Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Certified FTK Endpoint Investigator for XChange is a hands-on class designed to explore how to successfully utilize FTK in today’s evolving corporate environments for forensic acquisition, analysis, and electronic discovery. This session will cover endpoint review of data sources using FTK, remote collection techniques, agent deployment options, an overview of remote mobile discovery, a Smart View deep dive, and available reporting options.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will be introduced to the Modern View interface and then cover the process of creating a legal hold from a template, attaching an interview if desired, and issuing the legal hold. Custodian notifications will be covered, as will all aspects of legal hold management – setting reminders, adding and removing custodians, editing the hold text, and verifying in-place preservation. Attendees will also briefly discuss the benefits of Employee Change Monitor for Legal Holds.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will learn the ins and outs of Exterro's Automated Data Mapping. Starting with use cases as to how various roles would use the tool, we will review dashboards to see that information, assets and data sources to understand where the data may be, scans to see what types of data can be located, and all other settings to ensure a full understanding of the product.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will cover the entire Review process, from ingesting documents into the platform, working in the Review Vault, creating and managing labels, term highlighting, coding panes, readacting data, creating review projects, and producing documents. The collection process will be mentioned, but not covered in depth.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will create and report on Interviews, including how to create multiple interviews and associate the correct interview to a legal hold. We will focus on the different types of interview questions, various reporting options, and how to attach a questionnaire to a hold after it has been sent.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will discuss search options and the theories of searching and will come out of this session understanding how to create the flexible and detailed searches that some matters require.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will create requests and work with already-configured requests. Further, attendees will learn how to create and modify the request workflows. We will focus on best practices around creating these workflows.
Participants should bring their own device (BYOD) to follow along in the product. At the end of the class, participants will be able to complete exercises to gain certification in the course topic.
Attendees will participate in a technical discussion of collection – when to choose federated search, how the different connectors work, etc.
Take advantage of the opportunity to earn industry-recognized certifications onsite. Exams are proctored and available to registered participants who have signed up in advance. Please arrive early and bring any required identification. Passing the exam will validate your expertise and enhance your professional credentials.
Join Exterro Founder and CEO Bobby Balachandran as he opens XChange 2025 with a bold, forward-looking vision for the future of data risk management. In a world defined by constant complexity and unrelenting data risk, Bobby will share how Exterro is delivering what others can’t: unrivaled control over your data, AI that actually understands your workflows, and a platform trusted by the world’s most demanding organizations.
This isn’t just another roadmap—it’s a blueprint for how Exterro Intelligence, seamless integration, and unmatched accountability are empowering legal, privacy, security, and digital forensics teams to lead with clarity and confidence. Don’t miss this rare opportunity to hear directly from our founder about how Exterro is redefining what it means to be future-ready—and why our customers are more prepared, more protected, and more in control than ever before.
Discover the bold vision driving the future direction of the Exterro data risk management platform, where we'll unveil our roadmap, including major initiatives and forward-looking strategies to empower our customers to find, analyze, and protect the data they hold more efficiently and effectively than ever. Gain a deeper understanding of how our vision aligns with upcoming market trends and technological advancements.
Drawing on her extensive experience as a federal prosecutor, legal analyst, and journalist, Nancy Grace will highlight the dramatic changes that have and continue to transform how legal professionals deal with digital evidence. Citing examples taken from the headlines, she will draw parallels between criminal cases and civil litigation, calling out lessons learned, best practices, and investigatory techniques that Exterro customers can learn from and use in their professional careers.
In this session, discover how forensic review and investigative workflows can help you piece together information from multiple sources to gain a complete understanding of what happened and why. Learn how a thorough post-breach analysis not only informs immediate response but also mitigates future risk, improves incident readiness, and can help reduce regulatory penalties.
Whether you're handling investigations internally or working with external partners, this session will give you practical strategies to drive more efficient, defensible post-incident reviews.
Key Takeaways:
- Best practices for conducting forensic investigations after a breach
- How to integrate and analyze data from multiple systems for a full-picture view
- Steps to use findings for continuous improvement and future breach prevention
A data map is more than just a document—it’s the cornerstone of effective data protection, privacy compliance, and e-discovery readiness. Knowing where your personal, sensitive, and potentially discoverable data resides, how it’s used, and who has access to it is critical in today’s regulatory and legal landscape. Without a defensible data map, you can’t protect what you don’t know exists, and you can’t effectively respond to e-discovery or compliance requests.
In this session, you’ll learn how automation can deliver the speed, accuracy, and efficiency that manual processes simply can’t match. A well-constructed data map is essential for privacy compliance, conducting data risk assessments, and fulfilling data subject requests. Furthermore, it helps you manage e-discovery obligations by providing a clear inventory of data sources and workflows.
Key Takeaways:
- How to build a defensible data map that supports both privacy protection and e-discovery readiness.
- Practical strategies for faster compliance with privacy laws and more efficient fulfillment of data subject rights requests.
- Real-world examples of how automation uncovers hidden risks, strengthens security, and streamlines legal and e-discovery processes.
