Podcast - "Ready for Trial?"
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
The Future of Litigation: Adapting to the Era of Nuclear Verdicts
The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Bar Exam Toolbox Podcast Episode 309: Listen and Learn -- Felony Murder and Causation (Criminal Law)
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Podcast - The 3 Core Themes of Trial Law: Do the Right Thing
Aligning Business Goals with Legal Strategies Amid Regulatory Change – Speaking of Litigation Video Podcast
House Final Settlement Hearing: Key Insights and Future Implications for NIL — Highway to NIL Podcast
The 3 Core Themes of Trial Law: Tell Your Story
What Were the Cooler Wars? (Part 2) — No Infringement Intended Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
The JustPod: Lawyer, Gentleman, and Counsel to the Stars: A Discussion with Brian McMonagle
The Subpoena Playbook
Podcast - The 3 Core Themes of Trial Law: Know Your Court
Podcast - Real Justice for Real People
The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
(Podcast) The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
Key Discovery Points: Timing is Mostly Everything in eDiscovery
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more
Hosted by American Conference Institute, the 11th Annual Advanced Forum on False Claims and Qui Tam Enforcement returns for another exciting year for lively discussions on FCA enforcement including the ramifications of two...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more