Trends in Electronic Evidence.
|
|
- Spencer Holland
- 5 years ago
- Views:
Transcription
1 Trends in Electronic Evidence. Collecting and Processing Large Data Sets in Digital Forensic Investigations With Dr Allan Watt CFCE, CFE
2 Webinar outline Authentication of electronic documents: contracts, wills and s IP employee theft Collecting and processing large data sets Is someone leaking your data from either side of the fence Plus many other potential risks
3 Background Former NZ Army Soldier (9 years) Former NZ Police Officer (9 years) 5 years as intelligence analyst Managed own computer forensic business in NZ for (8 years) Moved to Sydney 2008 Head of e.forensics for corporate litigation support company 2011 commenced with NSW Police as Senior Electronic Evidence Specialist 2013 commenced as Cyber Program Coordinator/Lecturer at PICT, Macquarie University Formed Digital Forensics Pty Ltd
4 Background Diploma NZ Policing Bachelor of Business Studies (Accounting) Bachelor of Science (Information Systems) Post Graduate Diploma Forensic Science Master of Science (Honours) Thesis on Cyber Terrorism Doctor of Philosophy Thesis on file movement and concealment
5 Background Completed over 1000 investigations Recognised expert witness most Jurisdictions in Australia and New Zealand Engaged as a court appointed independent expert NSW Supreme Court Evidence was accepted as Expert by the Privy Council, London in 2013 in an historic murder appeal
6 Poll Question 1 a) Are you (a) A barrister (b) A solicitor (c) An expert (d) General council (e) Other?
7 Authentication of electronic documents Let s state the obvious What documents these days are NOT created electronically? That is the key issue, nearly everything: communications, finance, trading, reporting, contracts and many more are all conducted electronically. You don t need to be a genius to fabricate digital files.
8 Wills Modified Deleted and new versions created Codicils created How would you even know, if they are original?
9 Contracts/ s False contracts created from scratch Contracts falsely created to impose a debt Contracts modified to suit one party or create liability s originality Additional copies Reposted with modifications
10 Triggers Lack of originals Often something else that raises suspicion Shoddy workmanship Some will try and be elaborate alter the clock Others don t think they will get caught
11 Solutions Sometimes application versions trip them up Need access to the device they were created on in most cases Check the clock Check the file date Metadata Check author and other metadata
12 Solutions With , the headers are needed Don t ask them to access or copy the data, continued access to files degrades the quality of the evidence Any matters where parties are producing documentary evidence created on digital devices, needs to be questioned for authenticity and where possible seek the digital original
13 Poll Question 2 a - Have you had the need for the investigation of Digital evidence in the past? (a) Yes (b) No
14 Poll Question 2 b - If you had the need did you use? (a) An experienced Digital Forensic Expert (b) An IT professional (c) The Client used their own internal IT staff (d) other
15 IP employee theft Exiting employees Disgruntled employees Hostile employees IT Staff IT contactors internal IT contactors external Cloud or ISP
16 IP employee theft Copy IP USB Thumb drive or hard disk drive Cloud Dropbox Connect their own computer to the network VPN Download at home to their own computer All the above will leave a trace
17 IP employee theft Need to get access to their computer and or the server quickly DO NOT LET your clients IT staff touch the devices, have HR or management seize them With respect to IT people all over the world, they look for technical solutions to the problem and not a forensic analytical approach I have had cases in the past where IT staff obliterated the entire evidence by attempting to investigate themselves
18 Poll Question 3 - Did you know there are more Digital Forensic Practitioners that are from Law Enforcement than IT? (a) Yes (b) No
19 IP employee theft In all cases we make a forensic image of the device or components of the server to international industry standards This can be done covertly if necessary to avoid concerns over destruction of your clients data Covert investigations of senior staff s computers in the past have revealed actions by these staff that were not in the best interests of the company
20 Collecting and processing large data sets The Cloud, though a good thing, has its issues Difficulty getting access Slow speed Many offshore Jurisdiction to access it That s if you even now where the cloud is Security of data while attempting to acquire it
21 Collecting and processing large data sets Cloud storage is cheap Entities no longer have to worry about backups or costly upgrades Just buy more space and don t worry about archiving Problem then becomes size and acquisition of data will have to be selective Multiple users on cloud platforms can impact on data downloads
22 Collecting and processing large data sets Acquisitions of data still have to be made to obtain the evidence However a plan will be needed to determine what is needed Acquisition of cloud data will take time, sometimes a long time If you don t get it the first time it may not be there the second time A digital forensic investigation is often reliant on system files and logs and other data in the deleted space, there will be many cases this data will not be available in a cloud based investigation
23 Collecting and processing large data sets The data sets will get bigger and the forensic tools are not designed or handle well, supersized data If it is fact based it can be processed with e.discovery tools, as in if a document is there, it is there However how it got there and who put it there and when? Is a forensic matter and digital forensic investigators need access to system information, to seek evidence to answer these questions.
