This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Digital Detectives

By Legal Talk Network

Hosted by Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.

  1. 1.
    Guidance for Lawyers with Cybersecurity Paralysis06/25/2019
    32:20
  2. 2.
    Data Breach Lawyers: A View from the Trenches05/28/2019
    27:29
  3. 3.
    Internet Defamation: What Lawyers Need to Know04/18/2019
    25:44
  4. 4.
    Digital Forensics on Mobile Devices03/28/2019
    31:19
  5. 5.
    Breaking and Entering: The Fascinating Life of a Professional Pen Tester02/26/2019
    27:21
  6. 6.
    eDiscovery: Major Developments in 2018 and a Look Ahead01/30/2019
    27:35
  7. 7.
    Our Favorite Cybersecurity Resources12/26/2018
    25:23
  8. 8.
    Cybersecurity: Getting to Good for the Small Law Firm11/27/2018
    26:01
  1. 9.
    The Evolving Landscape of Law Firm Data Breach Preparation and Response10/29/2018
    24:19
  2. 10.
    Securing Office 365: An Ethical Imperative for Lawyers09/18/2018
    30:05
  3. 11.
    Cyber Security Awareness Training08/27/2018
    32:47
  4. 12.
    Is the California Consumer Privacy Act Part of a Trend?07/23/2018
    23:34
  5. 13.
    Is Working with Virtual Assistants Putting your Law Firm in Danger?06/26/2018
    25:09
  6. 14.
    The FBI’s Access to iPhone Data: Apple Fights Back05/30/2018
    26:45
  7. 15.
    Fastcase’s Artificial Intelligence Sandbox04/23/2018
    29:32
  8. 16.
    Ethical Misadventures in E-Discovery03/29/2018
    30:47
  9. 17.
    Cyber Insurance: Expensive, Complicated, and Necessary02/28/2018
    29:37
  10. 18.
    What Makes a Preservation Letter Presidential01/30/2018
    32:47
  11. 19.
    Privacy vs. Protection: Warrantless Phone Searches at the Border12/29/2017
    17:53
  12. 20.
    Kaspersky Lab: Friend or Foe?11/21/2017
    22:53
  13. 21.
    A Breach of Trust: The Aftermath of the Equifax Hack10/24/2017
    30:41
  14. 22.
    How Lawyers Should Use Spreadsheets09/19/2017
    26:14
  15. 23.
    Crisis Management After a Data Breach08/17/2017
    25:01
  16. 24.
    Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage07/17/2017
    27:18
  17. 25.
    Ethical Issues with Confidential Data06/19/2017
    27:52
  18. 26.
    Cybersecurity for Macs05/19/2017
    21:54
  19. 27.
    Practical Approaches to Preserving New (and Not-So-New) Media04/18/2017
    34:06
  20. 28.
    Electronic Security Sweeps for Law Firms and their Clients03/14/2017
    33:01
  21. 29.
    Smishing, a Growing Cyber Security Threat02/14/2017
    22:24
  22. 30.
    The Ransomware Epidemic in Law Firms: A Guide to Defense and Survival01/17/2017
    26:10
  23. 31.
    Obama vs. Trump on Cyber Security12/20/2016
    25:14
  24. 32.
    The Top Hot Topics in eDiscovery11/18/2016
    23:38
  25. 33.
    The Importance of Website Security for Law Firms10/12/2016
    24:13
  26. 34.
    Encryption, Cyber Security, and Domestic Surveillance09/15/2016
    32:35
  27. 35.
    Cyber Security for Small Firms and Solo Practices08/18/2016
    20:23
  28. 36.
    The 2016 Georgetown Ediscovery Training Academy07/21/2016
    29:23
  29. 37.
    Mandiant’s M-Trends and Verizon’s Data Breach Investigation Reports06/29/2016
    23:39
  30. 38.
    The Panama Papers: The World’s Largest Data Breach05/23/2016
    29:44
  31. 39.
    Cyber Security Audits and Options for Your Law Firm04/06/2016
    26:48
  32. 40.
    Edward Snowden's Legal Advisor Sides with Apple in FBI Battle Over Encryption03/11/2016
    29:20
  33. 41.
    What Law Firms Should Know About the FBI’s InfraGard Program01/28/2016
    27:30
  34. 42.
    Technology Assisted Review for Smart People12/30/2015
    26:50
  35. 43.
    Paris Attacks: The Digital Investigation, ISIS, and The Response11/20/2015
    28:35
  36. 44.
    Catalyst’s Free E-Discovery Practicum for Law Schools11/10/2015
    26:13
  37. 45.
    A New Dawn for the Association of E-Discovery Specialists10/06/2015
    17:06
  38. 46.
    Hillary Clinton’s Emails and the Looming Issue of Shadow IT09/03/2015
    28:41
  39. 47.
    Why are Law Firms Beginning to Form Data Breach Practice Groups?08/26/2015
    28:22
  40. 48.
    E-Discovery Reflections from Retired Magistrate Judge John Facciola07/23/2015
    26:35
  41. 49.
    Lawmageddon and How to Prepare for Social Media in the Courtroom06/08/2015
    31:21
  42. 50.
    Judge Andrew Peck on TAR (Technology-Assisted Review)05/08/2015
    26:47
  43. 51.
    The Law of Robotics: Autonomy, Responsibility, and Risk03/31/2015
