All Episodes
Displaying 21 - 40 of 61 in total
Episode 21 — Build records retention schedules that survive audits and lawsuits
A robust records retention schedule is a critical component of information governance, balancing business needs with legal and regulatory requirements. This episode ex...
Episode 22 — Set litigation holds that actually preserve what matters most
The issuance of a litigation hold is a high-stakes event that requires immediate and precise action to halt the routine destruction of potentially relevant evidence. T...
Episode 23 — Preserve electronic evidence while maintaining chain of custody
Maintaining the integrity of electronic evidence is paramount for its admissibility in a court of law. This episode focuses on the "chain of custody," which provides a...
Episode 24 — Orchestrate legal collection workflows that are targeted and defensible
The collection phase of e-discovery requires a surgical approach to gather relevant data without over-collecting unnecessary or privileged information. This episode ex...
Episode 25 — Learn landmark e-discovery cases shaping today’s expectations
The rules governing e-discovery are constantly evolving through landmark judicial decisions that set the standard for "reasonable" behavior in the digital age. This ep...
Episode 26 — Audit retention controls for completeness, consistency, and proof
Regularly auditing your records retention controls is the only way to ensure that your governance policies are being translated into actual practice. This episode deta...
Episode 27 — Execute defensible disposition without increasing legal exposure
Disposing of data that has reached the end of its retention period is a vital but risky task that must be performed with total administrative and technical precision. ...
Episode 28 — Rapid recap: retention and e-discovery essentials reinforced
This rapid-fire recap episode consolidates the most critical takeaways from the records retention and e-discovery domains to ensure a high level of recall for the GLEG...
Episode 29 — Survey computer crime laws impacting investigations and response
Understanding the statutory landscape of computer crime is a mandatory requirement for any professional involved in incident response or digital investigations. This e...
Episode 30 — Spot fraud and misuse patterns before damage escalates
Proactive identification of fraud and internal misuse is the most effective way to minimize the financial and reputational impact of a security incident. This episode ...
Episode 31 — Coordinate effectively with forensics teams under counsel direction
Successful digital investigations rely on the seamless coordination between technical forensic experts and legal counsel to ensure all findings are protected and strat...
Episode 32 — Preserve digital evidence using standardized, defensible handling practices
The integrity of an entire investigation rests on the initial preservation of digital evidence using standardized, forensically sound methods. This episode covers the ...
Episode 33 — Write investigation reports that read clearly and persuade
An investigation report is the primary bridge between technical forensic findings and the non-technical stakeholders who must make decisions based on those facts. This...
Episode 34 — Escalate security incidents with sound legal judgment and timing
Knowing when and how to escalate a security incident is a strategic skill that requires a balance of technical urgency and legal caution. This episode examines the int...
Episode 35 — Prepare law-enforcement referrals that are complete and actionable
When an organization decides to pursue criminal charges for a cybercrime, the quality of the law-enforcement referral determines whether the authorities will take the ...
Episode 36 — Distill cybercrime case lessons into practical response playbooks
Every digital investigation provides a wealth of information that should be used to improve the organization's future defensive and investigative capabilities. This ep...
Episode 37 — Review checkpoint: fraud and investigations knowledge reinforced
This checkpoint episode reinforces the most critical concepts of digital fraud detection and the legal requirements of an investigation. We revisit the primary compute...
Episode 38 — Differentiate intellectual property types to protect what matters
Protecting an organization's innovation requires a precise understanding of the four primary types of intellectual property: patents, trademarks, copyrights, and trade...
Episode 39 — Protect trade secrets with policy, process, and enforcement discipline
Trade secrets are unique because they rely entirely on the organization's ability to maintain their secrecy rather than on a government registration. This episode exam...
Episode 40 — Manage copyright compliance across software, media, and data
Navigating copyright law is a daily requirement for any organization that handles software code, marketing graphics, or training videos. This episode explores the "bun...