24 Poll Question 4 How do you locate an expert? (a) Recommendation from colleague (b) Existing relationship (c) Law journal advert (d) Google Search (e) Other Search (f) Mail out by expert with contact details (g) Other
25 Poll Question 5 - How important is it for the Expert you seek to have International Industry Certification(s) in Digital Forensics? (a) A must (b) Nice to have (c) Not an issue
26 Is someone leaking your data from either side of the fence How trusty are your IT team? Your client may be spending $$$ on infrastructure, systems and other IP and your IT team or IT contractors maybe walking out the door with it How secure are the third party vendors who provide hardware and or software to your client? Do they have backdoors that are insecure and unknowns may be accessing your data and taking it?
27 Is someone leaking your data from either side of the fence Worse still, it may be your ISP who has access and can syphon off your s and attachments as they pass through Make copies and sell off your IP How safe, secure and trusted is your/their network service provider and other technology contractors?
28 Plus many other potential risks Mobile technology has provided one of the greatest breakthroughs in the Information Paradigm However it has also produced many hidden and undetected risks Bluetooth and Wi-Fi are present on many devices and your client may also have these protocols setup and these can be interfaced with through a device and download data directly Or where restrictions are in place, simply take a photograph of the screen with their iphone or Android device
29 Final word If there is a risk that a staff member has acted suspiciously or is exiting the company, act early seize the device Don t believe anything you read it may have been altered to suit their own proceedings The bigger the cloud the worse the storm Consider the risks tablets and mobile phones pose to your client s infrastructure
30 Contact Richard Skurnik expertsdirect.com.au expertsdirect.com.au Sydney Office: Suite 1, Level 20 MLC Centre, Martin Place, Sydney NSW 2000 Australia SYDNEY MELBOURNE BRISBANE PERTH
PROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER
EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationHave a Backup. Learning objectives. An understanding of the importance of backing up and archiving. Ability to prepare a backup plan
lesson plan Learning objectives An understanding of the importance of backing up and archiving 0 Ability to prepare a backup plan Ability to set up automatic backups Ability to restore from backup 1. The
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationARCHIVE ESSENTIALS
EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has
More informationFritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?
Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice For the purposes of applicable data protection and privacy laws, The Stonhard Group, a division of Stoncor Group, Inc. ( The
More informationUnlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.
Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationPass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores
Pass4suresVCE http://www.pass4suresvce.com Pass4sures exam vce dumps for guaranteed success with high scores Exam : CS0-001 Title : CompTIA Cybersecurity Analyst (CySA+) Exam Vendor : CompTIA Version :
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationGK SOLUTIONS PTY LTD COMPANY PROFILE
GK SOLUTIONS PTY LTD COMPANY PROFILE Company Profile Registered Business Name GK Solutions Pty Ltd ABN 23 770 995 016 Registered Business Address 18 Teak Street, Caulfield South, Victoria 3162 (PO Box
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationThe Use of Technology to Enhance Investigation
The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source
More informationLast updated 31 March 2016 This document is publically available at
PRIVACY POLICY Last updated 31 March 2016 This document is publically available at http://www.conexusfinancial.com.au/privacy 1. INTRODUCTION This Privacy Policy sets out our commitment to protecting the
More informationFriday, 1/17/14 10:30 a.m. 11:45 a.m. PRESENTED BY: William Figures David Ross Charlie LeBlanc
Data Security in the Information Age Friday, 1/17/14 10:30 a.m. 11:45 a.m. PRESENTED BY: William Figures David Ross Charlie LeBlanc Schedulers & Dispatchers Conference New Orleans, LA January 14-17, 2014
More informationTHINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte
Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW
More information10 th National Investigations Symposium
10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5
More informationThis policy should be read in conjunction with LEAP s Conflict of Interest Policy.
Policy Number 4.1 Policy Name Release No. 2 Release Date August 2017 Date For Next Review August 2018 Policy LEAP Social Services/Different Abilities Services (LEAP) is committed to the effective, timely
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationData Centers & Technology:
Data Centers & Technology: Risk in the digital landscape Presented by; Ralph de Mesquita Principal Risk Analyst, Risk Engineering UK Agenda Rise of cloud providers Four scenarios: where are the insurable
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationCOMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs
COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline
More information6 Tips to Help You Improve Configuration Management. by Stuart Rance
6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected
More information1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice
1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationKIN GROUP PTY LTD PRIVACY POLICY
KIN GROUP PTY LTD PRIVACY POLICY 1. Purpose of this policy The Group respects the privacy of the personal information you may provide to it when it deals with you. The way the Group manages your personal
More informationIt s still very important that you take some steps to help keep up security when you re online:
PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationPreventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence
Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence Presented by Keith Barger and Audra A. Dial March 19, 2014 2014 Kilpatrick Townsend & Stockton LLP Protection of
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationFifteen Best Practices for a Successful Data Center Migration
Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will
More informationBachelor of Information Technology
Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime
More informationDISCLOSURE STATEMENT PREPARED BY
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationDigital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationForensics for Managers
Forensics for Managers x Ryan Washington MBA, CISSP, CCE, CEH, NSA/IAM 703-961-9456 Extension 128 Introduction US Marines, Special Intelligence Communicator Bachelors in Management Masters of Business
More informationILM Whistle-blowing Policy for Centres, Providers and Candidates
ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality
More informationArchive Legislation: archiving in the United Kingdom. The key laws that affect your business
Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private
More informationSay Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe
Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015 Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan
More informationIncident Response Data Acquisition Guidelines for Investigation Purposes 1
Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response
More informationIntroduction. Read on and learn some facts about backup and recovery that could protect your small business.
Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records
More informationGlobal Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.
Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationCyber Security Law --- Are you ready?
Cyber Security Law --- Are you ready? Xun Yang Of Counsel, Commercial IP and Technology 9 May 2017 1 / B_LIVE_APAC1:2207856v1 Content Overview of Cyber Security Law Legislative Development Key Issues in
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationReviewing the Results of the Forensic Analysis
CYBERSECURITY FORENSICS WORKSHOP Reviewing the Results of the Forensic Analysis Ian M Dowdeswell Incident Manager, Q-CERT 2 CYBERSECURITY FORENSICS WORKSHOP Caveats This is not an actual crime it has been
More informationWHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5
WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 ObserveIT s award-winning insider threat management software combines user monitoring, behavioral analytics, and now policy enforcement
More informationWhistleblower Submission Form
Whistleblower Submission Form FORM C Complete this form IF you are a lawyer a whistleblower (or a group of whistleblowers) who wish to be anonymous. If you are a individual whistleblower, please complete
More informationAUDITING FOR PERSONALLY-OWNED DEVICES
Digital Forensics TECHNICAL ARTICLE AUDITING FOR PERSONALLY-OWNED DEVICES Warren Kruse, CISSP, CFCE, EnCE, DFCP Vice President for Digital Forensics Auditing for Personally-Owned Devices Bring Your Own
More informationDeloitte Discovery Caribbean & Bermuda Countries Guide
Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or
More informationTravel Information Security November 2015
Travel Information Security November 2015 Important Note: Disclaimer The price of your house may go down as well as up This presentation contains the results of a short research exercise into travel information
More informationThe Orbit Travel App. An innovative travel solution to provide Orbit World Travel clients with a seamless business travel experience.
