Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create

Webinar: Handling Information Defensibly in the Global Economy: Best Practices for Data Discovery in Cross-Border Matters
Webinar: Handling Information Defensibly in the Global Economy: Best Practices for Data Discovery in Cross-Border Matters In today’s global business environment, it’s common for US legal matters to involve documents and data
Cross-Border Discovery: A Guide to Practical Challenges for US Counsel
As the world’s economies continue to reach across borders, US counsel representing companies of all sizes are more frequently required to gather data from other countries. This paper provides those counsel with practical guidance regarding the logistical and operational challenges that arise in a typical matter requiring cross-border discovery.
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds In a world of new and evolving sources, conducting effective legal holds is more critical than ever. Done properly, legal holds
Corporate Counsel Guide to End-to-End eDiscovery
As an in-house attorney, eDiscovery can often feel like a distraction from the substantive work you want to be doing, but successfully managing eDiscovery – including choosing the right partners – can result in finding better information, more quickly, and less expensively across all your matters.
When the Game is Afoot: Investigations and eDiscovery
The majority of eDiscovery work takes place in the context of litigation, but a significant amount of it takes place instead in the context of investigations. Although the available ESI and eDiscovery technologies are the same, the realities of handling investigations can be different in some ways important ways.
Teach an Attorney to Phish: Lawyers’ Duties in a Digital World
Teach an Attorney to Phish: Lawyers' Duties in a Digital World The cyber landscape has never felt more like a wild frontier. Phishing attacks continue to rise, as do ransomware attacks and
Webinar: Exploring Sightline for Investigations
Webinar: Exploring Sightline for Investigations In this webinar, Pete Feinberg, SVP Product & Innovation, explores Sightline for Investigations and its capabilities to empower teams to more efficiently handle investigatory & compliance workflows.
How to Manage the Unexpected Resignation of a Key Legal Employee
In every legal team, resignations are inevitable – regardless of how valued your employees may feel. There is a lot to consider when a key employee resigns, and your first instinct may be to focus only on immediate workload, but it’s also important to make a long-term planning a priority.
Operationalizing Contract Review & Negotiation
Now more than ever, corporate legal leaders must look at how their in-house team is operating, evaluate how to drive efficiencies, and assess when it may be time to bring in some help. One area savvy corporate teams focus on first is their contract review and negotiation processes.
Sightline for Investigations
Sightline for Investigations Quickly identify risk with a leading platform trusted by investigatory, legal & compliance teams Automatically analyze data then visualize and search quickly to cull noise and locate actionable
Sampling Techniques for Litigation and Investigations
Despite years of discussion in the eDiscovery industry about the power and importance of sampling techniques – particularly in the context of technology-assisted review (TAR), many practitioners remain unfamiliar with what they can accomplish with them, and when, outside of TAR, they might do so.
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.
Clear the Final Merger Hurdle: A Guide to Second Requests in the Age of Analytics
Second Requests are high velocity, high volume, and high visibility — under normal circumstances. Now, as legal departments are facing an unprecedented post-pandemic economy and an ever-growing reliance on digital communication, the demands in this final merger step are higher than ever.
Collecting Data from Mobile Devices and Their Applications
Due to the popularity and volume of mobile devices being used throughout the world, they have become common sources of digital evidence in litigation proceedings. It is important to understand the different types of data that can be extracted from mobile devices, mobile device backups, and the cloud.
Alphabet Soup: TAR CAL, and Assisted Review
Over the decade since TAR first rose to prominence, solutions, acronyms, and new cases have proliferated dramatically. All of this rapid technical and legal evolution has made it challenging for practitioners to get a simple handle on TAR and CAL approaches and what they mean for their matters.
A Framework for Recognizing and Overcoming Implicit Bias in the Legal Profession
If you’re human, you have biases. There’s no way to change this—the human brain is evolutionarily wired to take shortcuts. In the modern world, these shortcuts cause all of us to have implicit or unconscious biases around race, gender, and other inherent characteristics of our fellow humans.
A Niche with a View into Cyber Incident Response
A Niche with a View into Cyber Incident Response By James Jansen, Senior Director, Consilio Cyber incidents can be extremely cost sensitive. How does Consilio address this from a technology and resource
Why Now Is the Time for Legal Teams to Invest in Self-Service eDiscovery
This white paper reviews what you need to know about self-service eDiscovery, including the problems it’s designed to solve and the benefits it brings to the practice of law.
Webinar: Responding to Cyber Incidents
Webinar: Responding to Cyber Incidents From Big to Not Quite as Big – Understanding the Impacts and Risks Whether it’s a bet the company Ransomware attack or a Business Email