How to Avoid Digital Forensics that Overpromise and Underdeliver

Forensics are critical in any type of cyber investigation. But the quality and delivery of those forensics are far from equal across the board. On this webinar, we’ll address the issues of spotting and avoiding the high cost of bad forensics.

GIVEAWAY:

FifthDomain_3D

Watch our webinar and complete a short survey to receive a FREE SIGNED HARD COPY of the Fifth Domain: Defending Our Country, Our Companies and Ourselves in the Age of Cyber Threats

 

 

MODERATOR:

david-sparks

David Spark, producer and co-host of CISO/Security Vendor Relationship Podcast and Defense in Depth

 

 

PANELISTS:

rob-knake

Rob Knake is a Senior Fellow for Cyber Policy at the Council on Foreign Relations and a Senior Research Scientist at Northeastern University’s Global Resilience Institute. Rob served from 2011 to 2015 as Director for Cybersecurity Policy at the National Security Council. In this role, he was responsible for the development of Presidential policy on cybersecurity, and built and managed Federal processes for cyber incident response and vulnerability management. His most recent book, the Fifth Domain: Defending Our Country, Our Companies and Ourselves in the Age of Cyber Threats was published by Penguin RandomHouse in the summer of 2018.

 

Bob-Osgood

Bob Osgood is the Director of Mason’s Digital Forensics and Cyber Analysis program.  Bob is an accomplished, pro-active professional with expertise in developing and applying analytics to law enforcement with combined experience and achievement in the areas of: Digital Forensics, Enterprise Case Management, Cyber Crime, Counterintelligence, Information Security/Technology, Team Leadership, and Critical Infrastructure Protection. Prior to Mason, Bob served for 26 years as an FBI Special Agent.  Bob was a computer forensics examiner, technically trained agent, and covert entry specialist (Flaps and Seals).  Bob is a Certified Public Accountant and has a Masters in Network Engineering. 

 

hussain-virani

Hussain Virani, B. Tech, CISSP is the Managing Consultant for X-Force IRIS (Incident Response and Intelligence Services) at IBM.  His services and experience includes 15+ years at various private sector firms, government entities, and technology companies.  Hussain is Based in Calgary, Alberta, Canada and his training / education includes: BCIT, Justice Institute of BC, Royal Canadian Mounted Police.  Hussain specializes in computer forensics, criminal law, general investigations, incident response, lock picking, and collecting phishing domains.

 

ben-cotton

Ben Cotton, founded CyTech Services, following a 21-year career in the United States Army Special Forces. As part of his military service, Ben developed the digital sensitive site exploitation, computer network attack (CNA), computer network defense (CND) and computer network operations (CNO) capabilities for the United States Special Operations Command (USSOCOM). CyFIR LLC, was formed in 2018, and Ben’s Special Forces approach to dealing with these kinds of challenges in a military setting is also applied as the CyFIR team deals with the current cyber challenges facing enterprise markets.