The data landscape is evolving faster than traditional collection methods can keep up. From Slack threads and ephemeral messages to collaborative documents and cloud-based file shares, legal and investigatory teams are under pressure to identify, preserve, and collect data from an ever-expanding array of sources. This panel will explore real-world challenges organizations face when collecting from modern platforms—and share practical, defensible strategies for doing it right. Whether responding to litigation, regulatory demands, or internal investigations, attendees will learn how to modernize their collection workflows without sacrificing defensibility or efficiency.
Key Takeaways:
- Understand the nuances of collecting from modern sources like Microsoft Teams, Google Workspace, and messaging apps—including risks and limitations.
- Build scalable, repeatable workflows that align with your organization's legal and technical realities.
- Avoid common pitfalls that lead to incomplete productions, spoliation risks, or downstream processing issues.
Celebrate with Us!
Join us for an evening of great food, good company, and well-deserved recognition at our Customer Appreciation Dinner. We’ll raise a glass to our amazing customers and spotlight a few standout stories with special awards!
Location: The Vehicle Vault
Exterro is proud to launch a new Women’s Series event at this year’s XChange, focused on empowering women—and the leaders who support them—to thrive in today’s evolving legal, privacy, and tech environments.
This premier breakfast session is open to both women and men who are committed to building more inclusive, resilient, and empowering teams.
Join Exterro Chief Customer Officer Rick Valentine for a captivating keynote interview with renowned prosecutor Marcia Clark, best known for leading the O.J. Simpson trial. In this exclusive conversation, Clark reflects on the case that captured national attention, the evolution of legal and investigative work since then, and the challenges today’s legal and law enforcement professionals face. With insights drawn from her storied career and media work, Clark will explore how integrity, preparation, and public accountability remain as critical as ever—and how Exterro’s community can lead the way.
Don’t miss this unforgettable conversation at XChange 2025.
The high-profile Karen Read trial captured national attention not only for its dramatic allegations—the murder of a police officer, hit by and SUV and left to die in a snowstorm--but also for the central role played by digital forensics and e-discovery. From text message metadata to mobile device tracking and surveillance footage, digital evidence became the backbone of the case, driving media narratives and courtroom arguments alike. This session will unpack the forensic and legal lessons from the trial, examining how investigative techniques, preservation decisions, and public scrutiny shaped the proceedings.
Key Takeaways:
- Digital evidence is front and center in both civil and criminal justice, and that demands teams prepare for scrutiny on their methods.
- Proper preservation, chain of custody, and forensic methodology are essential for defensibility--whether in a salacious murder trial or civil litigation.
- The public is more aware than ever of topics around e-discovery and digital forensics--but how does that awareness affect professionals in those fields?
Over-retention of obsolete data, especially personal data, creates significant risks for modern organizations. It increases risk exposure in the event of data breaches, for compliance with privacy and cybersecurity regulations, and in the event of civil litigation. But manually identifying data that can be defensibly deleted--much less operationalizing a process to do so--can be challenging given modern enterprise data landscapes. This panel discussion will identify how organizations can benefit across multiple risk scenarios from implementing a process to identify and defensibly dispose of data that no longer serves the business.
Key Takeaways:
- Why organizations end up over-retaining data even though they understand the risks it may pose
- How different compliance, information security, and legal functions benefit from defensible data disposition
- How to develop and implement a defensible data disposition program
Document review doesn't have to be a costly, time-consuming process. In this session, we explore how Exterro’s powerful platform, in collaboration with our partner Integreon, helped Stantec save both time and money while reviewing millions of documents. This case study demonstrates the efficiency gains and the technological advancements in legal operations and cybersecurity, highlighting the transformative power of automation and data-driven insights.
Key Takeaways:
- Learn how Exterro’s document review technology enables faster and more accurate results, cutting down on manual labor.
- Understand the significant cost savings Stantec achieved by partnering with Integron for scalable solutions.
- Explore practical examples of how Exterro’s platform can be applied to different industries (legal, privacy, forensics) for improved operational workflows.
In an era of hybrid work, BYOD policies, and fast-moving investigations, mobile data is often the missing piece in e-discovery and internal investigations. Yet many organizations still struggle to collect mobile content efficiently, defensibly, and without disrupting employees. This roundtable will explore why remote mobile collection has become a critical capability—from internal investigations and e-discovery to regulatory audits—and how Exterro Remote Mobile Discovery gives legal and digital forensics teams a means to collect remote mobile data that is both secure and scalable.
Key Takeaways:
- What challenges and disadvantages organizations face when employing traditional methods to investigate mobile devices
- How Exterro Remote Mobile Discovery works at a technical level
- How legal and investigatory teams can benefit from having a remote mobile collection solution integrated with their review platform
Join us for a fun, fast-paced jeopardy-style session where e-discovery, forensics, and privacy experts face off in a battle of wits! You’ll have the chance to participate in this interactive game, asking and answering questions on the latest best practices, emerging challenges, and career development tips in the world of e-discovery and data risk management. Along the way, our panel will highlight how Exterro’s solutions are helping organizations navigate these challenges and streamline their processes. Whether you’re a seasoned pro or just starting out, this is a great way to refresh your knowledge while having some fun with experts in the field.
