Data Preservation

Discovery Risk Mitigation – Preservation

Should It Stay or Should It Go? A terrible wordplay on The Clash’s 1981 classic perhaps, but to retain or dispose of data is a core theme in this, the last piece in our Discovery Risk Mitigation series of blogs. You’ll recall the previous discussion that Information Governance is increasingly both a critical aspect of achieving an improved response to discovery events, such as investigations, litigation

Read More »
Data Preservation

Discovery Risk Mitigation – Preservation

Should It Stay or Should It Go? A terrible wordplay on The Clash’s 1981 classic perhaps, but to retain or dispose of data is a core theme in this, the last piece in our Discovery Risk Mitigation series of blogs. You’ll recall the previous discussion that Information Governance is increasingly both a critical aspect of achieving an improved response to discovery events, such as investigations, litigation

Read More »
Information Governnance

Discovery Risk Mitigation – Prevention

Striving For the Ultimate Goal In previous articles in the Discovery Risk Mitigation series, we’ve firstly outlined the overall journey, then explored how to assess your current maturity from an eDiscovery and Information Governance perspective, and most recently, the parallel paths to remediate the situation. In this next blog, we outline what should be the ultimate goal of any Discovery Risk Mitigation programme, namely, to try

Read More »
remediation

Discovery Risk Mitigation – Remediation

Improving preparedness to eDiscovery events In the previous article, we explored considerations when assessing your current eDiscovery and information governance maturity.  Having undertaken that exercise and established a benchmark, clearly, the next step is to implement a series of corrective measures. But where should you start? What demands your most immediate attention, and what can be addressed more leisurely? A maturity assessment is essentially a statement

Read More »
eDiscovery Maturity Assessment

eDiscovery Maturity Assessment

Assessing your corporate capability to respond effectively to investigations and eDiscovery events. In an earlier post, I introduced Discovery Risk Mitigation, our structured journey-based approach to helping organisations reduce their exposure to the risks inherent within the ever-expanding data and governance landscapes in which we now work. Having understood why preparedness is a good thing (and I’m going to assume that anyone reading this far has

Read More »
A worker using Salient Discovery's eDiscovery service

Discovery Risk Management

Mitigating the eDiscovery risks due to the explosion of electronic data in your business through a structured programme of preparedness. Being Prepared I’m sure most people are familiar with the expression “prevention is better than cure”. It sounds like generally sound advice to me and I’m sure most would probably agree. But in truth, to what extent do we apply the principle? The reality is that

Read More »
bank statement analytics

Salient’s New Utility Unlocks Tech-Assisted Bank Statement Analytics

Technology has a gone a long way towards streamlining investigations, but one particular area of evidence has consistently flown under the radar of all the usual forensic tools: bank statements. “Following the money” using these transactional documents is often a pivotal part of investigations, and yet it has remained an arduous manual process that guzzles both time and resources… until now. Having seen first-hand the workload

Read More »
How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

Monitoring employee conduct has always been part of the corporate environment. In many cases, it’s an essential component of prevention strategies for data leaks, fraud, theft of intellectual property and other potentially harmful behaviour. Monitoring also enables organisations to supervise and manage productivity, enforce organisational policies and procedures, manage quality control and protect employees and information assets. Prior to data privacy regulation, the commonly held belief

Read More »
Insider Risk Management and the Power of Proactive Threat Detectionr of proactive threat detection

Insider Risk Management and the Power of Proactive Threat Detection

Many businesses are under the impression that the biggest risk to their data security comes from external cyber-attacks breaching their perimeter. In our experience investigating security breaches, however, we can confidently say that equally damaging threats can often come from within. Whether you’re talking unintentional data spillage, malicious IP theft, confidentiality breaches, regulatory compliance violations, insider trading or fraud, the ramifications of undesirable user activity can

Read More »
information-analytics-ai

Cognitive Analytics and Corporate Supervision

In our interactions with clients and prospects we have increasingly seen a need amongst corporate compliance as well as forensic and security professionals, for supervisory and monitoring capabilities in their environment. The primary objective being to proactively identify non-compliance with corporate policies, insider threats and potentially fraudulent or other nefarious activity. So why would an eDiscovery provider be interested in this?  Well, most of these issues

Read More »