SlideShare a Scribd company logo
Work Smarter, Not Harder
with Portfolio Management
John Winkler, Account Executive, Kroll Ontrack
David J. Kearney, Director Cohen & Grigsby PC
March 12, 2014
ACEDS Membership Benefits
Training, Resources and Networking for the
E-Discovery Community
Join Today! aceds.org/join
or Call ACEDS Member Services 786-517-2701
Exclusive News and Analysis
Weekly Web Seminars
Podcasts
On-Demand Training
Networking
Resources
Jobs Board & Career Center
bits + bytes Newsletter
CEDS Certification
And Much More!
“ACEDS provides an excellent, much needed forum… to train, network and stay
current on critical information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
13 panels, 35 speakers, 14 networking events
Federal Rules amendments, judicial guidance, legal holds & more!
Presenters include:
Federal judges including Hon. David Waxse, Rules Advisory
Committee member, NFL Special Master, corporate attorneys
Register or learn more at EDiscoveryConference.com
Use code ―PORTFOLIO20‖ to save 20%
4
John Winkler
 Account Executive at Kroll Ontrack
 Partners with law firm clients to
advise on ediscovery best practices
 Over 18 years experience in the legal
technology field
 Frequent author and speaker on
ediscovery topics and best practices
jwinkler@krollontrack.com
(216) 570-3905
5
David J. Kearney
 Director of Technology Services at
Cohen & Grigsby, P.C.
 Established ediscovery and project
management professional
 Multiple industry certifications, such
as PMP, CEDS
 Authored numerous articles related
to electronic discovery
 Frequent speaker and instructor on
various ediscovery topics
dkearney@cohenlaw.com
(412) 297-4651
6
Overview
 The False Facade: The Case-by-Case Approach to
Project Management
 Cutting the Clutter : The Portfolio Management
Approach
 Work Smarter, Not Harder: Important Considerations
for Making the Switch
 Conclusion
The Case-by-Case Approach to Project Management
The False Facade
7
8
The “Case-by-Case” Approach
Source: Kroll Ontrack Advisory Board Survey (2013)
 Organizations waste
time and money
reinventing the
ediscovery process
with each case!
9
The “Case-by-Case” Perception
 “Each case is unique”
» Organizations create hard
boundaries regarding the
process for each project
» Data is collected, analyzed,
reviewed, and produced
entirely disconnected from
other projects within the
organization!
 This approach is chaotic
and highly inefficient!
» Piecemeal adoption
Project 3
Project 1 Project 2
» The same data and/or custodians collected numerous times!
The Portfolio Management Approach
Cutting the Clutter
10
11
The Reality
Source: eDJ Group, Reduce, Reuse, Recycle: Effective Multi-matter Portfolio
Management (2013)
Not Often (<25%)
Often (25-50%)
Very Often (>50%)
20%
33.3%
46.7%
 How often do you have cases with overlapping
custodians, collections or productions?
12
The Reality | Overlap Among Matters
 Each case is unique, but...
» Fewer hard boundaries
between matters
» Significant overlap with regard
to
documents, custodians, and
tools
 By acknowledging this
overlap, an organization
can:
» Minimize data transfers
» Decrease total data stored
Project 1 Project 2
Project 3
» Consolidate location of ediscovery data and work product
The “Ties that Bind” Your Ediscovery
Duplicative
Documents
Overlapping Tools
Repeat
Custodians
 How the portfolio approach maximizes efficiencies for
a corporation:
Organizations can
avoid re-identifying,
re-collecting, or re-
processing data by
isolating documents
potentially subject to
repeat litigation in a
post-processing
universal database!
Store ESI for
repeat custodians
in a suspended
state of storage to
limit re-collecting
Avoid additional data
transfers, processing,
etc. by leveraging the
same tools across the
EDRM
The “Ties that Bind” Your Ediscovery
 How the portfolio approach maximizes efficiencies for
a law firm, where:
Project 1
Project 2
Project 3
Project 1 Project 2
Project 3
» Minimizes the number of redundant project management steps—Do
not have to ―reinvent the wheel‖ with each case!
» Lowers the cost of projects with corporate of client data by folding
the management processes into the portfolio
Managing
each project...
…Managing the portfolio
Transitions
to
15
The Portfolio Approach
For one case… …or 100 cases
Leverage the same processes, systems
and/or technologies
Goal
16
The Portfolio Approach
Leverage the same processes, systems
and technologies
Goal
Collaboration
Tracking
ConservationKey
Components
Important Considerations for Making the Switch
Work Smarter, Not Harder
17
18
Considerations for Implementation
 A fundamental shift in the way organizations conduct
ediscovery that requires forethought
» Identifying opportunities to collaborate and conserve resources
» Creating sound processes and employing effective technologies to
maximize efficiencies
 Additional questions regarding solutions:
» Capacity to handle current data needs
» Capacity to handle future data needs
» Cost of implementation
