The EDRM through the Eyes of IT Security
In this session, we’ll view the EDRM through the eyes of kCura’s Security Architect. We’ll dissect the EDRM into zones and discuss how data can be secured at each stage of the discovery process. We’ll share secure methods of transporting data between the zones and you’ll gain a deeper understanding of the security threats that are prevalent in IT today, the forensics of e-discovery, and how maintaining traceability is a responsibility shared by the case designer and the software itself. You‘ll learn where communications occur that need to be secured, and how you can overlay a zoned model to better understand how to secure e-discovery communications.