You’ve got a lot of Redundant, Obsolete and Trivial (ROT) files in file shares, desktops, SharePoint and other silos all over the company. There are just too many copies and too much ROT content dragging down your storage systems, making discovery much harder, and making it difficult to comply with your record policies. But while it sounds easy, hitting the delete button can be trickier than it sounds. A smart and quick ROT file deletion project that cleans up your digital house can work to lower costs and reduce risks. In this session we will discuss practical and tactical real world approaches to get rid of the ROT both quickly and defensibly.
February 23, 2017
Historically, records retention programs have focused on hardcopy paper records in addition to semi structured electronic information like email, and unstructured information such as files and images. Yet surveys indicate that up to 75% of most data reside in structured systems – relational and other types of databases that house application data. These systems contain records, privacy information and other content subject to legal and regulatory requirements. Most organizations, however, rarely apply retention deletion and other governance policies to this structured data, creating both non-compliance and risk.
January 26, 2017
Multiple copies of unstructured data live everywhere -- on desktops, laptops, file shares, removable media, cloud shares, SharePoint, etc.. But before you can organize, you need to first answer some basic questions: Where is the right place for specific content to live? How and where do we keep as few copies as possible? Who can and should have access to what? How do we make it easy to apply both retention and data security, while still enabling classification. In this webinar Greg Forest of Contoural will discuss creating a data placement strategy, making governance frameworks not only easy for employees to follow, but enabling them to be more productive.
December 08, 2016
Taking a “save everything forever” approach and employee hoarding of e-mails, files and other types of electronic documents are burying organizations under mountains of data, exposing them to privacy risks, increasing costs and risks of eDiscovery, as well as sapping productivity from employees who spend hours every week looking for information. Yet many company’s efforts at aggressively deleting electronic documents are either ineffective or worse, they have the unintended effect of driving “underground archiving” whereby employees save information in unsecured locations. In this Contoural Webinar, Mark Diamond addresses real-world strategies for changing from a “hoarding” culture to a more compliant “smart saving” environment.
November 17, 2016
Many record retention schedules started from within hardcopy, paper-based records programs. Yet today more than 95% of the documents organizations create or receive are sourced in digital format. Programs based on paper-centric record retention schedules are much more difficult to execute and ensure compliance, when electronic information is the dominant format. Is your retention schedule in need of an update?
October 25, 2016
As records management and other information governance programs increasingly focus on electronic information, companies struggle with who should own these initiatives. Is it legal or IT? Maybe another group? Who gets to determine requirements? Perhaps more importantly, who should pay for it? In this webinar, Kathryn Hilton and Mark Diamond from Contoural will present a survey of who owns and funds IG programs across both medium and large companies; three different program ownership models and which are proving to be most successful; building a consensus across key groups on what to save and not save; and how to successfully navigate and negotiate these issues among legal, IT, records management, compliance and other key stakeholders.
September 22, 2016
Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?
June 08, 2016
Before committing to Information Governance programs, many senior executives want to know the bottom-line impact: If we invest in this program how much will we save? What’s the overall return on investment, and how long will it take to achieve it? There is a lot of money to be saved in Information Governance, and increasingly companies are finding that this is not only something they have to do, but also should do to save significant amounts of money. Dan Elam from Contoural will discuss developing effective Information Governance ROI models, and how to use this information to help sell your program.
Four types of Information Governance ROI
Overview of ROI models
Dealing with complexity in large and global environments
Examples and case studies of ROI
May 12, 2016
Information Governance programs often involve a number of moving parts across an enterprise. But how do you know if your program is working? Likewise, how do you demonstrate to senior management as well as courts and regulators that you have an effective program? Existing frameworks often do little to measure program effectiveness in key areas, and can serve as target benchmarks moving forward. Join Dan Elam from Contoural as we discuss real-world strategies for applying metrics:
• Why GARP, IGMM, and other frameworks are ineffective at measuring program effectiveness
• Five key areas of Information Governance program measurement
• Measurement strategies in large, complex, and global organizations
• Using metrics to establish go-forward benchmark targets
April 20, 2016
A Panama law firm suffered a massive data leak exposing offshore holdings of government officials across the world and companies should take notice. While the media has focused on the politicians involved, this breach also points to a more insidious trend: A new normal has come into place whereby it’s seemingly OK to breach information and the media’s “right to know” appears to trump companies and law firms’ rights to keep their confidential, sensitive and even privileged documents and data private. Traditional privacy and cybersecurity efforts are often ineffective against these types of attacks, and new, smarter approaches are needed. In this webinar we discuss how the “Panama Papers” and other similar attacks represent a new type of risk, where traditional information security approaches often fall short and key steps companies can take to protect themselves.
