most important event you attend this year!

As ethics meet data security, corporations have become more aware of threats to data security, and have installed systems and implemented procedures to safeguard their information, "black hat" hackers have looked for new, softer targets from which to steal. Their newest victims are the lawyers who represent corporate and private clients, and their firms. Legal organizations have been slow to implement data security, in part because many law firms run "lean" on information technology support, and because security systems and procedures are often expensive, cumbersome, and inconvenient for the individual attorney.

Lawyers and law firms can no longer afford the luxury of sloppy data security. Firm systems have been targeted by those seeking business advantage and by foreign organizations with broader intelligence and policy goals. The lines defining cyber-crime, cyber-espionage, cyber-terrorism and cyber-war have been erased.

Attend this fast-paced and up-to-the-minute seminar to learn about the threats facing the legal profession, and what both individual attorneys and their organizations must do to safeguard client information in a world of thieves, hackers, and cyber-anarchists. This session is eligible for 1 ethics credit

List of some of the topics:

  • Threats facing the legal profession
  • What individual attorneys and organizations MUST do to safeguard client information
  • Duties and obligations of individual attorneys and organizations to safeguard data


  • Alon Israely, Esq., CISSP
    Co-Found Business Intelligence Associates
  • Lawrence Husick, Esq.
  • Co-Chairman of the Foreign Policy Research Institute's Center for the Study of Terrorism


Social business is booming: Are you really prepared for eDiscovery?

The business world is swimming in real-time communications options. You need to manage a new wave of communications tools that revolve around social media, collaboration, and enterprise social software, while still meeting all your legal, regulatory, and corporate requirements. Find out how Actiance can help you mitigate your legal risk without blowing your IT costs out of the water.


  • Norvin Leong,
    Director of Product Marketing
    Actiance, Inc.


Acknowledging and Embracing Industry Trends

The legal industry is filled with buzz words – consumerization, bring your own device, commoditization, and post-PC-era. Effective IT management is complicated, and Lenovo and CDW understand your challenges. For those struggling with security concerns, standardization and mobility, we have no-compromise solutions for you. Come find out how Lenovo and CDW can help you solve your biggest IT dilemmas.


  • Jim Harris
    Small Business Channel Account Manager


Balancing security and ease of use in the cloud

Law firms must transfer large files, but antiquated methods like fax and FTP are inefficient. Consumer-grade file transfer and storage can be a nightmare from a data security perspective. Join us to learn how you can find the middle ground, where the firm can benefit from new solutions while maintaining total control.

Super Sessions

SS1: Symantec - Full Day

Protecting Your ESI Blindside: Why a “Defensible Deletion” Offense is the Best eDiscovery Defense

Organizations are constantly struggling to contain the blitz of ESI assaulting their infrastructure. The headlines are filled with stories of companies being thrown for a loss by jury verdicts, court judgments and eDiscovery sanctions because they failed to reduce their data stockpiles. Given this backdrop, can an offensive strategy of “defensible deletion” realistically protect the ESI “blindside” of organizations?

Our panel of experts will provide a variety of perspectives on the issues and will debate whether companies should in fact dedicate the resources required for offensive, yet defensible, deletion of ESI. The discussion points will include:

  • Whether defensible deletion is a workable strategy or is it simply unrealistic given the sometimes impracticable expectation of cooperative teamwork across the enterprise
  • Whether the judiciary cares about defensible deletion and how recent court cases cut for or against implementing such a strategy
  • Is there measurable ROI in defensible deletion to justify acquisition of technologies needed to support such a strategy?


  • Philip Favro, Esq.,
    Discovery Counsel,
    Symantec Corp.


  • Magistrate Judge Paul Singh Grewal,
    Northern District of California
  • Anne KershawAnne E. Kershaw, Esq.,
    A.Kershaw, PC // Attorneys & Consultants
  • Eric Lieber,
    Director of Legal Technology,
    Toyota Motor Sales
10:30- 11:45  eDiscovery in 3D: The New Generation of Early Case Assessment Techniques

Early Case Assessment technologies and the benefits they bring for lawyers are innumerable. This is true with regard to locating relevant documents, scoping out key custodians for legal hold and data collection, discerning applicable date ranges and executing a cost projection for the litigation. Traditional ECA capabilities are on the move as information governance technologies establish a stronger foothold in organizations and as technology enables lawyers to do more upfront.

In this session you will see Discovery-in-3D as we demonstrate different ways to successfully approach ECA in the context of information governance. Learn how to enhance the way your organization can control and leverage information that is crucial to a case. Reducing risk, obtaining key documents in new ways, and integrating classification and data loss prevention across the information lifecycle are ways ECA continues to innovate and defensibly add value for litigators. 

We will explore how classification and data loss prevention: 

  • Enable organizations to proactively decide what information should or should not reside in the archive upfront, reducing storage and downstream eDiscovery cost
  • Improve the legal hold universe with more granularity
  • Operate across the Information Governance workflow and enable more efficient eDiscovery 


  • Allison Walton, Esq.,
    Discovery Counsel,
    Symantec Corp


  • Charlie Balot,
    Online Security
  • Susan Nickle, Esq.,
     Wortzman Nickle Professional Corporation
  • Benjamin Wright Esq.
    Policy Counsel for Messaging Architects

12:30-1:45 Back to “eDiscovery Basics” with the Clearwell eDiscovery Platform

The eDiscovery market has been evolving at a rapid pace. Periodically a new buzz word or technology seizes our attention. Articles and blog posts are written, and topical forums and panels shift focus to that which is “new.” But the core eDiscovery use cases remain: the need to identify and preserve documents; to collect, process and index them accurately and without error; to analyze and cull down a broadly collected data set; and to review and produce as efficiently and cost-effectively as possible.