    26:11
  44. 52.
    Forensic Science in the Criminal Justice System: What is Admissible?02/26/2015
    27:43
  45. 53.
    The Government’s Dark Data: A Decade of Discovery01/21/2015
    23:42
  46. 54.
    The Sony Hack: You Can’t Keep the Barbarians Outside the Gate01/16/2015
    29:11
  47. 55.
    Issues and Trends in E-Discovery and Information Governance12/16/2014
    26:06
  48. 56.
    War & Terrorism in Cyberspace: Wild, Wild West Shoot Out on the International Frontiers11/13/2014
    29:47
  49. 57.
    Predictive Coding for Rookies: E-Discovery in the Courtroom10/27/2014
    33:15
  50. 58.
    Rule 37(e) of the Federal Rules of Civil Procedure: Changes for ESI Preservation and Spoliation09/24/2014
    25:50
  51. 59.
    Cull, Baby, Cull - Modern Trends in Data Collection and Analysis08/18/2014
    29:42
  52. 60.
    Data Breaches, eDiscovery, and the Importance of Digital Forensics07/26/2014
    21:53
  53. 61.
    77% of Lawyers Can’t Be Trusted With Confidential Client Data07/07/2014
    24:04
  54. 62.
    The FBI’s Massive Facial Recognition Database: Privacy Implications05/24/2014
    19:48
  55. 63.
    Perils of Law Firms Possessing Massive Amounts of Unreviewed Client Data04/11/2014
    23:13
  56. 64.
    The Ethical Implications of NSA Surveillance for Lawyers03/21/2014
    23:37
  57. 65.
    The Kindergarten Version of Information Security for Lawyers02/24/2014
    25:16
  58. 66.
    What Should Lawyers Know About Information Governance?01/21/2014
    23:59
  59. 67.
    Data Breaches in the Healthcare Industry: Lessons for Law Firms12/13/2013
    25:28
  60. 68.
    A State Judge’s Perspective On E-Discovery11/07/2013
    32:16
  61. 69.
    The Implications of NSA Surveillance for Lawyers10/04/2013
    37:43
  62. 70.
    Cyber Risk Management for Lawyers09/13/2013
    31:14
  63. 71.
    Hot Developments Among E-Discovery Vendors08/06/2013
    27:21
  64. 72.
    Highlights from the 2013 Georgetown E-Discovery Training07/03/2013
    29:53
  65. 73.
    E-Discovery: Why You Should Go Native!06/13/2013
    32:01
  66. 74.
    Cyber Threats to Law Firms and Businesses: How Do We Defend Ourselves?05/07/2013
    28:52
  67. 75.
    Scary Tech: Lessons from ABA TECHSHOW 201304/26/2013
    26:43
  68. 76.
    Special Masters in E-Discovery10/10/2012
    26:59
  69. 77.
    Metadata: What You Can’t See Can Hurt You!09/18/2012
    21:18
  70. 78.
    Ouch! Lessons Learned from the Morgan Lewis’ Redaction Disaster08/27/2012
    23:19
  71. 79.
    Focus on Privacy: The Facebook Internet Tracking Case07/20/2012
    29:30
  72. 80.
    The Craigslist Killer: A Case Study in Digital Forensics06/12/2012
    33:48
  73. 81.
    Brainless Blunders in E-Discovery Searches04/18/2012
    29:23
  74. 82.
    Predictive Coding: A Rose by Any Other Name03/23/2012
    26:35
  75. 83.
    The Best Resources for Staying Current in E-Discovery02/16/2012
    26:44
  76. 84.
    Smartphone Security01/20/2012
    29:29
  77. 85.
    Cost-Effective E-Discovery in Small Cases12/15/2011
    24:58
  78. 86.
    The Future of E-Discovery11/15/2011
    26:24
  79. 87.
    Controversial Issues in E-Discovery10/28/2011
    25:14
  80. 88.
    Interactive Whiteboard Technology in Courtrooms and Law Firms09/15/2011
    21:44
  81. 89.
    E-Discovery - Without the High Price Tag08/19/2011
    25:42
  82. 90.
    Is it Possible to Secure Law Firm Data?07/25/2011
    27:17
  83. 91.
    Proportionality in e-Discovery: A UK Perspective06/22/2011
    29:43
  84. 92.
    The Meet and Confer: Getting it Right05/20/2011
    28:05
  85. 93.
    The Five Hottest Topics in E-Discovery04/26/2011
    23:56
  86. 94.
    The Deplorable State of Law Firm Security03/22/2011
    28:36
  87. 95.
    Performing Quality E-Discovery Searches: Is it Time to Set Some Standards?02/22/2011
    21:31
  88. 96.
    Expert Witnesses in E-Discovery01/21/2011
    30:51
  89. 97.
    Ethical Issues in E-Discovery01/04/2011
    21:52
  90. 98.
    Sexting and Sextortion: Texting and Extortion Get a XXX Twist11/16/2010
    26:37
  91. 99.
    Inside Social Media Archiving10/25/2010
    24:25
  92. 100.
    Ethics & E-Discovery09/28/2010
    25:08
  93. 101.
    An Inside Look at the 2010 Civil Litigation Conference at Duke Law School08/30/2010
    17:46
  94. 102.
    Current Issues in Computer Forensics07/26/2010
    21:22
  95. 103.
    A Look at Data Breaches06/30/2010
    22:27

Listen to Digital Detectives now.

Listen to Digital Detectives in full in the Spotify app