In a series of four 90-minute webinars, Roger Dodd presents a completely integrated cross-examination system taught via learnable concrete principles. In each webinar Roger illustrates key principles and techniques of cross-examination to implement at trial and at depositions (in-person or online). His examples are based on dozens of real-life examples. Even if you don’t take the whole series...
One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees.
This is very important training
Deepfakes can impact our relationship to information and the tools we use to work with it. How will this new horizon impact the trustworthiness of evidence and will the legal profession have the tools needed to test what they see or hear? What are the implications for the Rule of Law and our democracy?
Topics our presenters will cover include:
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
Learn the ins-and-outs of collecting, analyzing, and recovering evidence from mobile devices. Discover how digital forensic capabilities have grown by reviewing real-world situations. What seems hidden may be revealed after all. Game on!
Participants can expect to learn the following during this session:
• Explore forensic process from preservation to reporting.
• Identify the latest types...
Learn the ins-and-outs of collecting, analyzing, and recovering evidence from mobile devices. Discover how digital forensic capabilities have grown by reviewing real-world situations. What seems hidden may be revealed after all. Game on!
Participants can expect to learn the following during this session:
• Explore forensic process from preservation to reporting.
• Identify the latest types...
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
Ethical conduct is a key to being an effective attorney. Each week we read about disciplinary cases where attorneys are suspended for misconduct involving clients, the courts, or other attorneys.
In this presentation we examine disciplinary cases involving the misuse of social media and the types of conduct that result in disciplinary action and suspensions. We will examine the rules of professional...
Ethical conduct is a key to being an effective attorney. Each week we read about disciplinary cases where attorneys are suspended for misconduct involving clients, the courts, or other attorneys.
In this presentation we examine disciplinary cases involving the misuse of social media and the types of conduct that result in disciplinary action and suspensions. We will examine the rules of professional...
Copyright was created as a legal response to the invention of the printing press to protect authors and their writings. It continues to evolve in response to advances in technology. In this webinar, you will learn how the definitions of ‘author’ and ‘writing’ have expanded to include or exclude new technologies. We will explore issues of authorship and artificial ...