» Security of solution
» Repeatability of solution
1
2
3
4
5
19
Do Existing Tools Meet Today’s Needs?
 Big data is the biggest challenge
 Red flags suggesting under-performing solutions:
» Hosting a massive amount of email or loose data not currently
subject to any sort of information management
» Employed outdated tools like basic keyword search as the sole
means of data analysis
» Not having a process or means to bring on more labor or better
technology when large cases arise
1
64 percent of organizations have invested or plan to invest in
big data systems, but only eight percent of those planning to
implement a solution have actually taken steps to implement it.
-Gil Allouche, What the Gartner Big Data 2013 Report Means for the Industry (Nov. 2, 2013)
20
Do Tools Meet Tomorrow’s Needs?
 Applying Predictive coding to analyze your data
 Per-project cost and comfortability are two barriers to
widespread use, but that change is already underway
» Some vendors already adopting new pricing plans for PC to shift
from per-project basis to a monthly fee
» Case law has already paved the way for counsel to use this tool, and
we may be on the cusp of greater adoption
 Ultimately, circles back to basic risk assessment:
» What is the likelihood that my organization will want to use
predictive coding during the lifetime of this litigation support
tool?
2
21
What Will it Cost my Organization?
 What is the true cost of on-premise software?
» Maintaining a server (power, security, maintenance)
» The cost to store ESI being processes or analyzed
» Costs for personnel capable of running the software
 Is it compatible with other applications in my
organization’s case management workflow?
» Might result in additional consulting, training, processing costs…
 Additional consideration: viability of Software as a
Service (SaaS) solutions
» Some estimate that the initial cost of on-premise hardware and
software may only represent 25 percent of the total long-term cost
3
22
Is the Solution Secure?
 Presumably, a cloud-based solution is best suited for
the portfolio management approach
» Allows team to use a consistent, repeatable process where you can
utilize data from multiple cases
4
The ―ideal scenario‖ should allow legal professionals to access
documents in ―a centralized legal repository that supports multi-matter,
multi-party ediscovery.‖
-Daniel Lim, 5 Tips for Using the Cloud to Conduct E-Discovery (July 25, 2012)
 Vetting the security of existing and potential
solutions is paramount
» With a bevy of important security considerations…
23
Cloud Security Considerations
 Private versus public cloud environment
» Private clouds often considered more secure because organizations
have more control over preservation and collection
» May not know where data geographically resides in a public cloud
– Potentially raises international compliance challenges
 Planning for disaster
» Make sure data is encrypted when it is in transit
» Vet certifications and physical security of the provider’s data center
 Portfolio management: ensure provider only stores one
instance of a document
» Minimizes auditing and security associated with hosting stages
4
24
Is Your Solution Repeatable?
 Existing approach: create process as projects arise
» With each new project, decisions are made about whether existing
processes and tools are good enough for everything from collection
through production—or whether additional tools are necessary
» Highly chaotic: overlapping processes and interoperability issues
 Possible solution: contracting for all the tools you need
for your cases in a given time period
» Ensures seamless integration amongst tools for different EDRM
phases
» Many vendors now offer solutions based on monthly hosting fees to
minimize overall cost to an organization
5
25
Is Your Solution Repeatable?
 Key components: a post-processing centralized
database for analysis and review with robust inter-
project reporting
» Post-processing centralized database: storing every case
document on a centralized platform avoids duplicative collection,
identification and processing for repeat or consecutive litigation
» Analysis and review: all document groupings and decisions made
can be preserved and utilized for additional cases, if applicable
» Robust inter-project reporting: the portfolio management tool
should track critical case information like:
– The number of custodians per case
– Number of documents escalated to review
– How much time and money were spent on each process
5
The Portfolio Management Approach
Conclusion
26
27
Benefits of The Portfolio Approach
 Increased efficiency
» Less time and effort spent of duplicative steps
» Focus on case strategy and new issues
 Budgeting and cost savings
» Budgeting more predictable via repeatable processes
 Transparency
» Insight into entire edisocvery portfolio
» Identify trends and opportunities to improve processes
March 2014 aceds portfolio c&g kroll webinar

