Digital Forensics: Yesterday, Today, and the Next Frontier

1,157 views
1,047 views

Published on

Presentation on where digital forensics is going, and disperse accessibility (not the cloud!).
Data will be available everywhere, like a personal Max Headroom avatar to assist you. If you're not protecting data from the ground up (hint, it's not at the servers), then you're not protecting data.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,157
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Forensics: Yesterday, Today, and the Next Frontier

  1. 1. (C)2012 The Lorenzi Group - All Rights Reserved
  2. 2. 95,000
  3. 3. ISACA 160 Countries C-Level Executives Auditors & Educators IT Professionals & Students Leading GLOBAL provider of education andcertificates for IT Assurance, Security, Risk & Compliance
  4. 4. Set it and Forget it Security Is DEAD
  5. 5. YOURTime is NOW
  6. 6. Concepts of Security are ChangingThe only thing you should be secure about is that nothing is secure Organized Crime Random Hacktivists Employees
  7. 7. Greatest Risk to Business?• Employees, Contractors, Vendors & Partners• Inside vs. Outside• Don’t stop protecting outside…..
  8. 8. Here lies another big Co. Didn’t care aboutsecurity and always said “NO”. While fighting offbuying more A/V… Employees and Vendors stole its Money!
  9. 9. (C)2012 The Lorenzi Group - All Rights Reserved
  10. 10. (C)2012 The Lorenzi Group - All Rights Reserved
  11. 11. (C)2012 The Lorenzi Group - All Rights Reserved
  12. 12. Are DEADR.I.P.(C)2012 The Lorenzi Group - All Rights Reserved
  13. 13. (C)2012 The Lorenzi Group - All Rights Reserved
  14. 14. COULD be NEXT….. (C)2012 The Lorenzi Group - All Rights Reserved
  15. 15. The Future of Data is…..
  16. 16. Disperse AccessibilityNOTE:This is NOT the “cloud”, mobile devices, or partner networks….
  17. 17. (C)2012 The Lorenzi Group - All Rights Reserved
  18. 18. Mark Pincus(C)2012 The Lorenzi Group - All Rights Reserved
  19. 19. ISACA – The Maine EventDigital Forensics: Yesterday, Today, & the Next Frontier The Lorenzi Group
  20. 20. Digital Forensics & eDiscovery• 2 Step Process – Capturing and preserving everything – Preparing the “Useful” information
  21. 21. SMILE! Digital Forensics Digital Forensics Using a 35mm CameraCreate a Forensic Image (Preserve Data) Take a Picture Restore the Forensic Image Develop the Film Analyze the Information Choose the Pictures you want Report (and Testify) as necessary Build a Scrapbook
  22. 22. E-Z eDiscovery1. Convert paper to electronic images2. Combine images with Digital Forensics results3. Filter out Unnecessary Info4. Review Results5. Submit
  23. 23. Litigation Hold Legal NoticeStarts the moment litigation becomes reasonably possibleRequires parties to preserve all potential evidence Failure to abide could bring sanctions, fines, dismissal of case, & criminal charges
  24. 24. SPOLIATION• The alteration and/or destruction of data• Examples: – Resending an email – Opening a Word document – Deleting a picture – Turning on a computer
  25. 25. In the Beginning…….• Digital Forensics was about DATA• Mainly, RECOVERING data Limited Use Limited Exposure Limited Risk (C)2012 The Lorenzi Group - All Rights Reserved
  26. 26. 4 Step Process Preserve Restore Analyze Testimony NOTE: This IS all or NOTHING. (C)2012 The Lorenzi Group - All Rights Reserved
  27. 27. Today it’s……..• eDiscovery is about CYA• Mainly, making sure only SOME documents go Expanded Use Exponential Exposure Exponential Risk (C)2012 The Lorenzi Group - All Rights Reserved
  28. 28. eDiscovery Steps Input Review Cull Review Approve Deliver (C)2012 The Lorenzi Group - All Rights Reserved
  29. 29. The Future…..• Data Security is about protecting data FIRST• Digital Forensics is critical• eDiscovery is limited (b/c you KNOW) Unlimited Use (Work/Life is gone) Limited Exposure Limited Risk (C)2012 The Lorenzi Group - All Rights Reserved
  30. 30. Security AnalyticsThe analysis of device and user generated datato understand patterns, usage, and anomalies. Provides hard and soft results on: Security Compliance Productivity (C)2012 The Lorenzi Group - All Rights Reserved
  31. 31. User/Device Monitoring• Improves Data Security Exponentially – Mistakes – Desperate – Criminal• Makes Compliance Easier• Can provide Productivity metrics – Termination Justification – Training Needs – Resource Allocation – Cost Saving OpportunitiesExamples:Lockheed, Fidelity, USPS, Kaiser Permanente (many others)
  32. 32. FCPA & UKBA2010 Your BEST Friend Your CLIENTS WORST NightmareThe tentacles of Govt regulation are spreading Are YOUR clients ready? Are YOU ready?
  33. 33. Stored Communications Act Who Owns the DATA?Accessing personal emails and texts – Illegal Unless…Company owns the device (looking locally) Company pays for device service BYOD?
  34. 34. BYOD• Stored Communications Act• Employee Owned/Company Paid• Company Owned
  35. 35. ADAEU says web surfing is an addiction What does the US say? REALLY????
  36. 36. If the data is protected FIRST… eDiscovery is EASY Digital Forensics (your analysis) is INSTANT The money shifts from THERE to HERE Data, Clients, & Organizations are PROTECTEDNEED to promote the value of Compliance Audits (C)2012 The Lorenzi Group - All Rights Reserved
  37. 37. OUR Future? Tech Writer SpeakerPsych HERE Legal Project Logic Manager Stats (C)2012 The Lorenzi Group - All Rights Reserved
  38. 38. Final Thoughts Social Media is good for business Acceptable Use Policies are required BYOD isn’t necessary Ongoing Training & Reminders are criticalThe future of Digital Forensics is protecting is before it’s lost! Who will ensure data is protected? YOU
  39. 39. Robert Fitzgerald The Lorenzi Group 866-632-9880 x123www.thelorenzigroup.com (C)2012 The Lorenzi Group - All Rights Reserved

×