Every day, organizations around the world are leaving electronic footprints, creating a trail through email, social media and document storage that, if one fails to pay too close attention, could evolve from harmless to catastrophic quickly.

This reality presented by electronically stored information (ESI) has ushered in the era of information governance, the practice of managing organizational information for security and compliance challenges. Yet given the speed of technology adaption, many struggle to insure their ESI is safe. At kCura’s Relativity Fest, a panel titled “The New IG Playbook for Addressing Threats from Personal Clouds, Cyber Attacks and the IoT” explored some of the major issues that can arise without a proper information governance (IG) protocol, as well as how to overcome them.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]