More Related Content

What's hot

What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
IANS
 
Maximum Impact with Interactive Video
Maximum Impact with Interactive VideoMaximum Impact with Interactive Video
Maximum Impact with Interactive Video
Allison Selby
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Concept Searching, Inc
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
Satchit Dokras
 
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
Becky Ward
 
Paper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business NeedsPaper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business Needs
AIIM International
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
Ismail Muhammad
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Druva
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
Cognizant
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Digital Guardian
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
Druva
 
Data-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality EngineeringData-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality Engineering
DATAVERSITY
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
Marc Vael
 
Infoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case StudyInfoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case Study
PlusNarrative
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Druva
 
Big data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.pptBig data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.ppt
Aravindharamanan S
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
Wolters Kluwer Tax & Accounting US
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Privacera
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
IBM Analytics
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
itnewsafrica
 

What's hot (20)

What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
Maximum Impact with Interactive Video
Maximum Impact with Interactive VideoMaximum Impact with Interactive Video
Maximum Impact with Interactive Video
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
IJIS Institute_ Governance Agreements in PS Information Sharing Projects (Aug...
 
Paper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business NeedsPaper-Based Processes Don’t Meet Today’s Business Needs
Paper-Based Processes Don’t Meet Today’s Business Needs
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Data-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality EngineeringData-Ed: Unlock Business Value through Data Quality Engineering
Data-Ed: Unlock Business Value through Data Quality Engineering
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Infoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case StudyInfoprotect-NMG-Veritas Backup Case Study
Infoprotect-NMG-Veritas Backup Case Study
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Big data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.pptBig data trendsdirections nimführ.ppt
Big data trendsdirections nimführ.ppt
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 

Viewers also liked

Lpm awareness
Lpm awarenessLpm awareness
Lpm awareness
David Kearney
 
Welcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMIWelcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMI
David Kearney
 
Effectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn PresenceEffectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn Presence
David Kearney
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 
OLP - Options for Outsourcing
OLP - Options for OutsourcingOLP - Options for Outsourcing
OLP - Options for Outsourcing
David Kearney
 
CG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 finalCG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 final
David Kearney
 
AHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMRAHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMR
David Kearney
 

Viewers also liked (7)

Lpm awareness
Lpm awarenessLpm awareness
Lpm awareness
 
Welcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMIWelcome to ILTA RICOH & PMI
Welcome to ILTA RICOH & PMI
 
Effectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn PresenceEffectively Managing Your LinkedIn Presence
Effectively Managing Your LinkedIn Presence
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
OLP - Options for Outsourcing
OLP - Options for OutsourcingOLP - Options for Outsourcing
OLP - Options for Outsourcing
 
CG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 finalCG Leveraging Social Media 06-23-15 final
CG Leveraging Social Media 06-23-15 final
 
AHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMRAHIMA 2013 Presentation - LHR/LMR
AHIMA 2013 Presentation - LHR/LMR
 

Similar to March 2014 aceds portfolio c&g kroll webinar

ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
LexisNexis Software Division
 
Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planning
Vanderbilt University
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overview
jkvr
 
The advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projectsThe advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projects
elladeon
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
Alan Brooks
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management tools
sarahbrown1
 
How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?
Charles Mok
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Denodo
 
Presentation kroll
Presentation krollPresentation kroll
Presentation kroll
Edgar Melo Costa
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011
Mills Davis
 
MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review
Michelle Purnama
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
Luis Santos
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
itnewsafrica
 
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Denodo
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
eDiscoveryConsultant
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
Denodo
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
Home
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009
SBHPatrick
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Jim Merrifield, IGP, CIP
 

Similar to March 2014 aceds portfolio c&g kroll webinar (20)

ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
 
Integrated technology-vision-planning
Integrated technology-vision-planningIntegrated technology-vision-planning
Integrated technology-vision-planning
 
DataSpryng Overview
DataSpryng OverviewDataSpryng Overview
DataSpryng Overview
 
The advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projectsThe advantage of Red Hat Enterprise Linux over community projects
The advantage of Red Hat Enterprise Linux over community projects
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management tools
 
