Key Discovery Points: Detecting AI is Difficult and Tricky!
Key Discovery Points: ESI Protocol Objection Denial Party
Key Discovery Points: Be a Team Player When It Comes to Production
From OCR to AI The Future of Media and Image Analysis in eDiscovery
AI in eDiscovery Today: An Open Conversation
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
Key Discovery Points: Do Your Best to Avoid Discovery Shenanigans!
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
What are Some of the Concerns With Applying AI to Document Review?
Biggest Benefits of Applying AI to Document Review
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more