Uncovering Hidden Risks: Ep 12 - Cloud Security Posture Management: Top Risks and Best Practice Solutions
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: Servient – What’s Next
Sitting with the C-Suite: eDiscovery Priorities – Thoughts on the Next Five Years
Sitting with the C-Suite: Looking to the Future – Legal Tech Predictions
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
Summary: For better security when using AI in eDiscovery, cloud-based large language models and AI governance practices are critical for your program. We outline some key security considerations and benefits of these...more
Summary: Navigating eDiscovery in the era of modern data presents new complexities that can make or break a case. We explore five critical considerations outside counsel must address, including the implications of generative...more
Preparing for a Rule 26(f) meet and confer and codifying eDiscovery workflow decisions into an ESI protocol is more technically complex and challenging than ever before. In large part, this increased complexity is due to the...more
This post provides tips from our eDiscovery experts on the identification and preservation of chat data during an investigation - Chat data will inevitably need to be collected for review if an investigation or dispute...more