How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?How do we capture and leverage innovation as the engine for change?
How do we capture and leverage innovation as the engine for change?
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
Presentation kroll
Presentation krollPresentation kroll
Presentation kroll
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011
 
MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review MIS 2101 Diamond Peer Exam 2 Review
MIS 2101 Diamond Peer Exam 2 Review
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
Data Virtualization, a Strategic IT Investment to Build Modern Enterprise Dat...
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and BusinessDenodo’s Data Catalog: Bridging the Gap between Data and Business
Denodo’s Data Catalog: Bridging the Gap between Data and Business
 
CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009CostSavingsSolutionsForCorpCounsel_2009
CostSavingsSolutionsForCorpCounsel_2009
 
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life EasierBecome an Information Intelligence Genius: 5 Steps to Make Your Life Easier
Become an Information Intelligence Genius: 5 Steps to Make Your Life Easier
 

More from David Kearney

Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?
David Kearney
 
COA
COACOA
Agile cert37pdu hours
Agile cert37pdu hoursAgile cert37pdu hours
Agile cert37pdu hours
David Kearney
 
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
David Kearney
 
six-sigma
six-sigmasix-sigma
six-sigma
David Kearney
 
LSSeco_certificate
LSSeco_certificateLSSeco_certificate
LSSeco_certificate
David Kearney
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery
David Kearney
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
David Kearney
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
E discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education optionsE discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education options
David Kearney
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
David Kearney
 
Project Management In Legal One Of The Missing Pieces
Project Management In Legal   One Of The Missing PiecesProject Management In Legal   One Of The Missing Pieces
Project Management In Legal One Of The Missing Pieces
David Kearney
 
Litigation Support Presentation Ppt
Litigation Support Presentation PptLitigation Support Presentation Ppt
Litigation Support Presentation Ppt
David Kearney
 

More from David Kearney (15)

Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?Talk to My Lawyer...Or My PM?
Talk to My Lawyer...Or My PM?
 
COA
COACOA
COA
 
TMI_CC_Award
TMI_CC_AwardTMI_CC_Award
TMI_CC_Award
 
Agile cert37pdu hours
Agile cert37pdu hoursAgile cert37pdu hours
Agile cert37pdu hours
 
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
Murfie - A Better Way to Buy Music (Toastmasters Speech, August 2015)
 
six-sigma
six-sigmasix-sigma
six-sigma
 
LSSeco_certificate
LSSeco_certificateLSSeco_certificate
LSSeco_certificate
 
Considerations When Building e-Discovery
Considerations When Building e-Discovery Considerations When Building e-Discovery
Considerations When Building e-Discovery
 
Traversing the triangle
Traversing the triangleTraversing the triangle
Traversing the triangle
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
E discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education optionsE discovery, litigation support, and legal related education options
E discovery, litigation support, and legal related education options
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
 
Project Management In Legal One Of The Missing Pieces
Project Management In Legal   One Of The Missing PiecesProject Management In Legal   One Of The Missing Pieces
Project Management In Legal One Of The Missing Pieces
 
Litigation Support Presentation Ppt
Litigation Support Presentation PptLitigation Support Presentation Ppt
Litigation Support Presentation Ppt
 
Litigation Support
Litigation SupportLitigation Support
Litigation Support
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