In this session we will examine best practices developed by the eDiscovery community using the Clearwell eDiscovery Platform, including:

  • Leveraging integrated legal hold surveys in the preservation process to identify uncommon data locations in information heavy cases, like IP.
  • Using transparent search to recognize the nuanced and disguised language common to FCPA inquiries.
  • Deconstructing discussion threads and analyzing communication pathways to uncover malfeasance in fraud investigations.


  • Chris Talbott,
    Product Marketing, eDiscovery,


  • Mark Burns,
    eDiscovery Manager, Litigation Support, Chief Litigation Office,
    Boston Scientific
  • Anna Simpson,
    Systems Engineering , eDiscovery,

2:00-3:15 You’re Doing it Wrong!!! How To Avoid Discovery Sanctions Due to a Flawed Legal Hold Process

With eDiscovery sanctions up more than 271 percent in recent years, it is critical for organizations of every size to implement an airtight legal hold process. Many companies unduly rely on antiquated and overly manual practices that because they lack a holistic and scalable approach, which invites disaster. 

In this interactive session, learn about best practices from practitioners on both sides of the “v.” to help you bolster the defensibility of your legal hold

in the face of intense judicial scrutiny.  In particular, hear our expert panelists discuss hot topics, such as:

  • The basics in the legal hold process, from the trigger, through scoping, to communication and compliance
  • How possible amendments to the FRCP might change the balance of power in the preservation and legal hold landscape
  • The latest case law developments that impact communication methods, hold notices, culpability levels and more


  • Allison Walton, Esq.,
    Discovery Counsel,
    Symantec Corp


  • Bernard J. DiMuro, Esq.,
    Managing Partner,
  • Ronni Solomon, Esq.,
  • Raquel Tamez, Esq.,
    Deputy General Counsel - Litigation/e-Discovery,

3:45-5:00 How Good is Your Predictive Coding Poker Face?

Predictive coding technology is a lot like the popular poker game, Texas Hold ‘em. Both can be risky and expensive if you don’t know what you’re doing.  On one hand, good players understand what kind of information they need from their opponents to make informed decisions. On the other, bad players ignore fundamental concepts like statistics that are critical to avoiding big mistakes. Join Matt Nelson, Discovery Counsel, Symantec and his distinguished panelists for a discussion and debate about why predictive coding technology is perceived as the wild, wild west of today’s eDiscovery frontier as they explore the following topics:

  • Should parties declare their use of predictive coding technology when going heads-up in meet-and-confer conferences?  
  • When should you be required to show your discard pile to other players?
  • How do you know when your opponent is bluffing about statistics?

You may not leave this session understanding everything there is to know about predictive coding technology. However, you’ll receive valuable tips from industry experts to help you avoid playing a rigged game with a stacked deck.  Or as Kenny Rogers might say, you will know when to walk away from a bad predictive coding game and you will know when to run…..


  • Matt Nelson,
    Discovery Counsel,
    Symantec Corp.


  • Craig Ball, Esq.
  • Maura Grossman, Esq.,
    Counsel, Litigation, 
    Wachtell, Lipton, Rosen & Katz LLP
  • Ralph C. Losey, Esq.,
    Jackson Lewis, LPP

Relativity by kCura
9:00 a.m. - 5:00 p.m

Relativity Hands-On Lab
Location: Concourse A

Experts will be available to guide you through hands-on exercises in Relativity, including navigating enhancements in Relativity 7.5, processing raw data, using computer-assisted review to amplify the efforts of your review team, forecasting review metrics, building custom applications to solve specific case needs, managing legal holds, and creating interactive charts to identify trends and patterns in a case. Additionally, some of kCura's third-party development partners will be on hand to demo their integrations with Relativity. No appointment is necessary.

LexisNexis - Full Day
Paypros Legal

10:30 AM to 11:30 AM
2:30 PM – 3:30 PM

Is Your Bank Putting You At Risk Of Violating Ethical Obligations?
What Law Firms Need To Know About Electronic Payments
  • Ethical Issues Associating with Accepting Credit Card Payments
  • Understanding Credit Card Processing: The Transaction Flow, Fees And Charges
  • Typical State Requirements – Ethics Opinions
  • Issues
  • Processor/Bank Rights Under a Typical Merchant Agreement that Likely Will Cause a Breach of an Ethical Obligation
  • Knowingly Revealing a Confidence or Secret of a Lawyer's Client
  • Provisions in a Merchant Agreement that May Place Your Law Firm in Breach of its Credit Facility Agreement(s)
  • Issue: How Do You Resolve These Issues And Insure That You Are Fully In Conformance With The Legal And Ethical Obligations Of Your State Bar?
  • Answers - Recommended Setup of Credit Card Operating Accounts and Trust Account


  • Jeffrey Dorman, Esq.
    Chief Legal Counsel