Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
In Part One, we delved deep into the value proposition and formidable dominance of the IAPP certification portfolio in privacy as well as ACEDS coupled with Relativity’s certification stack in e-discovery. Certification dominance is much more elusive and the value of certifications far more open to opinion in the information protection and cybersecurity community. Cybersecurity is estimated to become a $170B industry by 2020, eclipsing the projected growth of e-discovery 10 times over. Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now.
By Ari Kaplan
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
By Nishad Shevde
E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?
By Nina Cunningham
A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.
By Michael Ciaramitaro and Sarah Brown
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they’ll take some information or data with them when they go, either inadvertently or on purpose.