The Orbit Travel App An innovative travel solution to provide Orbit World Travel clients with a seamless business travel experience. USER GUIDE 1 About the App The smart all-in-one travel companion for
More informationHow Secured2 Uses Beyond Encryption Security to Protect Your Data
Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document
More informationComplaints, compliments and suggestions
About us Complaints, compliments and suggestions 2 About us Large print format available If someone in your household needs this information in large print or as an audio recording please contact our Customer
More informationFEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy
R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government
More informationA Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk
SESSION ID: GRC-T10 A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk R Jason Straight Sr. VP, Chief Privacy Officer UnitedLex Corp. Has anyone seen this man? 2 3 4 We re getting
More informationDepending on the Services or information you request from us, we may ask you to provide the following personal information:
LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally
More informationDuncanPowell RESTRUCTURING TURNAROUND FORENSIC
Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations
More informationNATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST
NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST TERMS OF REFERENCE February 2017 1 TERMS OF REFERENCE FOR
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationLEVERAGING THE CLOUD WITH MICROSOFT AZURE
LEVERAGING THE CLOUD WITH MICROSOFT AZURE Matt Walton Consulting Services Manager 14 th June 2018 1 Technology for social justice www.infoxchange.org Infoxchange is a not for profit organisation that has
More informationGlobal Cybercrime Certification
Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationPresentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April
Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April 2015 1 WYNYARD GROUP SUMMARY Founded 2012, NZX IPO July 2013 and
More informationThis chapter should be read in conjuction with the Search and Surveilance Act 2012 and the Search chapters of the Police Manual.
events This chapter contains the following topics: Summary Recording equipment must be Police-issued and approved Benefits for Police of recording operations and events - Media filming of Police operations
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationWelcome Pwn: Almond Smart Home Hub Forensics
Welcome Pwn: Almond Smart Home Hub Forensics Akshay Awasthi 1, Huw Read 1,2, Konstantinos Xynos 4,2, Iain Sutherland 2,3 1 Norwich University, Northfield, Vermont, USA 2 Noroff University College, 4068
More informationDIS10.3:CYBER FORENSICS AND INVESTIGATION
DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationHow to choose a website design firm
How to choose a website design firm 22 questions to ask before engaging in an important partnership Website development projects can be fraught with risk. Organizations often wonder: How can we be sure
More informationOHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE
OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationYour Right to Privacy. It s abouthope
Your Right to Privacy It s abouthope Information for Clients and Caregivers Protecting the privacy of your information at Peel Children s Centre Table of Contents We will protect the privacy of all the
More informationYou will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:
Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationPRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology
PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationBUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:
BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationCyberEdge. End-to-End Cyber Risk Management Solutions
CyberEdge End-to-End Cyber Risk Management Solutions In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge
More informationHome Network Security Quick Start Guide
Cover TREND MICRO Home Network Security Quick Start Guide TREND MICRO AUSTRALIA Pty Ltd Level 15, 1 Pacific Highway, North Sydney, NSW 2060, Australia 2016 by Trend Micro Incorporated. All rights reserved.
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationDATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System
DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au
More informationShielding the Organization from Data Risk & E- Discovery Failures
Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,
More informationTRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate
TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More information