Security professionals struggle to secure the funding required to be effective in responding to the complexities new innovations present. In this lead-up to my keynote address at InfoSec World 2016 in Orlando on April 4, I will be exploring three different business models for how the risks of poor cybersecurity are being navigating . . . and failing. This will be a live webcast, March 8, 2016 at 10:30 am EST. Then, in my keynote I will be presenting why achieving digital trust must become the new mantra for how to use and grow the Cloud. Here is the registration link (after you register, a full description of the program is available) and here is the link for InfoSec World … Read More
I have accepted the invitation of the Electronic Signature & Records Association to speak at their annual 2014 Conference, Nov 12-13, New York City. I actually have been invited to address the Conference on two occasions.
First, it will be my privilege to join Professors Amy Boss and Patricia Fry on a panel featuring us in discussing the early history of the American legal community in promoting eCommerce and developing the enabling legal frameworks.
Second, I will be speaking on “Building Digital Trust: Conquering the Last Frontier”. My remarks will emphasize the continued potential for vendors and standards organizations to accelerate the development of the additional rules needed to allow digital records to be truly trusted as the most … Read More
I am very excited to confirm my participation as the opening keynote speaker for LawTech Europe Congress 2014. This will represent my first opportunity to speak about digital trust outside the United States and I am quite gratified to be given the opening slot.
My speech is entitled “Building Digital Trust: The New Authors of the Rules for Digital Evidence of the Truth”. I will be showcasing how technology standards and software solutions are displacing traditional legal mechanisms for creating and maintaining the reliability of evidence, and present new strategies for building trust in digital records.
The organizers are doing an amazing job anticipating, and responding to, the fast-paced migration of the complexities of e-discovery to Europe and, in … Read More
It will be my pleasure to contribute to this year’s conference (cfp.org). But it is exciting because I will be speaking for the first time in public about the content of my new book. I will be introducing, and applying to the challenges of privacy, three provocative new insights that are the at the foundation of the new architecture presented in the book for crossing the chasm between regulatory ambiguities and the precision in execution required by our machines. Hope to see you there!… Read More
On Thursday, July 7, 2011, at 12:00 noon, EDT, the ISC(2), the world’s leading association of information security professionals and the Ritter Academy will be co-sponsoring a live roundtable on contracting for security. Here is the detailed information for the event and registration. I will be joined by some terrific colleagues in the information security field, and will be offering a RitterMap to those who request it on the key strategies for contracting for security. These strategies help you make sure the next outsourcing does not end up as a big wreck!
These roundtables are great fun—truly unscripted, expert exchanges on the topic at hand.
The web is truly amazing—already, over 400 people are pre-registered from at least four continents; … Read More
Tomorrow, I will be presenting to the membership of the Ethics and Compliance Alliance a new program on Measuring the Management of Records and Information. This program organizes together for the first time the key relevant standards for responsible records and information management and unfolds the questions for examining a corporate custodian or executive.
While tomorrow’s program is limited to the subscribers for the Alliance, I welcome your feedback as to whether the program is one in which you would be interested. What are the key standards? How does a company explain their decision not to conform to published international standards? How do the standards define the boundaries of the “safe harbor” for a routine, good faith information system under … Read More
On February 24, 2011, Hewlett-Packard will be presenting me as the feature of a global webcast, Launching and Succeeding with Information Governance. This one hour program will offer a map-based view of how information governance can be organized and executed, with a focus on an unexpected strategy—start big, not small! For information on how to register for this event, click here. Registered participants will receive a custom process map and an opportunity to book through HP one-on-one consultations with me. … Read More
On April 27, 2011, I will be presenting a two-hour workshop at the 11th E-Discovery Institute West Coast in San Francisco, CA on Building a Defensible Litigation Hold Process. I have now presented this workshop in Dallas for an Institute focused on Oil & Gas, and at the New York E-Discovery Institute.
On February 23, 2011, I will be presenting a national webcast to the members of the National Association of Consumer Advocates on Navigating the Federal E-Discovery Rules. This CLE-qualified program provides an introduction to what the rules have enabled, and how to navigate the opportunities, and the risks, those rules present to finding the truth within the digital records.… Read More