Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
INTRODUCING: For the Innocent Season 3 | Amanda Knox, JJ Velasquez, and More
|
Sep 08, 2025 |
|
INTRODUCING: Leading the Bar
|
Jun 30, 2025 |
|
10 Startling Cybersecurity Statistics and What They Mean for the Future of Law Firms
|
Nov 17, 2023 |
|
Enhancing Law Firm Cybersecurity: The Ten Most Important Steps
|
Oct 19, 2023 |
|
Bad Tech Habits Your Firm Needs to Break
|
Sep 21, 2023 |
|
Seven Use Cases Where AI can be a Hero to Digital Forensics
|
Aug 24, 2023 |
|
Generative AI and ChatGPT: Why the Legal Industry Needs to “Brace for Impact”
|
Jul 20, 2023 |
|
Threats to Your Law Firm: Insiders and Outsiders
|
Jun 15, 2023 |
|
BakerHostetler’s Data Security Incident Response Report Released
|
May 18, 2023 |
|
E-Discovery Disrupted by the AI Revolution
|
Apr 20, 2023 |
|
Dean Andy Perlman on the Role of Artificial Intelligence in Law Schools
|
Mar 23, 2023 |
|
ITRC’s 17th Annual Data Breach Report Reveals Near-Record Number of Breaches
|
Feb 24, 2023 |
|
It’s a Good Time for a Cybersecurity Checkup
|
Jan 20, 2023 |
|
Holidays and Weekends: Prime Time for Cyberattacks
|
Dec 15, 2022 |
|
The Ethics of Communicating with Your Clients and Using Your Smartphone
|
Nov 17, 2022 |
|
What Constitutes Ethical Cybersecurity for Law Firms Today?
|
Oct 20, 2022 |
|
ILTACON Roars Back in 2022 – Here’s What You Missed
|
Sep 29, 2022 |
|
Ripped From the Headlines: Alex Jones and Inadvertent Waiver
|
Aug 18, 2022 |
|
Advice for Law Firms from a Data Breach/Privacy Lawyer
|
Jul 28, 2022 |
|
How Secure is Your Law Firm’s Data?
|
Jun 23, 2022 |
|
Revealing Stats from the 8th Annual BakerHostetler Data Security Incident Response Report
|
May 19, 2022 |
|
Russia’s Digital Iron Curtain
|
Apr 21, 2022 |
|
Cybersecurity: A Lawyer’s Ethical Duty to Read the News
|
Mar 17, 2022 |
|
ITRC’s 2021 Data Breach Report: Sobering Stats
|
Feb 17, 2022 |
|
2022: What’s White Hot in Cybersecurity?
|
Jan 27, 2022 |
|
Law Firms, Take Notice: The US is Cracking Down on Ransomware Gangs
|
Dec 16, 2021 |
|
Why are Businesses, Including Law Firms, So Vulnerable to Ransomware?
