The 7 Secrets of Digital Forensics – AccessDataWATCH THE REPLAY
Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations and geographically dispersed remote workers, incident response teams and IT staff working on internal and external incidents need deep visibility into live data directly at the endpoint without the knowledge or observation of the end-user. As breaches become more sophisticated, organizations need faster, more targeted enterprise-wide breach response teams, tools and techniques. In this webinar, the speaker will share his 7 secrets to data forensics best practices to teach you how you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Our speakers will include a discussion about real-life scenarios and what the market is asking for in terms of digital forensics technologies.
About the Speakers:
Harsh Behl, Director of Product Management, Exterro Harsh Behl is responsible for overseeing the entire product lifecycle for the AccessData legacy, now Exterro Forensic products, including the FTK® suite of products. As the air traffic controller for product releases, Harsh talks to customers and prospects in the market about their needs and pain points and has developed an in-depth knowledge of what the market is looking for from their forensic tools.
James Henderson, CEO, Insider Threat Defense Group (ITDG) Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level. He has been responsible for the development, implementation and management of: Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government, DoD, IC Agencies, Cleared Defense Contractors, State Governments, large and small businesses. The ITDG has provided training and services to over 640+ organizations.
Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.Watch The Replay