All Episodes
Digital Detectives — 155 episodes
INTRODUCING: For the Innocent Season 3 | Amanda Knox, JJ Velasquez, and More
INTRODUCING: Leading the Bar
10 Startling Cybersecurity Statistics and What They Mean for the Future of Law Firms
Enhancing Law Firm Cybersecurity: The Ten Most Important Steps
Bad Tech Habits Your Firm Needs to Break
Seven Use Cases Where AI can be a Hero to Digital Forensics
Generative AI and ChatGPT: Why the Legal Industry Needs to “Brace for Impact”
Threats to Your Law Firm: Insiders and Outsiders
BakerHostetler’s Data Security Incident Response Report Released
E-Discovery Disrupted by the AI Revolution
Dean Andy Perlman on the Role of Artificial Intelligence in Law Schools
ITRC’s 17th Annual Data Breach Report Reveals Near-Record Number of Breaches
It’s a Good Time for a Cybersecurity Checkup
Holidays and Weekends: Prime Time for Cyberattacks
The Ethics of Communicating with Your Clients and Using Your Smartphone
What Constitutes Ethical Cybersecurity for Law Firms Today?
ILTACON Roars Back in 2022 – Here’s What You Missed
Ripped From the Headlines: Alex Jones and Inadvertent Waiver
Advice for Law Firms from a Data Breach/Privacy Lawyer
How Secure is Your Law Firm’s Data?
Revealing Stats from the 8th Annual BakerHostetler Data Security Incident Response Report
Russia’s Digital Iron Curtain
Cybersecurity: A Lawyer’s Ethical Duty to Read the News
ITRC’s 2021 Data Breach Report: Sobering Stats
2022: What’s White Hot in Cybersecurity?
Law Firms, Take Notice: The US is Cracking Down on Ransomware Gangs
Why are Businesses, Including Law Firms, So Vulnerable to Ransomware?
The SANS Institute and Cybersecurity Careers
Planning Your Cybersecurity Budget for 2022
Ten Tips for Better ESI Expert Reports from Craig Ball
Top 10 Tips: Effective Cybersecurity Awareness Training for Law Firm Employees
Cybersecurity Priorities for President Biden
Occam’s Razor — A SolarWinds Perspective for Law Firms
2021 Update: Security Assessments and Penetration Testing for Law Firms
Clio’s Legal Trends Report 2020: A Look Into the Future of Law
Ransomware Surges: What Law Firms Need to Know
“Zooming” Into 2021 with Audio/Video Discovery
The Perils of Biometric Information: Relevant Laws and Insurance Coverage for Biometric Lawsuits
Penetration Tests and Cybersecurity Assessments: What Lawyers Need to Know
The Battle Against COVID-19: How eDiscovery Software is Playing a Role
Work-At-Home and Remote Access – It’s Time for a Security Review
eDiscovery Before and After COVID-19: What to Expect
Securing Microsoft Windows and Microsoft 365
Coronavirus and Working Remotely: What You Need to Know
The 2019 Data Breach Numbers Are In – What Are They and What Do They Mean for 2020?
The Intersection of Ethics and Artificial Intelligence
The EDRM’s Mary Mack & Kaylee Walstad Unplugged
Why the Cloud is the New Electricity–and What it Means to Lawyers
Dos and Don'ts of a 30(b)(6) Witness Deposition
How Lawyers Collect and Properly Authenticate Evidence from the Web
ABA Passes Resolution Urging Legal Profession to Study Legal and Ethical Issues of AI
Digital Dilemma: Your IoT Device May Be Testifying Against You
Guidance for Lawyers with Cybersecurity Paralysis
Data Breach Lawyers: A View from the Trenches
Internet Defamation: What Lawyers Need to Know
Digital Forensics on Mobile Devices
Breaking and Entering: The Fascinating Life of a Professional Pen Tester
eDiscovery: Major Developments in 2018 and a Look Ahead
Our Favorite Cybersecurity Resources
ECybersecurity: Getting to Good for the Small Law Firm
The Evolving Landscape of Law Firm Data Breach Preparation and Response
Securing Office 365: An Ethical Imperative for Lawyers
Cyber Security Awareness Training
Is the California Consumer Privacy Act Part of a Trend?
Is Working with Virtual Assistants Putting your Law Firm in Danger?
The FBI’s Access to iPhone Data: Apple Fights Back
Fastcase’s Artificial Intelligence Sandbox
Ethical Misadventures in E-Discovery
Cyber Insurance: Expensive, Complicated, and Necessary
What Makes a Preservation Letter Presidential
Privacy vs. Protection: Warrantless Phone Searches at the Border
Kaspersky Lab: Friend or Foe?
