Interest Groups

E-Discovery, Information Governance & Cyber Security Section News

Get the news you want the way you want it: click the RSS button in the right corner to add this feed to your RSS reader, or click here to subscribe to this content. By subscribing, you’ll find this news on your Member Account page, and the latest articles will be emailed to you in your customized IndyBar E-Bulletin e-newsletter.

E-Discovery, Information Governance & Cyber Security Section News


58 Posts found
Previous • Page 2 of 6 • Next

Posted on: May 20, 2020

This article highlights three of the most common mistakes in using presentation technology – and strategies to avoid them.

Posted on: May 20, 2020

This article highlights three of the most common mistakes in using presentation technology – and strategies to avoid them.

Posted on: May 20, 2020

Skeleton crews at the office and the general distraction of the developing COVID-19 situation create windows of opportunity for social engineering tactics such as phishing. Now is a good time to remind your team that they are the first, and in some cases the only line of defense against social engineering.

Posted on: May 20, 2020

Skeleton crews at the office and the general distraction of the developing COVID-19 situation create windows of opportunity for social engineering tactics such as phishing. Now is a good time to remind your team that they are the first, and in some cases the only line of defense against social engineering.

Posted on: May 18, 2020

Presentation technology is a powerful persuasive tool. Sophisticated demonstratives, deposition video clips and exhibit callout and annotation tools help lawyers advocate more effectively. Moreover, using technology is efficient and reduces the total time of the proceedings. 

Posted on: May 18, 2020

Presentation technology is a powerful persuasive tool. Sophisticated demonstratives, deposition video clips and exhibit callout and annotation tools help lawyers advocate more effectively. Moreover, using technology is efficient and reduces the total time of the proceedings. 

Posted on: May 18, 2020

Cyber criminals see opportunity in the pandemic. Some exploit security vulnerabilities in remote working. Others prey on people’s fears by crafting phishing emails and malware-infected websites purportedly about the coronavirus. You don’t have to be a security expert to fight back. We can all make a difference by following good security practices in our day to day work. These are five data security do’s and don’ts for everyone.

Posted on: May 18, 2020

Cyber criminals see opportunity in the pandemic. Some exploit security vulnerabilities in remote working. Others prey on people’s fears by crafting phishing emails and malware-infected websites purportedly about the coronavirus. You don’t have to be a security expert to fight back. We can all make a difference by following good security practices in our day to day work. These are five data security do’s and don’ts for everyone.

Posted on: May 7, 2020

No one should be intimidated by presentation technology. However, it isn’t simply a matter of bringing your computer to court either. Like every aspect of legal work, using presentation technology has best practices and potential pitfalls. Planning and preparation are the keys to avoiding common mistakes and presenting your best case.

Posted on: May 7, 2020

No one should be intimidated by presentation technology. However, it isn’t simply a matter of bringing your computer to court either. Like every aspect of legal work, using presentation technology has best practices and potential pitfalls. Planning and preparation are the keys to avoiding common mistakes and presenting your best case.


Previous • Page 2 of 6 • Next

DID YOU KNOW?

Indianapolis Bar Association (IndyBar) est. 1878 | 4,536 Members (as of 2.3.20)