SlideShare a Scribd company logo
1 of 16
Download to read offline
SESSION ID:
MODERATOR:
PANELISTS:
SESSION ID:
#RSAC
LAW- F03
Michael Stortz
Partner
Drinker Biddle & Reath
Jay Brudz
Chair, Information Governance & eDiscovery Group, Drinker Biddle & Reath
Can I Get A Witness?
Technical Witness Bootcamp
Eric Hibbard
CTO Security & Privacy
Hitachi Data Systems
Erez Lieberman
Chief Counsel, Cybersecurity & Privacy
Prudential
#RSAC
I. Introductions
II. Trial Techniques Panel Discussion
III. Simulation – Technical Witness
Testimony
IV. Q&A
#RSAC
Framing the Discussion: Key Concepts
3
Testimony
Oral or written evidence given by a competent witness, under oath, at trial or in
an Affidavit or Deposition
Affidavit
A witness’ voluntarily sworn declaration of written facts
Deposition
Witness’ sworn out-of-court testimony (oral or written)
Used to gather information as part of the discovery process
May be used in trial, but usually hearsay
#RSAC
Framing the Discussion: Key Concepts
4
Stages of a Civil Trial
1) Opening statements by both sides
2) Plaintiff (P) calls witnesses and produces evidence
3) Defendant (D) may call witnesses and produce
evidence to disprove P’s case or prove D’s claims
4) P may call rebuttal witnesses
5) Closing arguments by both sides
6) Judge instructs Jury
7) Jury deliberates
8) Jury reaches its verdict
Direct v. Cross
Direct Examination
The questioning of a witness by the party
who called him/her in trial – asks for the
witness’ account
Cross-Examination
Questioning of a witness by the opposing
– evaluate the witness’ account and the
witness’ credibility
#RSAC
Framing the Discussion: Key Concepts
5
Lay Witness vs.
Lay Witness Testimony
More often than likely you will be a lay
(or fact) witness, even in forensic cases
Lay witness opinions are generally
inadmissible, except when:
— Rationally based on the witness’
perception,
— Helpful to a clear understanding of
his/her testimony or helpful to the
determination of a fact in issue, and
— Not based on scientific, technical, or
other specialized knowledge
Expert Witness
Expert Witness Testimony
An expert may state an opinion or conclusion, if the:
— Subject matter is one where scientific, technical, or other
specialized knowledge would assist the trier of fact;
— Witness is qualified as an expert (i.e. special knowledge,
skill, experience, training, or education);
— Expert possesses reasonable probability regarding his/her
opinion; and
— Opinion is supported by a proper factual basis. The
expert’s opinion may be based on 1 or more of the 3
possible sources of information: (i) personal observation,
(ii) facts made known to the expert at trial, or (iii) facts
not known personally, but supplied to him outside the
courtroom and of a type reasonably relied upon by
experts in the particular field
#RSAC
Framing the Discussion: Key Concepts
6
Evidentiary Issues in Digital Cases
Authentication
— Proponent must produce evidence sufficient to support
a finding that the item is what the proponent claims it is
— Several methods to authenticate (e.g., authentication by
reply or content)
— Chain-of-Custody issues
Hearsay
— An out of court statement (i.e. oral, written, or conduct)
offered in evidence to prove the matter asserted;
generally inadmissible, unless an exception applies
— Ex. Business Record Exception
 Likely accurate since they are made for running a business vs.
for a litigation purpose
#RSAC
Framing the Discussion: Key Concepts
7
Purpose of Testimony
Trial Style
Preparation
Scope
Relevance
Forensic Findings
Traps
Speculation
Technical Limitations
Remember:
The underlying
technology is
NOT on trial!
#RSAC
Framing the Discussion: Key Concepts
8
DO…
Look Nice
Be Polite
Speak Up and Clearly
Prepare
Eye Contact
Be Truthful
Answer the Questions
DO NOT….
Volunteer
Take the Bait
Try to Win the Case
Fill Silences
Get Mad or Combative
Open the Door
Use Tech Jargon
#RSAC
Simulation: Data Breach Trial
9
BuyMore Industries (“BMI”) is a company of 2,000
employees which manufactures artisanal snooze
alarm back scratchers, sold primarily online through
their homegrown ecommerce site.
Last year, an intrepid reporter on the cybersecurity
breach contacted your CIO to let them know that
your data was available on the black market, shortly
thereafter the story broke.
BMI customers filed a class-action lawsuit against
BMI alleging its failure in safeguarding their data.
You are BMI’s Network Engineer, reporting directly to
the CIO. You are responsible for network security as
well as keeping the lights on.
You have been asked to testify regarding the facts of
the data breach.
#RSAC
Simulation: Data Breach Trial
10
In conducting your investigation, you
have prepared a report regarding
A forensic examination of BMI’s CEO’s
computer, which received a spear
phishing email with a malicious file
attachment (found in unallocated space)
How the malware attacked BMI’s
network and led to the exfiltration of 10
million customer records
The report is shared with BMI and the
plaintiffs’ attorney.
Trial commences and BMI calls you to
take the stand
#RSAC
Simulation: Data Breach Trial
11
Witness’ Testimony: Key Points
I. BMI’s network security was in accordance with industry best practices and norms
II. BMI’s main database of customer information was compromised
III. The database contained 10 million customer records
IV. The breach originated with a phishing attack on the CEO’s personal email
account
#RSAC
Simulation: Data Breach Trial
12
Spear phishing email
sent to BMI CEO
CEO downloads an
attachment laden
with malware
The malware
accesses a malicious
C&C server and
delivers a decoy .doc
file
Attacker gains access
to customer data
base containing
sensitive PII of 10M
users
Witness’ Testimony: Key Points cont.
#RSAC
Simulation: Data Breach Trial
13
Phishing email
recovered from
unallocated space on
CEO’s computer
Exhibit 1:
HR Manager <HR-Manager@BMI-HR.com>
BMI.CEO@gmail.com
Dear CEO,
BMI’s Human Resources Department asks that you review
your annual executive benefits elections for FY2016 in the
attached document.
BMI HR Department: Annual Benefits Elections
#RSAC
Simulation: Data Breach Trial
14
Demonstrative exhibit
showing BMI’s network
topology
Exhibit 2:
#RSAC
Simulation: Data Breach Trial
15
Demonstrative exhibit
showing breach process
Exhibit 3:
#RSAC
QUESTIONS?