April 14, 2016
What’s the right level of maturity for your records management or Information Governance program? For most organizations a “bicycle” level program won’t cut it, yet do you really need a Cadillac level of maturity? Would a golf cart or Chevy do? If so, what does a Chevy-level program look like? In this webinar, we discuss how to explicitly choose the right level of maturity for you, why different organizations need different levels of maturity, why too low or too high maturity target can lead to non-compliance, avoiding the outside and inside influencers who may push you to the wrong level, and how to evaluate what’s good enough for your company.
March 16, 2016
We don’t usually think of records retention schedules as exciting, but they happen to be one of the most important pieces of your information governance foundation. Many organizations consider records retention as something that they have to do, other organizations’ retention schedules have no way of being enforced. This webinar covers the different ideas to get your records retention schedule “off the couch” and become something useful to your organization.
October 29, 2015
How do we take such a diverse program such as Information Governance, that can reduce risk, cost, and in many cases move the business forward, and put it in a way that organizations can figure out what value it has and likewise put together a case for senior management.
October 01, 2015
This webinar covers lessons that can be learned from the state department and many other issues we are hearing on the news. Likewise, there are many lessons that organizations can apply in regards to e-mail.
August 28, 2015
Office 365 adoption raises a host of Information Governance questions, this webinar addresses many of those questions. Learn more about specific O365 deployment options, implementing governance policies for Office 365 components, Office 365 migration and employee behavior change management strategies, and Creating an Office 365-specific Information Governance roadmap.
July 30, 2015
A well-designed information governance program project plan with appropriate milestones and metrics can drive a successful program forward. This webinar explores key elements for launching an information governance program and how to incorporate these elements into a roadmap that meets your organization’s specific needs.
June 25, 2015
Many organizations base their data security classification on either a single regulatory requirement such as HIPAA, or have multiple standards across different data types. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. This webinar discusses how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow.
February 26, 2015
When Sony Pictures suffered a data breach, the perpetrators were not looking for credit cards or consumer financial information, but rather unreleased movies, employee emails, and marketing materials that when spilled onto the Internet inflicted financial loss, embarrassment and fear upon the studio. This breach was different in that the message being sent was that any company with confidential or sensitive information could be a victim. Unfortunately, most corporate information security programs are not set up to defend companies against this type of breach.
January 29, 2015
Corporate pressures to use social and other types of newer media continues to build. Part of the business sees using social media as an indispensable channel for reaching a newer generation of consumers. Yet in many industries uncertainties about compliance and recordkeeping requirements make companies cautious to use these new tools. Unlike more traditional media, social communications occur on third party venues and with posts, replies, and retweeting it becomes a gray area where your responsibilities start and end. In this webinar, we review incorporating social media into your records management, eDiscovery, privacy and other elements of your information governance strategy.
November 20, 2014
October 16, 2014
Will your enterprise content management (ECM) initiative really meet its goals and will your organization realize the benefits of content management, or will your system be underutilized with limited impact on the organization? Unfortunately, more than 60% of ECM initiatives fall short of their goals. This webinar discusses the do’s and don’ts when launching an ECM initiative.
September 24, 2014
Multiple copies of unstructured data live everywhere, but before you can organize, you need to first answer some basic questions: Where is the right place for specific content to live? How and where do we keep as few copies as possible? Who can and should have access to what? These are all elements of a data placement strategy. This webinar discusses the best ways to approach unstructured data placement strategies.
August 28, 2014
In 2015 the European Union is putting serious teeth into its data privacy rules, threatening to fine violators as much as €5M or 5% of a company’s annual revenue. While full enforcement is still a year away, now is the time for organizations to start preparing for these rules.
