SlideShare a Scribd company logo
1 of 13
Information Security – A Systematic Approach to Protecting Your Organization’s Data During the eDiscovery Process Doug Stewart, Director of Technology June 28, 2011
Today’s Topics Why a process driven approach to information security is needed  Who should be responsible for information security in the eDiscovery process  What are the hallmarks / best practices of good information security in the eDiscovery process How to evaluate the information security practices of your eDiscovery partner or vendor  2
Information Security The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—  integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity;  confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and  availability, which means ensuring timely and reliable access to and use of information.  44 U.S.C. § 3542(b)(1)  3
Process Driven Approach ,[object Object]
Risk Assessment and Treatment
Collaborative / 360° View
Continual Improvement
Documented
Audited4
Sample Risk Analysis ,[object Object]
In place data (low)
Collection and preservation (high)
Law firm:

More Related Content

Viewers also liked (8)

Seo 4 - Part 4
Seo 4 - Part 4Seo 4 - Part 4
Seo 4 - Part 4
 
Brochure Kidsplaytables | Inrichting Kinderspeelhoek
Brochure Kidsplaytables | Inrichting KinderspeelhoekBrochure Kidsplaytables | Inrichting Kinderspeelhoek
Brochure Kidsplaytables | Inrichting Kinderspeelhoek
 
Deityofchrist
DeityofchristDeityofchrist
Deityofchrist
 
CAAV Tax Tutorial July 2011
CAAV Tax Tutorial July 2011CAAV Tax Tutorial July 2011
CAAV Tax Tutorial July 2011
 
Thechacha slide
Thechacha slideThechacha slide
Thechacha slide
 
NLP
NLPNLP
NLP
 
Hanh phuc gio_nay_day
Hanh phuc gio_nay_dayHanh phuc gio_nay_day
Hanh phuc gio_nay_day
 
Burnley Campus
Burnley CampusBurnley Campus
Burnley Campus
 

More from Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITDaegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to AvoidDaegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & ArchivingDaegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted ArchiveDaegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDaegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best DefenseDaegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewDaegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery ProcessDaegis
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesDaegis
 

More from Daegis (12)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Information Security – A Systematic Approach to Protecting Your Organization’s Data During the eDiscovery Process

Editor's Notes

  1. Most think of Info Sec in terms of confidentialityConfidentiality – unauthorized access to dataIntegrity – Stubbing in email archive so attachments are missingAvailability – is data available when needed?*Forces me to take a broader viewer of Info Sec thus my controls will be more complete
  2. Why a systematic approach? More complete / comprehensive.Addressed Ad Hoc some issues will be missed. Most organization have many good info sec practices but they are not tied together and managed as a complete system.Systematic leads you to a more complete solutionWhat is a systematic approach? Notice the overlap with good project management or quality management Add eat fruits & vegs and floss and you have nearly a complete list of the things humans know they should do but sometimes fail to do.Risk assessments are invaluable to the Info Sec process so let’s look at a sample one for an ediscovery project– not complete.
  3. Sample not meant to be complete – flavor not actualNotice list of unique risks and shared risks.ID risk and assess impact / probability*What are the key info sec risks in eDiscovery?
  4. *OK, now that we know what it is and how ot approach it, we need to ask who is responsible for Info Sec in the eDiscovery process
  5. 1. People are more likely to follow procedures they had a role in developing or at least had explained. When you don’t know why, it is easier to cut corners.*Once you have your team you need to focus on establishing best practices
  6. !!Key best practice is continual improvement. Take one minute to cover the Plan>Do>Check>Act cycleShewhart or Deming cycleContinual improvementReally just the scientific method restated for business process*Now we know the what, how, who of Info Sec in eDiscovery, how to you put this into practice?
  7. Many RFI/RFP’s do not ask about info sec. Those that do, most focus exclusively on technology.Certs:ISO 27001 – auditable standard with 133 info sec controls. It is an international info sec standard.SAS 70 – accounting standard that can be used to audit user identified controlsEU Safe Harbor et. al. – self certification that demonstrates an organization has process in place to conform to the data privacy regs / laws in various non-US jurisdictions.*Lastly I’d like to end by taking a deeper dive into ISO 27001– a topic near and dear to my heart
  8. Cross functional approach is mandated by standardNo rock unturned approachInternational and gaining in the USCompanies / orgs certified include:Amazon Web ServicesBechtel CorpPriceWaterhouseCoopersUnited NationsSAPEven if not going for certification the framework can be applied to your eDiscovery practice.
  9. Carmel Valley eDiscovery RetreatDate: July 17-20, 2011Location: Carmel, CADaegis’ National Director of Consulting, Ann Marie Gibbs, will be participating in a panel discussion entitled “Who’s In Charge Anyway?”July 19, 2011 from 2:45pm-3:45pm in the Oak RoomTrack 2: Who’s in Charge Anyway?Everyone seems to claim that the eDiscovery buck stops at their desk, but can the buck really stop at three different desks?  This session will focus who really carries the risk and who actually calls the shots in the eDiscovery arena generally, as well as at different stages of the process.Moderator: George SochaSpeakers: Ann Marie Gibbs, Eric Sinrod, Jenny Hamilton, and Rebecca Arnold