Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Can Cyber Investigations Be Canned? - Unauthorized Access Podcast
The Windows Registry has been around forever and is sometimes looked at as a HIVE of random chaos. However, even after all these years there is a lot of great information that can be pulled from the registry. This...more
Falsified documents have been used to support (or defend against) legal claims for hundreds of years. While analysis may once have focussed areas such as handwriting, the composition of ink or the alignment of typewriter...more
With more employees working remotely, it's more important than ever to ensure you can preserve and collect data in a variety of ways from a variety of sources. Depending on the use case - internal investigation, government or...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more
Is that document authentic? When was that photo actually taken? Who is the real owner of that file? Where did that email come from? The tools and techniques used by Digital Forensics experts answer these questions, and more....more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more
Join Eric Shirk and George Socha as the discuss and demonstrate Tristan Mobile, a new device for quickly and simply collecting iPhone data, as well as how to make effective use of that data for lawsuits and investigations....more