|
Nov 18, 2021 |
|
The SANS Institute and Cybersecurity Careers
|
Oct 21, 2021 |
|
Planning Your Cybersecurity Budget for 2022
|
Sep 28, 2021 |
|
Ten Tips for Better ESI Expert Reports from Craig Ball
|
Aug 20, 2021 |
|
Top 10 Tips: Effective Cybersecurity Awareness Training for Law Firm Employees
|
Jul 27, 2021 |
|
Why Solo, Small, and Mid-Size Law Firms Get a Failing Grade in Cybersecurity
|
Jun 17, 2021 |
|
Startling Stats from the BakerHostetler Data Security Incident Response Report
|
May 20, 2021 |
|
Is This How the World Ends? Artificial Intelligence and American Security
|
Apr 14, 2021 |
|
Cybersecurity Priorities for President Biden
|
Mar 18, 2021 |
|
Occam’s Razor — A SolarWinds Perspective for Law Firms
|
Feb 18, 2021 |
|
2021 Update: Security Assessments and Penetration Testing for Law Firms
|
Jan 28, 2021 |
|
Clio’s Legal Trends Report 2020: A Look Into the Future of Law
|
Dec 17, 2020 |
|
Ransomware Surges: What Law Firms Need to Know
|
Nov 19, 2020 |
|
“Zooming” Into 2021 with Audio/Video Discovery
|
Oct 15, 2020 |
|
The Perils of Biometric Information: Relevant Laws and Insurance Coverage for Biometric Lawsuits
|
Sep 24, 2020 |
|
Penetration Tests and Cybersecurity Assessments: What Lawyers Need to Know
|
Aug 20, 2020 |
|
The Battle Against COVID-19: How eDiscovery Software is Playing a Role
|
Jul 16, 2020 |
|
Work-At-Home and Remote Access – It’s Time for a Security Review
|
Jun 18, 2020 |
|
eDiscovery Before and After COVID-19: What to Expect
|
May 21, 2020 |
|
Securing Microsoft Windows and Microsoft 365
|
Apr 23, 2020 |
|
Coronavirus and Working Remotely: What You Need to Know
|
Mar 23, 2020 |
|
The 2019 Data Breach Numbers Are In – What Are They and What Do They Mean for 2020?
|
Feb 27, 2020 |
|
The Intersection of Ethics and Artificial Intelligence
|
Jan 31, 2020 |
|
The EDRM’s Mary Mack & Kaylee Walstad Unplugged
|
Dec 20, 2019 |
|
Why the Cloud is the New Electricity–and What it Means to Lawyers
|
Dec 05, 2019 |
|
Dos and Don'ts of a 30(b)(6) Witness Deposition
|
Oct 24, 2019 |
|
How Lawyers Collect and Properly Authenticate Evidence from the Web
|
Sep 30, 2019 |
|
ABA Passes Resolution Urging Legal Profession to Study Legal and Ethical Issues of AI
|
Aug 29, 2019 |
|
Digital Dilemma: Your IoT Device May Be Testifying Against You
|
Jul 23, 2019 |
|
Guidance for Lawyers with Cybersecurity Paralysis
|
Jun 25, 2019 |
|
Data Breach Lawyers: A View from the Trenches
|
May 28, 2019 |
|
Internet Defamation: What Lawyers Need to Know
|
Apr 18, 2019 |
|
Digital Forensics on Mobile Devices
|
Mar 28, 2019 |
|
Breaking and Entering: The Fascinating Life of a Professional Pen Tester
|
Feb 26, 2019 |
|
eDiscovery: Major Developments in 2018 and a Look Ahead
|
Jan 30, 2019 |
|
Our Favorite Cybersecurity Resources
|
Dec 26, 2018 |
|
Cybersecurity: Getting to Good for the Small Law Firm
|
Nov 27, 2018 |
|
The Evolving Landscape of Law Firm Data Breach Preparation and Response
|
Oct 29, 2018 |
|
Securing Office 365: An Ethical Imperative for Lawyers
|
Sep 18, 2018 |
|
Cyber Security Awareness Training
|
Aug 27, 2018 |
|
Is the California Consumer Privacy Act Part of a Trend?
|
Jul 23, 2018 |
|
Is Working with Virtual Assistants Putting your Law Firm in Danger?
|
Jun 26, 2018 |
|
The FBI’s Access to iPhone Data: Apple Fights Back
|
May 30, 2018 |
|
Fastcase’s Artificial Intelligence Sandbox
|
Apr 23, 2018 |
|
Ethical Misadventures in E-Discovery
|
Mar 29, 2018 |
|
Cyber Insurance: Expensive, Complicated, and Necessary
|
Feb 28, 2018 |
|
What Makes a Preservation Letter Presidential
|
Jan 30, 2018 |
|
Privacy vs. Protection: Warrantless Phone Searches at the Border
|
Dec 29, 2017 |
|
Kaspersky Lab: Friend or Foe?
|
Nov 21, 2017 |
|
A Breach of Trust: The Aftermath of the Equifax Hack
|
Oct 24, 2017 |
|
How Lawyers Should Use Spreadsheets
|
Sep 19, 2017 |
|
Crisis Management After a Data Breach
|
Aug 17, 2017 |
|
Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage
|
Jul 17, 2017 |
|
Ethical Issues with Confidential Data
|
Jun 19, 2017 |
|
Cybersecurity for Macs
|
May 19, 2017 |
|
Practical Approaches to Preserving New (and Not-So-New) Media
|
Apr 18, 2017 |
|
Electronic Security Sweeps for Law Firms and their Clients
|
Mar 14, 2017 |
|
Smishing, a Growing Cyber Security Threat
|
Feb 14, 2017 |
|
The Ransomware Epidemic in Law Firms: A Guide to Defense and Survival
|
Jan 17, 2017 |
|
Obama vs. Trump on Cyber Security
|
Dec 20, 2016 |
|
The Top Hot Topics in eDiscovery
|
Nov 18, 2016 |
|
The Importance of Website Security for Law Firms
|
Oct 12, 2016 |
|
Encryption, Cyber Security, and Domestic Surveillance
|
Sep 15, 2016 |
|
Cyber Security for Small Firms and Solo Practices
|
Aug 18, 2016 |
|
The 2016 Georgetown Ediscovery Training Academy
|
Jul 21, 2016 |
|
Mandiant’s M-Trends and Verizon’s Data Breach Investigation Reports
|
Jun 29, 2016 |
|
The Panama Papers: The World’s Largest Data Breach
|
May 23, 2016 |
|
Cyber Security Audits and Options for Your Law Firm
|
Apr 06, 2016 |
|
Edward Snowden's Legal Advisor Sides with Apple in FBI Battle Over Encryption
|
Mar 11, 2016 |
|
What Law Firms Should Know About the FBI’s InfraGard Program
|
Jan 28, 2016 |
|
Technology Assisted Review for Smart People
|
Dec 30, 2015 |
|
Paris Attacks: The Digital Investigation, ISIS, and The Response
|
Nov 20, 2015 |
|
Catalyst’s Free E-Discovery Practicum for Law Schools
|
Nov 10, 2015 |
|
A New Dawn for the Association of E-Discovery Specialists
|
Oct 06, 2015 |
|
Hillary Clinton’s Emails and the Looming Issue of Shadow IT
|
Sep 03, 2015 |
|
Why are Law Firms Beginning to Form Data Breach Practice Groups?
|
Aug 26, 2015 |
|
E-Discovery Reflections from Retired Magistrate Judge John Facciola
|
Jul 23, 2015 |
|
Lawmageddon and How to Prepare for Social Media in the Courtroom
|
Jun 08, 2015 |
|
Judge Andrew Peck on TAR (Technology-Assisted Review)
|
May 08, 2015 |
|
The Law of Robotics: Autonomy, Responsibility, and Risk
|
Mar 31, 2015 |
|
Forensic Science in the Criminal Justice System: What is Admissible?
|
Feb 26, 2015 |
|
The Government’s Dark Data: A Decade of Discovery
|
Jan 21, 2015 |
|
The Sony Hack: You Can’t Keep the Barbarians Outside the Gate
|
Jan 16, 2015 |
|
Issues and Trends in E-Discovery and Information Governance
|
Dec 16, 2014 |
|
War & Terrorism in Cyberspace: Wild, Wild West Shoot Out on the International Frontiers
|
Nov 13, 2014 |
|
Predictive Coding for Rookies: E-Discovery in the Courtroom
|
Oct 27, 2014 |
|
Rule 37(e) of the Federal Rules of Civil Procedure: Changes for ESI Preservation and Spoliation
|
Sep 24, 2014 |
|
Cull, Baby, Cull - Modern Trends in Data Collection and Analysis
|
Aug 18, 2014 |
|
Data Breaches, eDiscovery, and the Importance of Digital Forensics
|
Jul 28, 2014 |
|
77% of Lawyers Can’t Be Trusted With Confidential Client Data
|
Jul 07, 2014 |
|
The FBI’s Massive Facial Recognition Database: Privacy Implications
|
May 24, 2014 |
|
Perils of Law Firms Possessing Massive Amounts of Unreviewed Client Data
|
Apr 11, 2014 |
|
The Ethical Implications of NSA Surveillance for Lawyers
|
Mar 21, 2014 |
|
The Kindergarten Version of Information Security for Lawyers
|
Feb 24, 2014 |
|
What Should Lawyers Know About Information Governance?
