Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Can Cyber Investigations Be Canned? - Unauthorized Access Podcast
In the aftermath of a cyberattack, forensic investigations are often launched under intense pressure to identify what went wrong, why, and how to fix it. A common practice following such an investigation is the preparation of...more
Key Takeaway: Ephemeral messaging creates compliance and legal risks by auto-deleting business communications, complicating digital forensics. Automated archiving solutions help organizations proactively capture and preserve...more
Justin Tolman, forensic evangelist for EDRM's longstanding Trusted Partner Exterro, sits down with EDRM's Mary Mack and Holley Robinson. In this episode, Justin shares his journey from traditional IT work to serving in a...more
I was recently in Chicago for Relativity Fest 2025 and completed a sunrise run around Navy Pier during the week. Let me be clear, I did NOT stay in town to participate in the 47th running of the Chicago Marathon. I did,...more
A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more
When most people think of Artificial Intelligence (AI), they often envision Generative AI (Gen-AI) tools that create content (such as images, videos, or text) or imagine futuristic scenarios involving intelligent robots or...more
White Collar Crime in the Digital Age: Emerging Trends and Investigation Techniques - The digital revolution has transformed white-collar crime into a sophisticated enterprise, leveraging technology to execute complex...more
The world of data and tech are advancing at lightning speed. Associated with this, governments and regulators are imposing more robust frameworks and legislative requirements to help safeguard organisations and the data they...more
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
White-collar and financial crimes have risen sharply, with the U.S. DOJ reporting a 300% increase in monetary recoveries in 2024. Successful investigations now require a proactive and adaptable approach to detect and prevent...more
In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
As deepfake technology becomes increasingly sophisticated and accessible, courts are now facing unprecedented challenges in distinguishing authentic evidence from AI-generated fabrications. This issue, particularly critical...more
‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more
This week, hosts Tina and Cherie are joined by Clark Walton, a Digital Forensics Expert, Attorney, and Legal Forensics Instructor for Reliance Forensics. They have an insightful discussion on digital forensics and what...more
The Windows Registry has been around forever and is sometimes looked at as a HIVE of random chaos. However, even after all these years there is a lot of great information that can be pulled from the registry. This...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
People, it doesn't work. There was a court decision last week from my home state of North Carolina that left me shaking my head. A social worker sued her ex-employer, a non-profit, claiming (among other things) that she...more
...The internet-enabled virtual world of the metaverse is capturing the imagination of so many people that by the end of the decade five billion could be using it, according to a forecast by Citi. The metaverse is also...more
When a business experiences a data security incident, there is invariably one principal question that the affected business wants answered: Who do we tell? Originally published in Law360 on December 2, 2022....more
According to the Verizon Wireless 2022 Data Breach Investigations Report, there are four prominent paths that threat actors use to gain unauthorized access into an organization’s network... Originally published in Law360 on...more
Can cyber investigations be canned? Find out what Sadia, Kamran, and this month’s guest, Shawn Tuma of Spencer Fane, have to say. The gloves come off as these three breach coaches duke it out for the final word on this topic....more