Cybersecurity, Forensics, and Legal Technology Webinars

With the ever-changing nature of cybersecurity, forensics, and legal technology, we believe in the importance of constantly educating and engaging those in our industry and our communities. As part of this commitment, we are excited to make our webinars available on-demand. We hope that the ability to listen to thought-provoking conversations with our industry experts at your own pace will provide valuable insights to industry developments and beyond. Enjoy!

Defensible Remote Forensic Collection Webinar

Defensible Remote Forensic Collections

Digital forensics, whether performed in-house or by engaging an outside vendor, can uncover critical evidence for a variety of cases, including employee data theft, litigation holds, eDiscovery cases, and incident response investigations. Depending on the client’s location, budget, and turnaround time required by litigation and investigation collections, this process can often be stressful for both attorneys and their clients. Learn how remote forensic collections can minimize these concerns during this informational webinar.

VoIP Security - On-Demand Webinar

How Secure is Your Voice and Data?

Recent events have accelerated the adoption of Voice over IP (VoIP) and Unified Communications technologies for most organizations, because they can leverage their cloud platforms to work from anywhere with an internet connection. The rush for adoption, however, comes with security concerns that may be overlooked. Learn ways to secure your VoIP systems and company during this informational webinar.

Office 365: Protecting Against Data Loss Webinar

Office 365: Protecting Against Data Loss

Many organizations have migrated their systems to Office 365 (O365), as it allows for easier data access and the ability to work remotely. However, the cloud also presents certain challenges, including the potential for data loss as information is transferred across multiple systems and platforms. Learn ways to protect against data loss in O365 during this informational webinar.

Digital Forensics 101: 5 Things You Need to Know to Speak Conversational Forensics On-Demand Webinar

Digital Forensics 101: 5 Things You Need to Know to Speak Conversational Forensics

Digital forensics can be utilized in many scenarios, including but not limited to employee data theft, litigation holds, regulatory requests, incident response, and data recovery. This introductory overview will help you be better prepared in the event your client or organization finds themselves in a situation requiring an expert. Learn more during this informational webinar.

Remote Work and Cybersecurity: Supporting Employees Amid a Pandemic

As concerns over the coronavirus continue to increase across the United States, many employees are either being offered the opportunity or being required to work from home to help minimize exposure. Cyber criminals are taking advantage of this new remote workforce, and attacks are increasing. Remote work, however, can be done securely with the proper procedures, training, and technology in place. Learn how during this informational webinar.

The Cybersecurity Threat for Small Businesses On-Demand Webinar

The Cybersecurity Threat for Small Businesses

Data breaches are all too common in today’s digital age, and the cybersecurity threat for small businesses is very real. In addition, quickly emerging, inconsistent data privacy laws further complicate matters. Learn more about the cybersecurity threat landscape, what should be done during the first 24 hours after a breach, and proactive steps that every organization should be taking during this informational webinar.

The Ohio Data Protection Act: Rewarding Proactive Cybersecurity Strategies

A law that went into effect on November 2, 2018 could transform the way Ohio organizations are handling cybersecurity. The data protection act (Senate Bill 220), a CyberOhio initiative, provides an affirmative defense against data breach tort claims brought under Ohio Law or in Ohio Courts to organizations that have implemented and maintained a cybersecurity program that conforms to one of several specific framework(s). Learn more during this informational webinar.

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology