Looking for Insights from Experts? We Have a Webinar for That

With the ever-changing nature of cybersecurity, forensics, and legal technology, we believe in the importance of continually educating and engaging those in our industry and our communities. As part of this commitment, we are excited to make our webinars available on-demand. Through thought-provoking conversations with industry experts, we cover topics as diverse as how to protect your business from data loss to how to protect remote workers from cyber threats. We hope that the ability to listen to our industry experts at your own pace will provide valuable insights to industry developments and beyond. Enjoy!


Even in comparison to other complex litigation, multidistrict litigation matters (MDLs) present distinctive challenges in building and maintaining efficient and effective eDiscovery processes. Learn from a distinguished panel of eDiscovery litigators as they  share practical strategies for managing these challenges, including setting preservation boundaries, reducing over-preservation risks, and employing advanced technologies like email threading and technology-assisted review (TAR), among others. 

Our lead penetration tester will take you through his most memorable pen testing experiences. During the discussion you’ll gain insights into the challenges faced, the victories celebrated, and the lessons learned during real-life penetration testing engagements. These stories from the front lines will give you an unparalleled understanding of the intricacies of maintaining robust network defenses in the face of ever-evolving threats.

Our panel of experts will illuminate the complex landscape of social media forensics and equip you with the knowledge and tools necessary to navigate it effectively. Through real-world examples and practical insights, this webinar will provide a comprehensive understanding of social media forensics, empowering you to better represent your clients and maximize the impact of digital evidence in your cases. 

Our lead penetration tester takes you inside the mind of a hacker to show you how external-facing hosts can provide entry points for unauthorized access to your internal network in this on-demand webinar. This simulation of an external penetration test shows how to identify and exploit a vulnerability on a company’s external-facing firewall. You’ll see firsthand the different methods used by hackers to gain unauthorized access to your network and learn how to better protect against these threats.

In-house litigation counsel are increasingly being challenged to move beyond a necessary cost center to delivering value to the legal department and the organization. In this on-demand webinar, moderated by Damian Durrant, experienced in-house counsel will provide practical pointers to define value beyond just reducing outside counsel spend, as well as smart ways to manage litigation to deliver it in ways the organization can understand.

Just as security experts work collaboratively to develop new defenses against cyber threats, hackers are corresponding with one another to find new ways gain access to your sensitive data. This includes sharing information on the dark web on how to bypass common compliance regulations and cybersecurity frameworks. Learn how hackers build out target profiles leading up to an attack, as well as how to defend your network through penetration testing during this informational webinar.

Everybody knows that a data breach is an inevitable part of business in today’s technological age. But how a company reacts to and manages this stressful situation will ultimately determine how well it will weather the storm. Compare responses from Company A and Company B leading up to, during, and months after the initial compromise during this discussion. Do you know how well would your company fair during a data breach?

Many businesses have been relying on cyber insurance to transfer risk. Consequently, the cyber insurance marketplace is responding with new requirements for businesses to document their cybersecurity defenses, practices and controls. Without establishing certain controls, businesses face increased premiums, higher deductibles, lower coverage limits, and a potential non-renewal. Learn how to lower your cyber insurance premiums and overall risk during this informational webinar.

There’s no denying the significance that mobile devices play in our lives and the amount of information they hold. This is also true of social media, with the rise of its usage.  As a result, mobile devices and social media are quickly becoming an integral part of the eDiscovery process. Learn how digital forensics is adapting to these constantly changing data sources during this informational webinar.

As more federal contracts begin incorporating the Cybersecurity Maturity Model Certification (CMMC) directly into their contracts, organizations that are proactively taking steps to meet those requirements will have an advantage against their competitors. Learn how to take those steps by managing your third-party risk and securing your digital supply chain during this informational webinar.