Key Takeaways:
- Refresh your understanding of key e-discovery, forensics, and privacy best practices through interactive jeopardy-stye game
- Learn new strategies and tips from experts on managing data risks, navigating regulatory changes, and growing your career
- Engage in a friendly, competitive environment with your peers and the experts in the field
- Discover how Exterro’s solutions can help streamline your processes, improve defensibility, and reduce risk
From familiar capabilities like document summarization and translation, Smart Labeling, and video and image recognition to the rollout of our new, agentic Exterro Assist for Data, Exterro users have been benefiting from our investments in AI for over a decade. But what is Exterro Intelligence, and how is it different from other technology companies' versions of AI. Join General Counsel Jenny Hamilton and Kousik Chandrasekharan, Director of AI Products, for an in-depth discussion of the what, why, and how behind our innovative, privacy-first AI capabilities.
Key Takeaways:
- Learn how Exterro Intelligence manifests across our e-discovery, data privacy, security, and governance, and digital forensics and incident response technology.
- Understand the characteristics of and risks posed by different forms of artificial intelligence, like large language models, generative AI, agentic AI, and more.
- Learn how Exterro Intelligence keeps customers' sensitive data secure while providing defensible insights and accelerating workflows.
Enterprises using Microsoft 365 environments unlock powerful new capabilities, but also have to navigate a complex web of integration, data governance, and preservation challenges, especially with regards to e-discovery. In this candid tech talk, Exterro experts and practitioners will break down the biggest pain points in deploying M365 alongside your existing legal and IT infrastructure—and how to solve them. You’ll learn which M365 features are truly enterprise-ready, how to avoid common missteps in data architecture, and what a modern preservation strategy looks like when tools like Microsoft Purview create the illusion of simplicity. Most importantly, we’ll explore how Exterro’s platform brings control, clarity, and defensibility to your M365 environment.
Key Takeaways:
- How to identify potential trouble spots for e-discovery operations in Microsoft Office 365 environments
- Why Microsoft Office 365's internal e-discovery solutions might not be enough to meet modern court requirements
- How Exterro integrates with Microsoft Office 365 to deliver efficient, defensible e-discovery operations
In this interactive session, our panel will share expert tips on maximizing value while driving efficiency and defensibility in internal forensic investigations. In today’s corporate world, the need for streamlined, secure, and legally sound investigations is critical. This session will equip legal, forensic, and IT professionals with actionable strategies to improve their internal investigation processes, ensuring both speed and compliance.
Key Takeaways:
- Best practices for conducting efficient and defensible internal forensic investigations.
- Insights into collaboration between legal, forensic, and IT teams to enhance investigative outcomes.
- Practical tips for leveraging Exterro’s solutions to streamline forensic workflows and reduce risks.
Legal and investigative teams often approach the same data from very different angles—but what if those perspectives could align for greater efficiency, insight, and defensibility? In this dynamic, participant-driven breakout session, you’ll join peers from across legal, compliance, and forensics roles to explore how to close the communication and process gaps that persist between e-discovery and digital forensics. Moderated discussions will spark real-world dialogue on overlapping responsibilities, shared challenges, and actionable strategies for unifying teams and technology. Whether you're in legal ops or forensic investigations, this is your chance to contribute, learn, and lead.
Key Takeaways:
- Identify common pitfalls where legal and forensics workflows most often collide—and how to avoid disconnects in preservation, chain of custody, and evidence handling.
- Learn practical strategies to foster better communication and alignment between teams, from early case assessment to litigation response.
- Explore how integrated platforms and shared protocols can streamline your investigative and discovery efforts for faster, more defensible outcomes.
Outsourcing e-discovery might seem convenient, but it often comes with hidden costs, delays, and lost visibility. In this session, learn how keeping more of your e-discovery process in-house--especially document review--can deliver better outcomes, faster response times, and dramatic cost savings. We’ll explore how modern organizations are leveraging integrated platforms, automation, and intelligent data management to reduce reliance on service providers without sacrificing defensibility or performance.
Key Takeaways:
- How to assess if moving e-discovery review in-house might make sense for you
- How to build and manage an e-discovery process that keeps data in-house during document review
- Negotiating and working with outside counsel and legal service providers in in-house environments
Legal holds are foundational to defensible e-discovery—but in today’s complex data environments, they’re only part of the equation. From short-lived collaboration tools to sprawling mobile communications, effective preservation demands a more proactive, nuanced approach. This panel brings together in-house experts to explore modern preservation challenges, what courts expect beyond issuing a hold notice, and how organizations can close the gap between policy and practice. Attendees will leave with actionable strategies to strengthen preservation workflows and reduce spoliation risk—without over-preserving or overcomplicating.
Key Takeaways:
- How modern data types like ephemeral messaging, BYOD, and hyperlinked files require new approaches to preservation
- An understanding of courts' expectations for ESI preservation beyond issuing a legal hold
- Best practices and technology tips to ensure you stay on the right side of legal requirements