Recently by George Kiersted
Cybersecurity
Identifying The Right Vendors And Processes For Securing Your Data
Editor: How should corporations or law firms qualify service providers’ data security policies and procedures? Burke: The first thing you want to know about prospective data security consultants is whether or not they are independent, because you want to be sure that they are not locked...
Read MoreCivil Justice
E-Discovery Technology And The Art Of Client Service
Editor: Kiersted Systems has a 30-year record of delivering superior results in electronic discovery projects – on time and on budget. What key factors do you address in helping clients manage today’s litigation costs? Kiersted: Clients are dealing with vast increases in data...
Read MoreTechnology
Client-Driven Innovation Delivers Efficient, Cost-Effective E-Discovery Process For High-Stakes Litigation
Editor: What are the current issues you face as e-discovery process and technology experts? Kiersted: We are seeing more and more e-discovery projects that involve vast data volumes. Our challenge is to handle the technical aspects of dealing with that data and, therefore, enable customers to...
Read MoreTechnology
Litigation Technology: A Key Player In Government Actions
Editor: Please tell us the key themes from this year’s Department of Justice (DOJ) panels, including your own impressions as a technology expert and panel moderator for three straight years. Kiersted: One consistent theme from previous panels concerns the need for parties to establish a...
Read MoreTechnology
Radically Reinvent The Review Process
Document review is expensive, and data sets are growing exponentially larger every year. There is more information, the stakes are higher and resources are dwindling. A perfect storm of litigation is approaching, and if legal teams cannot improve the way they gauge the productivity,...
Read More