SlideShare a Scribd company logo
1 of 1
CASE STUDY – CYBER INVESTIGATIONS
Timothy J. Nolan
218 Brown Lane  Shelbyville, TN 37160  931-842-0273  tim.nolan@charter.net
The Sylint Group, Inc.
 Various Financial Services Industry Oriented Investigations
Manager of Intrusion Detection, Incident
Response, and Cyber Investigations
Bridgestone Americas, Inc.
I was the dedicated manager directly responsible for information security
monitoring and intrusion detection, incident response, and cyber
investigations for Bridgestone Americas, Inc.
Bridgestone Americas, Inc. is the Americas entity of a $35B “Fortune Global
500” company.
Incident Response and Cyber Investigations
 Computer Hacking
 New Zero-Day Malware Attacks
 Computer Worms
 Virus, Trojan Horse,
Keyloggers
 Theft of Intellectual Property
 Extortion / Threats
 Leakage of Internal
Information to 3rd
Parties
 Cellular Fraud
 Data Theft
 Botnet Client Malware
 Rootkits, MBR Infections
 Phishing / Targeted Phishing
 System Damage/Disruption
 Financial Theft
 Toll Fraud
 Employee Harassment
 Misuse of Company Assets
 Pornography / CP
 Violations of Company Policy
 Violations of Law
Experience
I have e xtensive e xperience le ading and performing countless cyber
inve stigations. Over the course of 17 + ye ars, I have pe rformed
incident re sponse and have le d incident re sponse teams in re sponse
to information security incidents and e vents and cyber-crimes.
Many of these were and remain sensitive items that cannot be disclosed due to Non-
Disclosure Agreements (NDA) and commitments made in employee agreements,
though some details have been made public in newspaper accounts, etc..
The se include violations of policy and law and have re sulted in
e mployee and contractor te rminations, civil lawsuits, and criminal
inve stigation and prosecution.
Some investigations have been global in nature; others have occurred
across the Ame ricas. I have w orked w ith local, state, and U.S. Fede ral
law e nforcement agencies. Internally, my w ork has supported our
Corporate Se curity, Internal Audit, and Human Re sources
de partments, and top e xecutive o fficers of the company.
I have been described as a ve ry te nacious and persistent investigator
and am quite diligent to look hard to find e vidence and uncover the
facts. The se facts often are irrefutable and describe w hat happened,
w ho did it, w hen, how, w here, e tc. Evidence has both convicted and
e xonerated individuals subject to investigation.
I am familiar w ith computer forensics and investigation tools and
me thods, and I have w orked w ith e xternal investigators, polygraph
e xaminers, surveillance teams, forensics e xperts, te lephone company
fraud e xperts, malware re versers, top se curity re searchers, e tc.
What others say…
“Tim has gained the
reputation as a diligent
and tenacious security
specialist, and has
saved our company
from disaster many
times - both in the
United States and
abroad.” – RT
“His dedication to
following all possible
leads in a case is
something that most
people don't have the
patience or dedication
to do. He is one of the
most detail-oriented
and dedicated
individuals I have ever
worked with.” – JH
“Tim's obvious
experience,
background, and talent
make him a formidable
foe for anyone
attempting to steal or
misuse assets he is
charged to protect.” –SJ
“Timothy accurately
bears focus on the small
ripples in the heartbeat
of the network that
could signify threats to
the organization, but to
many others, would go
unnoticed. Timothy is
the right man to be in
charge of managing and
responding to threats to
this expansive, diverse
and complex system.”
- DM
“In the several years I
have worked with Tim, I
have come to admire his
personal integrity. He is
able to keep up with the
latest threats and
handle sensitive
incidents while
balancing the needs of
the business”. - KK

More Related Content

What's hot

Airport security 2013 jayne maisey
Airport security 2013   jayne maiseyAirport security 2013   jayne maisey
Airport security 2013 jayne maisey
Russell Publishing
 
Ppt joseph throneberry
Ppt joseph throneberryPpt joseph throneberry
Ppt joseph throneberry
kevinpity
 

What's hot (13)

Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Cyber Threat Prevention in Todays World
Cyber Threat Prevention in Todays World Cyber Threat Prevention in Todays World
Cyber Threat Prevention in Todays World
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Airport security 2013 jayne maisey
Airport security 2013   jayne maiseyAirport security 2013   jayne maisey
Airport security 2013 jayne maisey
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Ppt joseph throneberry
Ppt joseph throneberryPpt joseph throneberry
Ppt joseph throneberry
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Identity theft
Identity theftIdentity theft
Identity theft
 
