Loading... Please Wait!

Data Privacy

The Forensicators Present ... Go on the Cybersecurity Offensive: Threat Intelligence

Over the last few years, we all have heard about major cyber and ransomware attacks. These cybercrimes cost organizations billions of dollars each year, as personally identifiable information (PII) – social security numbers, credit cards, email addresses, and other personal data – of millions of consumers are exposed and sold by hackers.

The Forensicators Present ... Big Data Beasts

"Big Data Monsters" is courtesy of iDS Sr. Consultant and data expert, Bobby Williams.  Nearly everything we do increases our digital footprints and feeds a race of big data monsters. Bobby talks about these creatures - how they were created, how they're fed, and how they can be tamed to help keep you and your organization safe.

Drawing a Privacy Line in Today's Data-Rich World: MCC Roundtable

In June, the U.S. Supreme Court agreed to review Carpenter v. U.S., which concerns warrantless access to cellphone location records. This thrusts the high court smack into the murky intersection of digital evidence and the Fourth Amendment. Add in the different standards for disclosure of electronic communications held by third-party internet service providers under the Stored Communications Act, and you have a recipe for controversy and confusion. In the discussion below, our participants confront these and related issues from a variety of vantages: Sonya Judkins, manager of electronic discovery and compliance with Sprint; U.S. Magistrate Judge David Waxse from the U.S. district court in Kansas City, Kansas, a highly experienced judicial “maverick” on ESI searches; Don Myers, a Littler Mendelson shareholder and member of the firm’s eDiscovery group; Dan Regard, a programmer and lawyer who is CEO of iDiscovery Solutions; and Hunter McMahon, director of data analytics for iDiscovery Solutions. Their remarks have been edited for length and style.

WEBINAR: Understanding the Value (and Risk) of Digital Breadcrumbs, Oct. 3 @1pm ET

During litigation or investigations, we are quick to look for the 

The Forensicators Present: Key Employee Departures & Risk Assessment

iDS' Charlie Platt, CISSP, EnCE, CEH, discusses key employee departures, the questions every organization should be asking when they depart re the risk of IP theft, and how iDS' Employee Risk Assessment can quickly assess all the available evidence, paint a detailed and reliable picture of the departed employee’s last days or hours, and determine the potential risk involved. With this assessment, you can make an informed, evidence-based decision on how to proceed. 

The Forensicators Present... I USB, You USB, We All USB!

iDS forensics expert Arnold Garcia discusses the continued proliferation of USB storage devices and how the data gathered from and around them can make the difference in many cases and investigations, including theft of IP and trade secret issues.

The Forensicators Present ... Are You Prepared for the Next Big Ransomware Attack?

iDS expert Supreet Singh discusses WannaCry, NotPetya, and how your organization can be better prepared for future ransomware attacks.

iDiscovery Solutions to Sponsor Luncheon for D.C. Chapter of Women in eDiscovery (WiE)

iDiscovery Solutions to Sponsor Luncheon for D.C. Chapter of Women in eDiscovery (WiE). Special discussion at the July 19 event will cover Data Privacy and the New GDPR.  

THE ETHICAL HACKER: Are You Accounting for One of Your Largest Cybersecurity Risks?

It’s the Context, Not the Content

Pages

Download Keys to Today’s Information Governance Landscape