No Password Required: CISO at RSA and Champion of a Passwordless Future
Legal AI in Practice: Firm Governance, Build vs. Buy Decisions, and Vendor Due Diligence — The Good Bot Podcast
Building a Quantifiable Business Case for AI in Corporate Legal Departments
Identifying Good and Bad Use Cases for AI for Law Firms
No Password Required: Founder of ThreatLocker and the Zero-Trust Revolution
Building the Case: Construction Litigation Essentials
Key Discovery Points: If You’re Planning to Submit GenAI Deepfake Evidence, Make Sure It’s Believable
The Modern Discovery Traps that Are Upending Cases
No Password Required: Building Trust at Intel and the Poker Table
The "Lesser-Included" Email Debate: What Does Rule 34 Really Require for Production?
Key Discovery Points: If You Misrepresent, You Might Face a Forensic Event
Key Discovery Points: Stay Aware of the Bundled Metadata in Digital Photos!
Key Discovery Points: Who Possesses or Controls Documents in Slack?
Key Discovery Points: May The Sales Force Be With Your Hyperlinked Files
No Password Required: Starbucks’ Security Pro Went From Cyber Competitions to Corporate Red Teaming
Key Discovery Points: Try to Reduce Blunderbuss in Requests for Databases in Civil Discovery
Key Discovery Points: Think About Who Has Control Over a Hyperlinked File
eDiscovery and Compliance Programs
Key Discovery Points: A Gentle Distinction for Agentic AI
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
Often, in the first 48 hours after a key employee resigns, the employer must decide whether to address the departure as a manageable issue or escalate it into a legal or business dispute. While many resignations might appear...more
One area where artificial intelligence has gained a strong foothold in litigation practice is in the preparation and cross-examination of expert witnesses. This shouldn’t be surprising. Expert opinions are frequently...more
Electronically stored information is now the backbone of virtually all litigated matters, regulatory inquiries, and internal investigations. Emails, mobile data, cloud platforms, collaboration tools, and system artifacts...more
In many, if not most, cases, a litigant producing documents aggressively claims privilege protection, presumably figuring that “there’s no harm in asking.” But sometimes there is. In Berkovec v. Blue Matrix I, LLC, Index...more
Lively v. Wayfarer Studios LLC, 2026 WL 145483 (S.D.N.Y. Jan. 20, 2026), is the latest in a long line of discovery and other decisions in this matter. The court wrote: “Before the Court are various requests for sealing and...more
Agentic AI is here for in-house legal teams. In simplest terms, it’s the latest evolution of AI and moves beyond behind the scenes passive assistance to action-oriented agents that once created can operate for you to plan,...more
Dans l’arrêt SS&C Technologies Canada Corporation c. Bank of New York Mellon Corporation, on s’attend à ce que la Cour suprême du Canada (la « CSC ») donne des indications nationales sur la spoliation — soit la destruction...more
Counsel and incident responders know the first 72 hours of a cyber incident are unforgiving. In the rush to triage, remediate, and notify, organizations can lose sight of a critical objective: preserving attorney-client...more
Editor’s Note: Legal hold failures are often judged with hindsight, as though preservation problems could be avoided with a simple tweak or a few words. Contributing author and seasoned eDiscovery attorney Phil Favro...more
Businesses across many industries are racing to capture the value of artificial intelligence (AI) notetakers and meeting recording tools. The promise is obvious: faster follow‑ups, searchable records, and fewer dropped...more
Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and...more
eDiscovery has become increasingly complex and costly. What once involved a few servers and email archives has become a vast network of cloud systems, collaboration tools, and AI-driven applications. As the volume and variety...more
Digital evidence is fragile, complex, and constantly changing. This article outlines five essential steps in forensic technology investigations, explaining why deleted data may still exist, how cloud and device data differ,...more
In the context of third-party liability claims, a familiar arrangement arises when an insurer retains defense counsel for its insured: the tripartite relationship among the insured, the insurer, and defense counsel. While...more
Internal investigations are an important component of an effective legal and compliance program within health care organizations. These investigations may arise from many varied situations ranging from patient complaints,...more
The fundamental building blocks of effective trial advocacy are remarkably unchanged, despite vast changes in how information is found, analyzed, and presented in courtrooms, hearing rooms, arbitrations, and mediations. In...more
On January 5, 2026, the federal U.S. District Court for the Southern District of New York upheld two discovery orders requiring OpenAI to produce a sample of 20 million de-identified user logs from ChatGPT as part of...more
If you are involved in litigation, investigations, or regulatory compliance, you might be wondering what is document review? Document review is the process of examining documents and electronically stored information to...more
If you are involved in litigation or regulatory discovery, understanding what an ESI protocol is is essential. An ESI protocol is a written agreement that defines how electronically stored information will be identified,...more
If you are facing a lawsuit with extensive discovery obligations, understanding how federal rules govern the exchange of information is critical. Federal Rule of Civil Procedure 34 plays a central role in this process by...more
In modern litigation, digital evidence is rarely optional. Emails, mobile data, collaboration platforms, cloud activity, and system metadata now sit at the center of many disputes. When that evidence becomes contested, the...more
Most organizations now operate across multiple collaboration platforms at the same time. Recent technology adoption data shows that Microsoft Teams remains the most prevalent internal collaboration platform, but it is rarely...more
Everyone’s finally past the first question on hyperlinked documents: yes, they’re discoverable. That debate is over. The real fight now is sharper—and it’s what makes the Carvana decision a must read: Originally Published...more
In this episode of The Good Bot, Brett Mason sits down with Leigh Zeiser, director of AI and automation at Troutman Pepper Locke, to unpack how the firm operationalizes AI responsibly. They discuss the firm's AI portfolio —...more
2025 ushered in several ESI developments affecting eDiscovery professionals. Courts have issued decisions addressing cutting-edge issues regarding AI-content. They include cases discussing preservation and production...more