March 2014 aceds portfolio c&g kroll webinar

  • 1. Work Smarter, Not Harder with Portfolio Management John Winkler, Account Executive, Kroll Ontrack David J. Kearney, Director Cohen & Grigsby PC March 12, 2014
  • 2. ACEDS Membership Benefits Training, Resources and Networking for the E-Discovery Community Join Today! aceds.org/join or Call ACEDS Member Services 786-517-2701 Exclusive News and Analysis Weekly Web Seminars Podcasts On-Demand Training Networking Resources Jobs Board & Career Center bits + bytes Newsletter CEDS Certification And Much More! “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3. 13 panels, 35 speakers, 14 networking events Federal Rules amendments, judicial guidance, legal holds & more! Presenters include: Federal judges including Hon. David Waxse, Rules Advisory Committee member, NFL Special Master, corporate attorneys Register or learn more at EDiscoveryConference.com Use code ―PORTFOLIO20‖ to save 20%
  • 4. 4 John Winkler  Account Executive at Kroll Ontrack  Partners with law firm clients to advise on ediscovery best practices  Over 18 years experience in the legal technology field  Frequent author and speaker on ediscovery topics and best practices jwinkler@krollontrack.com (216) 570-3905
  • 5. 5 David J. Kearney  Director of Technology Services at Cohen & Grigsby, P.C.  Established ediscovery and project management professional  Multiple industry certifications, such as PMP, CEDS  Authored numerous articles related to electronic discovery  Frequent speaker and instructor on various ediscovery topics dkearney@cohenlaw.com (412) 297-4651
  • 6. 6 Overview  The False Facade: The Case-by-Case Approach to Project Management  Cutting the Clutter : The Portfolio Management Approach  Work Smarter, Not Harder: Important Considerations for Making the Switch  Conclusion
  • 7. The Case-by-Case Approach to Project Management The False Facade 7
  • 8. 8 The “Case-by-Case” Approach Source: Kroll Ontrack Advisory Board Survey (2013)  Organizations waste time and money reinventing the ediscovery process with each case!
  • 9. 9 The “Case-by-Case” Perception  “Each case is unique” » Organizations create hard boundaries regarding the process for each project » Data is collected, analyzed, reviewed, and produced entirely disconnected from other projects within the organization!  This approach is chaotic and highly inefficient! » Piecemeal adoption Project 3 Project 1 Project 2 » The same data and/or custodians collected numerous times!
  • 10. The Portfolio Management Approach Cutting the Clutter 10
  • 11. 11 The Reality Source: eDJ Group, Reduce, Reuse, Recycle: Effective Multi-matter Portfolio Management (2013) Not Often (<25%) Often (25-50%) Very Often (>50%) 20% 33.3% 46.7%  How often do you have cases with overlapping custodians, collections or productions?
  • 12. 12 The Reality | Overlap Among Matters  Each case is unique, but... » Fewer hard boundaries between matters » Significant overlap with regard to documents, custodians, and tools  By acknowledging this overlap, an organization can: » Minimize data transfers » Decrease total data stored Project 1 Project 2 Project 3 » Consolidate location of ediscovery data and work product
  • 13. The “Ties that Bind” Your Ediscovery Duplicative Documents Overlapping Tools Repeat Custodians  How the portfolio approach maximizes efficiencies for a corporation: Organizations can avoid re-identifying, re-collecting, or re- processing data by isolating documents potentially subject to repeat litigation in a post-processing universal database! Store ESI for repeat custodians in a suspended state of storage to limit re-collecting Avoid additional data transfers, processing, etc. by leveraging the same tools across the EDRM
  • 14. The “Ties that Bind” Your Ediscovery  How the portfolio approach maximizes efficiencies for a law firm, where: Project 1 Project 2 Project 3 Project 1 Project 2 Project 3 » Minimizes the number of redundant project management steps—Do not have to ―reinvent the wheel‖ with each case! » Lowers the cost of projects with corporate of client data by folding the management processes into the portfolio Managing each project... …Managing the portfolio Transitions to
  • 15. 15 The Portfolio Approach For one case… …or 100 cases Leverage the same processes, systems and/or technologies Goal
  • 16. 16 The Portfolio Approach Leverage the same processes, systems and technologies Goal Collaboration Tracking ConservationKey Components
  • 17. Important Considerations for Making the Switch Work Smarter, Not Harder 17
  • 18. 18 Considerations for Implementation  A fundamental shift in the way organizations conduct ediscovery that requires forethought » Identifying opportunities to collaborate and conserve resources » Creating sound processes and employing effective technologies to maximize efficiencies  Additional questions regarding solutions: » Capacity to handle current data needs » Capacity to handle future data needs » Cost of implementation » Security of solution » Repeatability of solution 1 2 3 4 5
  • 19. 19 Do Existing Tools Meet Today’s Needs?  Big data is the biggest challenge  Red flags suggesting under-performing solutions: » Hosting a massive amount of email or loose data not currently subject to any sort of information management » Employed outdated tools like basic keyword search as the sole means of data analysis » Not having a process or means to bring on more labor or better technology when large cases arise 1 64 percent of organizations have invested or plan to invest in big data systems, but only eight percent of those planning to implement a solution have actually taken steps to implement it. -Gil Allouche, What the Gartner Big Data 2013 Report Means for the Industry (Nov. 2, 2013)
