Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Can Cyber Investigations Be Canned? - Unauthorized Access Podcast
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more
Falsified documents have been used to support (or defend against) legal claims for hundreds of years. While analysis may once have focussed areas such as handwriting, the composition of ink or the alignment of typewriter...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Every version of Microsoft Windows brings along improvements in speed, performance, and visuals. Additional “under the hood” elements continue to be introduced that assist in digital forensic investigations. With Windows...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Is that document authentic? When was that photo actually taken? Who is the real owner of that file? Where did that email come from? The tools and techniques used by Digital Forensics experts answer these questions, and more....more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more