Just Press "Play"
Key Discovery Points: Be a Team Player When It Comes to Production
Podcast - “I Lied Like a Dog!”
Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Podcast - How Do You Define Success?
The Three C’s for Addressing Prior Inconsistent Statements
Understanding Discovery in Commercial Litigation
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
Podcast - "Ready for Trial?"
Podcast - Every Case Is a New World
Law School Toolbox Podcast Episode 501: Listen and Learn -- Present and Future Estates (Part 1)
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Eyes on the Evidence: Powerful Legal Presentations – Speaking of Litigation Video Podcast
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more
Falsified documents have been used to support (or defend against) legal claims for hundreds of years. While analysis may once have focussed areas such as handwriting, the composition of ink or the alignment of typewriter...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Every version of Microsoft Windows brings along improvements in speed, performance, and visuals. Additional “under the hood” elements continue to be introduced that assist in digital forensic investigations. With Windows...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Is that document authentic? When was that photo actually taken? Who is the real owner of that file? Where did that email come from? The tools and techniques used by Digital Forensics experts answer these questions, and more....more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more