The Forensicators Present ... Go on the Cybersecurity Offensive: Threat Intelligence
Over the last few years, we all have heard about major cyber and ransomware attacks. These cybercrimes cost organizations billions of dollars each year, as personally identifiable information (PII) – social security numbers, credit cards, email addresses, and other personal data – of millions of consumers are exposed and sold by hackers.
Analyze This (and That): Event-Based Analysis - Changing Your Vantage Point
iDS Director of Data Analytics, Hunter McMahon, discusses how approaching data analysis from an event-based perspective leads to vantage points that may help uncover the real narrative to build a stronger case.
xIOT - Data Insights
Our clients now have the power to go beyond a basic reporting tool or data repository, to utilize actionable intelligence to effectively develop case strategies earlier and craft powerful, data-driven narratives. We’ve applied well-established principles of computer science, statistics, mathematics, and law to create a system that doesn’t just manage data, but elevates it from simple information to knowledge and understanding.
MobileThread featuring ConversationView
MobileThreadTM is a unique, user-friendly platform that allows users to import, review, search, and produce mobile device conversations in a native format. Using our ConversationViewTM interface, texts, chats, and additional SMS and MMS conversations can be reviewed in a Relativity® workspace, in a readable format nearly identical to that of the device. The sender, recipient, date, time, emojis, and images are all represented in this ‘bubble-like’ view – with metadata preserved. Additionally, conversation, message, and attachment relationships are maintained.
The Forensicators Present ... Big Data Beasts
"Big Data Monsters" is courtesy of iDS Sr. Consultant and data expert, Bobby Williams. Nearly everything we do increases our digital footprints and feeds a race of big data monsters. Bobby talks about these creatures - how they were created, how they're fed, and how they can be tamed to help keep you and your organization safe.
WEBINAR: Understanding the Value (and Risk) of Digital Breadcrumbs, Oct. 3 @1pm ET
During litigation or investigations, we are quick to look for the
The Forensicators Present ... Programs Can Run, But They Can’t Hide
Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence. iDS forensics expert, Jonathan Karchmer, talks about some artifacts one may encounter on Windows systems.
The Forensicators Present: Mind the (Time) Gap
iDS forensics expert, and member of the DC Bar's Ethics Committee, Ken Marchese talks about time gaps between events occurring and the ability to image a device, why reporting is still essential, and the potential for new, relevant evidence.
The Forensicators Present: Key Employee Departures & Risk Assessment
iDS' Charlie Platt, CISSP, EnCE, CEH, discusses key employee departures, the questions every organization should be asking when they depart re the risk of IP theft, and how iDS' Employee Risk Assessment can quickly assess all the available evidence, paint a detailed and reliable picture of the departed employee’s last days or hours, and determine the potential risk involved. With this assessment, you can make an informed, evidence-based decision on how to proceed.
The Forensicators Present... I USB, You USB, We All USB!
iDS forensics expert Arnold Garcia discusses the continued proliferation of USB storage devices and how the data gathered from and around them can make the difference in many cases and investigations, including theft of IP and trade secret issues.