Your SlideShare is downloading. ×
0
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Digital Forensics: Yesterday, Today, and the Next Frontier

984

Published on

Presentation on where digital forensics is going, and disperse accessibility (not the cloud!). …

Presentation on where digital forensics is going, and disperse accessibility (not the cloud!).
Data will be available everywhere, like a personal Max Headroom avatar to assist you. If you're not protecting data from the ground up (hint, it's not at the servers), then you're not protecting data.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
984
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. (C)2012 The Lorenzi Group - All Rights Reserved
  • 2. 95,000
  • 3. ISACA 160 Countries C-Level Executives Auditors & Educators IT Professionals & Students Leading GLOBAL provider of education andcertificates for IT Assurance, Security, Risk & Compliance
  • 4. Set it and Forget it Security Is DEAD
  • 5. YOURTime is NOW
  • 6. Concepts of Security are ChangingThe only thing you should be secure about is that nothing is secure Organized Crime Random Hacktivists Employees
  • 7. Greatest Risk to Business?• Employees, Contractors, Vendors & Partners• Inside vs. Outside• Don’t stop protecting outside…..
  • 8. Here lies another big Co. Didn’t care aboutsecurity and always said “NO”. While fighting offbuying more A/V… Employees and Vendors stole its Money!
  • 9. (C)2012 The Lorenzi Group - All Rights Reserved
  • 10. (C)2012 The Lorenzi Group - All Rights Reserved
  • 11. (C)2012 The Lorenzi Group - All Rights Reserved
  • 12. Are DEADR.I.P.(C)2012 The Lorenzi Group - All Rights Reserved
  • 13. (C)2012 The Lorenzi Group - All Rights Reserved
  • 14. COULD be NEXT….. (C)2012 The Lorenzi Group - All Rights Reserved
  • 15. The Future of Data is…..
  • 16. Disperse AccessibilityNOTE:This is NOT the “cloud”, mobile devices, or partner networks….
  • 17. (C)2012 The Lorenzi Group - All Rights Reserved
  • 18. Mark Pincus(C)2012 The Lorenzi Group - All Rights Reserved
  • 19. ISACA – The Maine EventDigital Forensics: Yesterday, Today, & the Next Frontier The Lorenzi Group
  • 20. Digital Forensics & eDiscovery• 2 Step Process – Capturing and preserving everything – Preparing the “Useful” information
  • 21. SMILE! Digital Forensics Digital Forensics Using a 35mm CameraCreate a Forensic Image (Preserve Data) Take a Picture Restore the Forensic Image Develop the Film Analyze the Information Choose the Pictures you want Report (and Testify) as necessary Build a Scrapbook
  • 22. E-Z eDiscovery1. Convert paper to electronic images2. Combine images with Digital Forensics results3. Filter out Unnecessary Info4. Review Results5. Submit
  • 23. Litigation Hold Legal NoticeStarts the moment litigation becomes reasonably possibleRequires parties to preserve all potential evidence Failure to abide could bring sanctions, fines, dismissal of case, & criminal charges
  • 24. SPOLIATION• The alteration and/or destruction of data• Examples: – Resending an email – Opening a Word document – Deleting a picture – Turning on a computer
  • 25. In the Beginning…….• Digital Forensics was about DATA• Mainly, RECOVERING data Limited Use Limited Exposure Limited Risk (C)2012 The Lorenzi Group - All Rights Reserved
  • 26. 4 Step Process Preserve Restore Analyze Testimony NOTE: This IS all or NOTHING. (C)2012 The Lorenzi Group - All Rights Reserved
  • 27. Today it’s……..• eDiscovery is about CYA• Mainly, making sure only SOME documents go Expanded Use Exponential Exposure Exponential Risk (C)2012 The Lorenzi Group - All Rights Reserved
  • 28. eDiscovery Steps Input Review Cull Review Approve Deliver (C)2012 The Lorenzi Group - All Rights Reserved
  • 29. The Future…..• Data Security is about protecting data FIRST• Digital Forensics is critical• eDiscovery is limited (b/c you KNOW) Unlimited Use (Work/Life is gone) Limited Exposure Limited Risk (C)2012 The Lorenzi Group - All Rights Reserved
  • 30. Security AnalyticsThe analysis of device and user generated datato understand patterns, usage, and anomalies. Provides hard and soft results on: Security Compliance Productivity (C)2012 The Lorenzi Group - All Rights Reserved
  • 31. User/Device Monitoring• Improves Data Security Exponentially – Mistakes – Desperate – Criminal• Makes Compliance Easier• Can provide Productivity metrics – Termination Justification – Training Needs – Resource Allocation – Cost Saving OpportunitiesExamples:Lockheed, Fidelity, USPS, Kaiser Permanente (many others)
  • 32. FCPA & UKBA2010 Your BEST Friend Your CLIENTS WORST NightmareThe tentacles of Govt regulation are spreading Are YOUR clients ready? Are YOU ready?
  • 33. Stored Communications Act Who Owns the DATA?Accessing personal emails and texts – Illegal Unless…Company owns the device (looking locally) Company pays for device service BYOD?
  • 34. BYOD• Stored Communications Act• Employee Owned/Company Paid• Company Owned
  • 35. ADAEU says web surfing is an addiction What does the US say? REALLY????
  • 36. If the data is protected FIRST… eDiscovery is EASY Digital Forensics (your analysis) is INSTANT The money shifts from THERE to HERE Data, Clients, & Organizations are PROTECTEDNEED to promote the value of Compliance Audits (C)2012 The Lorenzi Group - All Rights Reserved
  • 37. OUR Future? Tech Writer SpeakerPsych HERE Legal Project Logic Manager Stats (C)2012 The Lorenzi Group - All Rights Reserved
  • 38. Final Thoughts Social Media is good for business Acceptable Use Policies are required BYOD isn’t necessary Ongoing Training & Reminders are criticalThe future of Digital Forensics is protecting is before it’s lost! Who will ensure data is protected? YOU
  • 39. Robert Fitzgerald The Lorenzi Group 866-632-9880 x123www.thelorenzigroup.com (C)2012 The Lorenzi Group - All Rights Reserved

×