|
Jan 21, 2014 |
|
Data Breaches in the Healthcare Industry: Lessons for Law Firms
|
Dec 13, 2013 |
|
A State Judge’s Perspective On E-Discovery
|
Nov 07, 2013 |
|
The Implications of NSA Surveillance for Lawyers
|
Oct 04, 2013 |
|
Cyber Risk Management for Lawyers
|
Sep 13, 2013 |
|
Hot Developments Among E-Discovery Vendors
|
Aug 06, 2013 |
|
Highlights from the 2013 Georgetown E-Discovery Training
|
Jul 03, 2013 |
|
E-Discovery: Why You Should Go Native!
|
Jun 13, 2013 |
|
Cyber Threats to Law Firms and Businesses: How Do We Defend Ourselves?
|
May 07, 2013 |
|
Scary Tech: Lessons from ABA TECHSHOW 2013
|
Apr 26, 2013 |
|
Special Masters in E-Discovery
|
Oct 10, 2012 |
|
Metadata: What You Can’t See Can Hurt You!
|
Sep 18, 2012 |
|
Ouch! Lessons Learned from the Morgan Lewis’ Redaction Disaster
|
Aug 27, 2012 |
|
Focus on Privacy: The Facebook Internet Tracking Case
|
Jul 20, 2012 |
|
The Craigslist Killer: A Case Study in Digital Forensics
|
Jun 12, 2012 |
|
Brainless Blunders in E-Discovery Searches
|
Apr 18, 2012 |
|
Predictive Coding: A Rose by Any Other Name
|
Mar 23, 2012 |
|
The Best Resources for Staying Current in E-Discovery
|
Feb 16, 2012 |
|
Smartphone Security
|
Jan 20, 2012 |
|
Cost-Effective E-Discovery in Small Cases
|
Dec 15, 2011 |
|
The Future of E-Discovery
|
Nov 15, 2011 |
|
Controversial Issues in E-Discovery
|
Oct 28, 2011 |
|
Interactive Whiteboard Technology in Courtrooms and Law Firms
|
Sep 15, 2011 |
|
E-Discovery - Without the High Price Tag
|
Aug 19, 2011 |
|
Is it Possible to Secure Law Firm Data?
|
Jul 25, 2011 |
|
Proportionality in e-Discovery: A UK Perspective
|
Jun 22, 2011 |
|
The Meet and Confer: Getting it Right
|
May 20, 2011 |
|
The Five Hottest Topics in E-Discovery
|
Apr 26, 2011 |
|
The Deplorable State of Law Firm Security
|
Mar 22, 2011 |
|
Performing Quality E-Discovery Searches: Is it Time to Set Some Standards?
|
Feb 22, 2011 |
|
Expert Witnesses in E-Discovery
|
Jan 21, 2011 |
|
Ethical Issues in E-Discovery
|
Jan 04, 2011 |
|
Sexting and Sextortion: Texting and Extortion Get a XXX Twist
|
Nov 16, 2010 |
|
Inside Social Media Archiving
|
Oct 25, 2010 |
|
Ethics & E-Discovery
|
Sep 28, 2010 |
|
An Inside Look at the 2010 Civil Litigation Conference at Duke Law School
|
Aug 30, 2010 |
|
Current Issues in Computer Forensics
|
Jul 26, 2010 |
|
A Look at Data Breaches
|
Jun 30, 2010 |