A Breach of Trust: The Aftermath of the Equifax Hack
How Lawyers Should Use Spreadsheets
Crisis Management After a Data Breach
Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage
Ethical Issues with Confidential Data
Cybersecurity for Macs
Practical Approaches to Preserving New (and Not-So-New) Media
Electronic Security Sweeps for Law Firms and their Clients
Smishing, a Growing Cyber Security Threat
The Ransomware Epidemic in Law Firms: A Guide to Defense and Survival
Obama vs. Trump on Cyber Security
The Top Hot Topics in eDiscovery
The Importance of Website Security for Law Firms
Encryption, Cyber Security, and Domestic Surveillance
Cyber Security for Small Firms and Solo Practices
The 2016 Georgetown Ediscovery Training Academy
Mandiant’s M-Trends and Verizon’s Data Breach Investigation Reports
The Panama Papers: The World’s Largest Data Breach
Cyber Security Audits and Options for Your Law Firm
Edward Snowden's Legal Advisor Sides with Apple in FBI Battle Over Encryption
What Law Firms Should Know About the FBI’s InfraGard Program
Technology Assisted Review for Smart People
Paris Attacks: The Digital Investigation, ISIS, and The Response
Catalyst’s Free E-Discovery Practicum for Law Schools
A New Dawn for the Association of E-Discovery Specialists
Hillary Clinton’s Emails and the Looming Issue of Shadow IT
Why are Law Firms Beginning to Form Data Breach Practice Groups?
E-Discovery Reflections from Retired Magistrate Judge John Facciola
Lawmageddon and How to Prepare for Social Media in the Courtroom
Judge Andrew Peck on TAR (Technology-Assisted Review)
The Law of Robotics: Autonomy, Responsibility, and Risk
Forensic Science in the Criminal Justice System: What is Admissible?
The Government’s Dark Data: A Decade of Discovery
The Sony Hack: You Can’t Keep the Barbarians Outside the Gate
Issues and Trends in E-Discovery and Information Governance
War & Terrorism in Cyberspace: Wild, Wild West Shoot Out on the International Frontiers
Predictive Coding for Rookies: E-Discovery in the Courtroom
Rule 37(e) of the Federal Rules of Civil Procedure: Changes for ESI Preservation and Spoliation
Cull, Baby, Cull - Modern Trends in Data Collection and Analysis
Data Breaches, eDiscovery, and the Importance of Digital Forensics
77% of Lawyers Can’t Be Trusted With Confidential Client Data
The FBI’s Massive Facial Recognition Database: Privacy Implications
Perils of Law Firms Possessing Massive Amounts of Unreviewed Client Data
The Ethical Implications of NSA Surveillance for Lawyers
The Kindergarten Version of Information Security for Lawyers
What Should Lawyers Know About Information Governance?
Data Breaches in the Healthcare Industry: Lessons for Law Firms
A State Judge’s Perspective On E-Discovery
The Implications of NSA Surveillance for Lawyers
Cyber Risk Management for Lawyers
Hot Developments Among E-Discovery Vendors
Highlights from the 2013 Georgetown E-Discovery Training
E-Discovery: Why You Should Go Native!
Cyber Threats to Law Firms and Businesses: How Do We Defend Ourselves?
Scary Tech: Lessons from ABA TECHSHOW 2013
Special Masters in E-Discovery
Metadata: What You Can’t See Can Hurt You!
Ouch! Lessons Learned from the Morgan Lewis’ Redaction Disaster
Focus on Privacy: The Facebook Internet Tracking Case
The Craigslist Killer: A Case Study in Digital Forensics
Brainless Blunders in E-Discovery Searches
Predictive Coding: A Rose by Any Other Name
The Best Resources for Staying Current in E-Discovery
Smartphone Security
Cost-Effective E-Discovery in Small Cases
The Future of E-Discovery
Controversial Issues in E-Discovery
Interactive Whiteboard Technology in Courtrooms and Law Firms
E-Discovery - Without the High Price Tag
Is it Possible to Secure Law Firm Data?
Proportionality in e-Discovery: A UK Perspective
The Meet and Confer: Getting it Right
The Five Hottest Topics in E-Discovery
The Deplorable State of Law Firm Security
Performing Quality E-Discovery Searches: Is it Time to Set Some Standards?
Expert Witnesses in E-Discovery
Ethical Issues in E-Discovery
Sexting and Sextortion: Texting and Extortion Get a XXX Twist
Inside Social Media Archiving
Ethics & E-Discovery
An Inside Look at the 2010 Civil Litigation Conference at Duke Law School
Current Issues in Computer Forensics
A Look at Data Breaches