July 29, 2014
While information governance and data governance seem similar these two disciplines address different areas that when designed correctly can positively reinforce one another. This webinar discusses between information governance and data governance, and how to design complementary programs.
June 26, 2014
Data privacy breaches occur not only from unauthorized access to data in designated repositories, but often when this sensitive information leaks from its assigned home to file shares, laptops, devices, email and other unmanaged places. Organizations that only protect privacy information where it should be risk suffering breaches from where privacy data really lives. This webinar reviews how to identify what privacy and sensitive information exists where, how to remediate it, and how to set up an ongoing process to ensure that data is in the right place.
April 24, 2014
Many organizations are moving their email infrastructure to Microsoft's cloud-based Office 365 to take advantage of lower costs and higher availability. Savvy companies are using this transition as an opportunity to implement a smart email retention strategy, saving the right email for the right period of time to ensure compliance and increase productivity, while implementing consistent, defensible disposition of older, unneeded emails.
March 27, 2014
The Dodd-Frank Wall Street Reform and Consumer Protection Act brings with it a wave of new reforms and requirements that is reshaping the regulatory environment for the entire financial services industry. A number of new recordkeeping and reporting requirements have already been imposed, with others likely to emerge as agencies work through the more than 200 new proposals and rules that are being written as part of the Act's implementation. Many organizations' current information governance, RIM, and ECM practices are ill-equipped to meet this new set of standards. This webinar covers how to prepare your organization for the coming wave of Dodd-Frank related requirements.
February 27, 2014
In order to ensure your organization is in compliance with contracts, applicable law or its risk-management plans, it is important for you to understand what personal data, ESI, IP and other types of sensitive information is collected and where it lives within the organization. However, this is often easier said than done. A data map tracks personal information held within in an organization and key data points such as how it's used, for what purposes and who has access to it. This session will identify best practices in data mapping for privacy, compliance, e-discovery and records management purposes.
October 31, 2013
Organizations are faced with a deluge of electronic documents, and trying to get employees to manually identify, classify or delete records, documents, privacy content and other sensitive information is increasingly becoming difficult.
October 03, 2013
October 03, 2013
Many organizations are transforming their US-centric records program into a global program spanning operations across many countries. In an ongoing series addressing global programs, this webinar will discuss six steps for developing a global record program.
August 29, 2013
Social media is just one of many types of information you can bring in under your company's governance strategy. The social media channel, down through which information flows, dictates the tools available for bringing use, classification, and retention into compliance with a comprehensive program. The ultimate goal is to mitigate corporate risk when it comes to the security of corporate data, protection of private information and litigation readiness.
July 25, 2013
This webinar covers how to migrate unstructured data, specifically moving network file shares to a SharePoint instance, although most of what is covered can also apply to moving SharePoint to any other ECM solutions.
June 27, 2013
June 26, 2013
SharePoint has the potential to allow compliant, secure, searchable and easy access to information. Yet many organizations struggle on how to best configure, and perhaps most difficult, migrating thousand, hundreds of thousands or even millions of files from file shares into SharePoint. This webinar examines smart and workable strategies for setting up and migrating information into SharePoint.
May 23, 2013
Often the greatest challenge in developing records management and information governance program is convincing senior management on the need to support and fund these initiatives. Information governance professionals know that these programs ensure compliance, and make it easier for employees to manage their information. How do you effectively communicate this value to those that control the budgets?
April 25, 2013
Developing records retention standards for a single jurisdiction can be challenging enough. But what is a company to do when it operates in multiple locations around the globe, and across international lines? This webinar discusses where to start, laying the foundation got a global records retention schedule, sources to consider when identifying requirements, and strategies for handling local exceptions.
March 28, 2013
This webinar covers the following topics: challenges of big data discovery, a case study of big data government investigation, big data privacy and risks, the coming backlash against big data, compliance design considerations, big data or big content, and big data and big content challenges.
March 18, 2013
In the last few years it’s been about capturing emails but now many organizations are looking at unstructured data and how they can effectively employ archiving technology. Sharepoint is often not as straightforward to implement and aren’t seeing the results they’re hoping for. This webinar covers some strategies for SharePoint and how you can make it work to have an effective control of your data and use it to its full potential.
