19 February 2018

Announcing the Legal Procurement Conference APAC 2018

When: Tuesday, 24 July 2018 Where: KPMG Sydney, Tower Three, International Towers, Barangaroo, Sydney Who: In-house counsel, legal procurement and legal operations professionals and their law firm counterparts Held in association with the Buying Legal Council, the Legal Procurement Conference APAC is a unique opportunity for legal operations and procurement professionals, in-house teams and their…

16 February 2018

The Law Firm’s Guide to Lawcadia Now Available for Download

The legal industry is undergoing a period of unprecedented change. Traditional legal roles are evolving, reliance on data is becoming more prevalent and the call to improve process efficiencies is louder than ever. For many industries, changes like these are par for the course. But for the inherently traditional world of law, such change, although…

28 January 2018

Tech Investment Driven by Changing Customer Needs

Things move quickly in the tech world, and it’s easy to get caught up in investing in technology you (and your clients or customers) – don’t necessarily need. Luckily, the banking sector has generally managed to avoid this trap. Leading the charge in customer driven innovation is Westpac with the development of ‘Alexa’, an Amazon…

23 January 2018

Conference Call with Susanna Taylor, LCM

We invite in-house counsel, legal operations and procurement professionals involved in the buying of legal services to the next Buying Legal Council APAC conference call with Susanna Taylor, LCM – Litigation Capital Management, on Wednesday, 21 March 2018 at 10am AEST | 11am AEDT | 8am HKT/SGT.   The topic of the conference call is: Innovative Options for Financing Your Litigation…

4 December 2017

Proudly ISO 27001:2013 certified

Lawcadia is proud to announce that we have attained the highest international standard for our Information Security Management System with ISO 27001:2013 certification.   We are dedicated to maintaining our world-class information security, keeping all data safe with the following protocols and standards: Regular third party security reviews, audits and penetration testing Dedicated internal function responsible…