  • 20. 20 Do Tools Meet Tomorrow’s Needs?  Applying Predictive coding to analyze your data  Per-project cost and comfortability are two barriers to widespread use, but that change is already underway » Some vendors already adopting new pricing plans for PC to shift from per-project basis to a monthly fee » Case law has already paved the way for counsel to use this tool, and we may be on the cusp of greater adoption  Ultimately, circles back to basic risk assessment: » What is the likelihood that my organization will want to use predictive coding during the lifetime of this litigation support tool? 2
  • 21. 21 What Will it Cost my Organization?  What is the true cost of on-premise software? » Maintaining a server (power, security, maintenance) » The cost to store ESI being processes or analyzed » Costs for personnel capable of running the software  Is it compatible with other applications in my organization’s case management workflow? » Might result in additional consulting, training, processing costs…  Additional consideration: viability of Software as a Service (SaaS) solutions » Some estimate that the initial cost of on-premise hardware and software may only represent 25 percent of the total long-term cost 3
  • 22. 22 Is the Solution Secure?  Presumably, a cloud-based solution is best suited for the portfolio management approach » Allows team to use a consistent, repeatable process where you can utilize data from multiple cases 4 The ―ideal scenario‖ should allow legal professionals to access documents in ―a centralized legal repository that supports multi-matter, multi-party ediscovery.‖ -Daniel Lim, 5 Tips for Using the Cloud to Conduct E-Discovery (July 25, 2012)  Vetting the security of existing and potential solutions is paramount » With a bevy of important security considerations…
  • 23. 23 Cloud Security Considerations  Private versus public cloud environment » Private clouds often considered more secure because organizations have more control over preservation and collection » May not know where data geographically resides in a public cloud – Potentially raises international compliance challenges  Planning for disaster » Make sure data is encrypted when it is in transit » Vet certifications and physical security of the provider’s data center  Portfolio management: ensure provider only stores one instance of a document » Minimizes auditing and security associated with hosting stages 4
  • 24. 24 Is Your Solution Repeatable?  Existing approach: create process as projects arise » With each new project, decisions are made about whether existing processes and tools are good enough for everything from collection through production—or whether additional tools are necessary » Highly chaotic: overlapping processes and interoperability issues  Possible solution: contracting for all the tools you need for your cases in a given time period » Ensures seamless integration amongst tools for different EDRM phases » Many vendors now offer solutions based on monthly hosting fees to minimize overall cost to an organization 5
  • 25. 25 Is Your Solution Repeatable?  Key components: a post-processing centralized database for analysis and review with robust inter- project reporting » Post-processing centralized database: storing every case document on a centralized platform avoids duplicative collection, identification and processing for repeat or consecutive litigation » Analysis and review: all document groupings and decisions made can be preserved and utilized for additional cases, if applicable » Robust inter-project reporting: the portfolio management tool should track critical case information like: – The number of custodians per case – Number of documents escalated to review – How much time and money were spent on each process 5
  • 26. The Portfolio Management Approach Conclusion 26
  • 27. 27 Benefits of The Portfolio Approach  Increased efficiency » Less time and effort spent of duplicative steps » Focus on case strategy and new issues  Budgeting and cost savings » Budgeting more predictable via repeatable processes  Transparency » Insight into entire edisocvery portfolio » Identify trends and opportunities to improve processes

Editor's Notes

  1. For those of you who aren’t familiar with us, We are a members-only association that provides training, resources, and networking to the e-discovery community. We also offer the Certified E-Discovery Specialist credential, which is held by hundreds of professional across the Americas, Europe and Asia. You can join today and start receiving a number of benefits exclusive to our members, including news content, on-demand web seminars, our bits+bytes newsletter and discounts on certification and our annual e-discovery conference in April.
  2. The 2014 ACEDS Conference will be held at the beautiful Westin Diplomat in Hollywood, Florida from April 27 to 29. The conference features 14 panels, 35 top speakers and beachside networking events. Among the presenters is Steven Levy, the former head of legal operations at Microsoft and a pioneer of legal project management, and Judge David Waxse, who has authored several groundbreaking e-discovery decisions. Two federal judges from the US Court in the Southern District of Florida will also speak, along with the former General Counsel at BASF, top litigators, the E-Discovery Director at UnitedHealth Group and many more more. You can register or get more information at eDiscoveryConference.com. And, as a thank you for being here, if you enter the code Portfolio20, you will receive 20% off. Again that’s Portfolio20.