12.06.2018 Best Practices in M&A& and Post-Merger Integration
12.06.2018 Best Practices in M&A& and Post-Merger Integration12.06.2018 Best Practices in M&A& and Post-Merger Integration
12.06.2018 Best Practices in M&A& and Post-Merger Integration
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsIdentity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your Clients
 
Misdemeanor meaning and types of crimes & what is moving traffic violatio...
Misdemeanor meaning and types of crimes & what is moving traffic violatio...Misdemeanor meaning and types of crimes & what is moving traffic violatio...
Misdemeanor meaning and types of crimes & what is moving traffic violatio...
 

Similar to Case-Study-Cyber-Investigations-8-5-2015

III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
FecomercioSP
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
haynormania
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
Jason Smith
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 

Similar to Case-Study-Cyber-Investigations-8-5-2015 (20)

III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate Espionage
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 

Case-Study-Cyber-Investigations-8-5-2015

  • 1. CASE STUDY – CYBER INVESTIGATIONS Timothy J. Nolan 218 Brown Lane  Shelbyville, TN 37160  931-842-0273  tim.nolan@charter.net The Sylint Group, Inc.  Various Financial Services Industry Oriented Investigations Manager of Intrusion Detection, Incident Response, and Cyber Investigations Bridgestone Americas, Inc. I was the dedicated manager directly responsible for information security monitoring and intrusion detection, incident response, and cyber investigations for Bridgestone Americas, Inc. Bridgestone Americas, Inc. is the Americas entity of a $35B “Fortune Global 500” company. Incident Response and Cyber Investigations  Computer Hacking  New Zero-Day Malware Attacks  Computer Worms  Virus, Trojan Horse, Keyloggers  Theft of Intellectual Property  Extortion / Threats  Leakage of Internal Information to 3rd Parties  Cellular Fraud  Data Theft  Botnet Client Malware  Rootkits, MBR Infections  Phishing / Targeted Phishing  System Damage/Disruption  Financial Theft  Toll Fraud  Employee Harassment  Misuse of Company Assets  Pornography / CP  Violations of Company Policy  Violations of Law Experience I have e xtensive e xperience le ading and performing countless cyber inve stigations. Over the course of 17 + ye ars, I have pe rformed incident re sponse and have le d incident re sponse teams in re sponse to information security incidents and e vents and cyber-crimes. Many of these were and remain sensitive items that cannot be disclosed due to Non- Disclosure Agreements (NDA) and commitments made in employee agreements, though some details have been made public in newspaper accounts, etc.. The se include violations of policy and law and have re sulted in e mployee and contractor te rminations, civil lawsuits, and criminal inve stigation and prosecution. Some investigations have been global in nature; others have occurred across the Ame ricas. I have w orked w ith local, state, and U.S. Fede ral law e nforcement agencies. Internally, my w ork has supported our Corporate Se curity, Internal Audit, and Human Re sources de partments, and top e xecutive o fficers of the company. I have been described as a ve ry te nacious and persistent investigator and am quite diligent to look hard to find e vidence and uncover the facts. The se facts often are irrefutable and describe w hat happened, w ho did it, w hen, how, w here, e tc. Evidence has both convicted and e xonerated individuals subject to investigation. I am familiar w ith computer forensics and investigation tools and me thods, and I have w orked w ith e xternal investigators, polygraph e xaminers, surveillance teams, forensics e xperts, te lephone company fraud e xperts, malware re versers, top se curity re searchers, e tc. What others say… “Tim has gained the reputation as a diligent and tenacious security specialist, and has saved our company from disaster many times - both in the United States and abroad.” – RT “His dedication to following all possible leads in a case is something that most people don't have the patience or dedication to do. He is one of the most detail-oriented and dedicated individuals I have ever worked with.” – JH “Tim's obvious experience, background, and talent make him a formidable foe for anyone attempting to steal or misuse assets he is charged to protect.” –SJ “Timothy accurately bears focus on the small ripples in the heartbeat of the network that could signify threats to the organization, but to many others, would go unnoticed. Timothy is the right man to be in charge of managing and responding to threats to this expansive, diverse and complex system.” - DM “In the several years I have worked with Tim, I have come to admire his personal integrity. He is able to keep up with the latest threats and handle sensitive incidents while balancing the needs of the business”. - KK