Publications
Distinction Now Comes from Specialization in the Relativity Ecosystem

Legaltech News published Part Seven of TRU CEO Jared Coseglia's series on Cyber & ESI Certifications, titled "Distinction Now Comes from Specialization in the Relativity Ecosystem," on November 21, 2017. TRU is proud to be the certification attaché to the legal technology community and will be featured in Legaltech News every month with a new article about e-discovery and/or cybersecurity certification and education available (or coming soon!) to the marketplace.

Part One of this series, “Maneuvering the Madness of Cyber and ESI Education & Certification,” examined some basic and broadly accepted industry-standard certifications that can be achieved within a year’s time or less: CEDS (Certified E-Discovery Specialist), GIAC (Global Information Assurance Certification) and RCA (Relativity Certified Administrator) programs. CEDS and RCA are distinctly e-discovery, one vocational (product-specific) and one educational. GIAC is squarely focused on cybersecurity.

Part Two of the series, "The IGP and CFSR: Transitioning Your E-Discovery Career Into a Cybersecurity One," aimed to expose two lesser-known but rapidly accepted certifications, the IGP (Information Governance Professional) from ARMA International (Association of Records Managers and Administrators) and the CFSR (Certified Forensic Security Responder) from Guidance Software Inc., makers of EnCase and the EnCE. Both certifications aim to aid e-discovery and cybersecurity professionals alike, but in very different ways.

Part Three of the series, "Mainstream Alternatives: Cyber & ESI Certifications Making Moves in a New Era," noted that choosing certifications and education to invest in continues to be challenging, but worthwhile, for legal professionals, and takes a look at two more launching this year.

Part Four of the series, "University Usage of ESI Technology Gives Rise to Alternative Career Paths for Lawyers," suggested that for iCONECT, certifying future lawyers on XERA at the university level may help solve a talent gap issue as well as increase licensing from potential buyers of the platform.

Part Five of the series, "When Products Start Teaching Cybersecurity Process," explored how the new Nuix cybersecurity training and certification points to a pivot not only at Nuix but in the ESI and cyber community at large.

Part Six of the series, "Time, Not Buy-In, Becomes Biggest Barrier to Broader Cybersecurity Awareness," discusses Inspired eLearning's move into the legal market with the aim not to certify, but constantly educate.

Part Seven of the series, "Distinction Now Comes from Specialization in the Relativity Ecosystem," takes a look at new certifications offered by Relativity.

Event calendar
December , 2017
Sun Mon Tue Wed Thu Fri Sat
26 27 28 29 30 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
Recent News & Events
TRU Tips

On an interview, rather than ask what will make "me" successful in this role, instead ask what has made others successful in this role in the past. Take the interview out of the hypothetical and into the historical.

Top 3 Takeaways From cyberSecure 2017
  • Companies, no matter the type or size, need to be thinking about cyber attacks; 50 percent of cyber breaches are inside threat actors.
  • Amazon Web Services (AWS) holds the largest percentage of “cloud” market share at 42 percent with the second largest being Azure, holding 14 percent of the market. Although these entities control the market, there is still a shared responsibilities model, meaning they sell the services to allow you to secure yourselves, but don't necessarily monitor your networks or notify when you've been hacked.
  • With the lack of federal regulations in place, large corporations housing sensitive data, such as Amazon, can label something an “outage.” Doing so keeps them from having to notify authorities/agencies otherwise required. By classifying the incident as something other than a hack, there is less negative impact, press, etc.
Wednesday, 13 December 2017, 13:24
TRU Tips

Security protocols don't yet have an industry-wide standard that companies can rely upon. This may mean that there will be first-mover advantages, or it could mean that the market is so fragmented that there will be many players. This can be good for investors because it creates plenty of consolidation opportunities.

Top 3 Cybersecurity Investment Stats For 2017
  • Venture capital firms invested $3.1 billion in nearly 300 cybersecurity start-ups in 2016.
  • Individual investors have a few publicly traded opportunities to gain diversified exposure to the sector.
  • Knowledgeable and experienced investors bet on firms with particular technologies, such as blockchain, which will be revolutionary or have a specific focus.
Wednesday, 06 December 2017, 12:14
Events

The third webinar in the ACEDS/TRU “Ask the Expert” fall series will be held on Thursday, November 30 at 1:00pm ET. The fall series features three months of career help in three areas and will have an open question and answer format on career topics of the audience’s choice! The November webinar will be, “Ask the Experts: New Year-New You, Your Year in Review & New Year Career Planning."

Thursday, 30 November 2017, 14:10