Skip to main content
Not Found
On Demand

Technological Strategies for Workplace Investigations


Category:
External Investigators |  Internal Investigators
Speaker(s):
Trent Walton, CCE, ACE
Duration:
1 Hour
Format:
Audio and Video
Original Program Date:
Nov 12, 2019
License:
Never expires.


Description

Dive into the world where computer forensics meets employment law. The intersection of these two worlds has given way to new technological techniques and legal strategies. Spend an hour with an experienced forensic examiner to focus on strategies he’s seen used that made major impacts in various cases. This program is technical. Attendees will leave with a stronger understanding how technology can be leveraged in employment disputes.

LEARNING OBJECTIVES

Participants will be able to:

  • Understand threats and strategies for dealing with BYOD (Bring Your Own Device) policies.
  • Learn common mistakes made by employers on initial investigations.
  • Understand what useful artifacts reside on a mobile device and how to extract them.

 

Disclaimer: The contents of this webinar and the positions taken are those of the presenter only, may be time sensitive, and are not warranted, endorsed or otherwise recommended by AWI and are not intended to provide legal advice. 

Credits



Handouts

Speaker(s)

Trent Walton, CCE, ACE's Profile

Trent Walton, CCE, ACE


Mr. Walton has 17 years of expertise in cyber security, computer forensics, eDiscovery and software development specialized for the legal industry. He has created two cutting-edge legal software products that are currently being used by customers in the Am Law 100, Fortune 500 and U.S. government. Mr. Walton has also provided consulting services on complicated technical matters for law firms of all sizes, major corporations and insurance carriers. He is an accomplished speaker who has given more than 300 continuing education seminars for both attorneys and insurance claims professionals. Mr. Walton has advised law firms and corporations regarding projects ranging from comprehensive, case assessment, large-scale data preservation and internal investigations to customized technological solutions. He has a wealth of experience in executing projects involving data collection, processing, analyzing massive amounts of data, and assisting firms with electronic discovery legal strategy.


Please wait ...

Back to Top