February 14, 2013
We find that organizations have a very hard time measuring how effective their e-Discovery program is. Many organizations want to invest in this but are not sure what kind of Return on Investment they can get, in part because there are lots of different variables. This webinar covers how to build a framework and how to measure the effectiveness of an e-Discovery program.
December 20, 2012
The insurance industry is seeing a number of changes and impacts with healthcare changes and consolidation in the insurance industry. This webinar talks about the information governance impact and what are the specific information governance issues such as litigation readiness and records information management controlling sensitive information. What do you need to be aware of?
December 12, 2012
This is an area that perplexes a number of organizations. What are you doing with old email? A number of different organizations struggle with this topic. Covers the reasons why PST ingestion is important and why it is an issue for many organizations.
December 04, 2012
How do you actually get rid of stuff? What is defensible deletion and what are companies really achieving with their defensible disposition process. This webinar covers what we mean by defensible disposition and what an organization can expect.
November 29, 2012
November 08, 2012
Records management, compliance, control of data and M&A investiture. There have bene many organizations that have been looking at these issues and worried. Oftentimes, organizations don’t spend a lot of time having a records component to their M&A. Why should companies care about risk management as an M&A component?
October 11, 2012
September 27, 2012
Traditional record classification strategies struggle to keep up with the deluge of organizations' electronic information. Is it time to consider automatic classification of records? This webinar will review the current state of auto-classification, and how it fits into today's legal and compliance environment.
December 01, 2011
Request this Webcast
We believe there’s a tremendous amount of promise within organizations for moving e-Discovery from outside vendors and law firms and doing it themselves. There are a lot of real benefits to doing this. Similarly, a lot of these projects get stuck and all the good intentions don’t prevent them from getting stuck. This webinar covers why these projects get stuck and what is it that organizations can do to address this.
June 14, 2011
Not only does the WikiLeaks represent a potential threat to organizations but it also presents a new way of leaking information. This webinar covers what WikiLeaks is and how organizations can protect themselves from having something like it happen to them.
January 11, 2011
Request this Webcast
E-mail archiving is a very interesting area, but we also believe that it’s oftentimes an emotional issue because of the different areas of an organization that it covers. One question we get often, where does email live? This webinar starts from the basics of where e-mail lives and breaks down email archiving to make it as straightforward and easy to understand as possible.
September 14, 2010
Request this Webcast
E-mail archiving is a technical issue and also has large implications for legal, compliance, and records management and a number of other different areas. This webinar covers what you need to know, what the important features are, what they cost, and how you can deploy them successfully.
September 14, 2010
Request this Webcast
Part of a series of litigation preparedness webinars. Best practices on how organizations are approaching the issue of litigation readiness. This webinar covers what are the 5 levels of investments that organizations that can or may take in terms of becoming litigation readiness.
January 29, 2009
Objective is to give you some tips or best practices to avoid getting stuck in your records programs. How to make something effective and something compliant. Also covers some of the issues that are usually seen in organizations that are starting or re-starting their records programs and what they can do.
November 27, 2008
Organizations have a huge amount of documents- most of those are in electronic format. These documents tend to be on systems and across employees and both the quantity and distribution of documents is creating a challenge for many organizations when it comes time to do a legal hold. How do you know what you have and how do you properly preserve electronic documents?
November 11, 2008
Request this Webcast
How much do you really need to spend? There are a lot of risks out there, and many organizations are asking what they can do to be ready? This webinar is based on experiences with many different-sized companies and what we see works and doesn’t work and you your organization can be better prepared.
October 16, 2008
Part of a series of litigation preparedness webinars. Today, companies have lots of electronic documents and these tend to accumulate. There is a lot of interest to how organizations can organize and process the types of documents they have. This webinar covers how companies are creating data maps, what works and what are some of the pitfalls to the approaches that they take.
September 18, 2008
November 30, -0001
November 30, -0001
ARMA Golden Gate: How to Ask for Funding For An IG Project
San Francisco, CAMarch 15, 2017
View All Upcoming Events
Metrics Based Information Governance
Outlines a metrics-based approach that focuses on results in five key areas: compliance, privacy, disposition, litigation readiness, and employee prod...
Read the Summary and Request the White Paper