More Related Content

What's hot

Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Danny609Davidson
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
shahhardik27
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 

What's hot (20)

Jason Coombs Expert Witness CV
Jason Coombs Expert Witness CVJason Coombs Expert Witness CV
Jason Coombs Expert Witness CV
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
The Open Patent Office presented at Brussels Legal Hackers Demo night
The Open Patent Office presented at Brussels Legal Hackers Demo nightThe Open Patent Office presented at Brussels Legal Hackers Demo night
The Open Patent Office presented at Brussels Legal Hackers Demo night
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Private Investigations in Family Court
Private Investigations in Family CourtPrivate Investigations in Family Court
Private Investigations in Family Court
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Patent thickets
Patent thicketsPatent thickets
Patent thickets
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
IT forensic
IT forensicIT forensic
IT forensic
 
Types of investigation- Adam Quirk
Types of investigation- Adam QuirkTypes of investigation- Adam Quirk
Types of investigation- Adam Quirk
 

Similar to Can I Get A Witness? Technical Witness Bootcamp

Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
Logikcull.com
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 
Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11
Eric Rudich, Ph.D.
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
rlhicksjr
 

Similar to Can I Get A Witness? Technical Witness Bootcamp (20)

Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.ppt
 
dexa.ppt
dexa.pptdexa.ppt
dexa.ppt
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Cyber
CyberCyber
Cyber
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11Rudich Landslide Article Jan '11
Rudich Landslide Article Jan '11
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Ensuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New RulesEnsuring Your E-Discovery Procedures Comply With The New Rules
Ensuring Your E-Discovery Procedures Comply With The New Rules
 
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua LenonUnderstanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

Can I Get A Witness? Technical Witness Bootcamp

  • 1. SESSION ID: MODERATOR: PANELISTS: SESSION ID: #RSAC LAW- F03 Michael Stortz Partner Drinker Biddle & Reath Jay Brudz Chair, Information Governance & eDiscovery Group, Drinker Biddle & Reath Can I Get A Witness? Technical Witness Bootcamp Eric Hibbard CTO Security & Privacy Hitachi Data Systems Erez Lieberman Chief Counsel, Cybersecurity & Privacy Prudential
  • 2. #RSAC I. Introductions II. Trial Techniques Panel Discussion III. Simulation – Technical Witness Testimony IV. Q&A
  • 3. #RSAC Framing the Discussion: Key Concepts 3 Testimony Oral or written evidence given by a competent witness, under oath, at trial or in an Affidavit or Deposition Affidavit A witness’ voluntarily sworn declaration of written facts Deposition Witness’ sworn out-of-court testimony (oral or written) Used to gather information as part of the discovery process May be used in trial, but usually hearsay
  • 4. #RSAC Framing the Discussion: Key Concepts 4 Stages of a Civil Trial 1) Opening statements by both sides 2) Plaintiff (P) calls witnesses and produces evidence 3) Defendant (D) may call witnesses and produce evidence to disprove P’s case or prove D’s claims 4) P may call rebuttal witnesses 5) Closing arguments by both sides 6) Judge instructs Jury 7) Jury deliberates 8) Jury reaches its verdict Direct v. Cross Direct Examination The questioning of a witness by the party who called him/her in trial – asks for the witness’ account Cross-Examination Questioning of a witness by the opposing – evaluate the witness’ account and the witness’ credibility
  • 5. #RSAC Framing the Discussion: Key Concepts 5 Lay Witness vs. Lay Witness Testimony More often than likely you will be a lay (or fact) witness, even in forensic cases Lay witness opinions are generally inadmissible, except when: — Rationally based on the witness’ perception, — Helpful to a clear understanding of his/her testimony or helpful to the determination of a fact in issue, and — Not based on scientific, technical, or other specialized knowledge Expert Witness Expert Witness Testimony An expert may state an opinion or conclusion, if the: — Subject matter is one where scientific, technical, or other specialized knowledge would assist the trier of fact; — Witness is qualified as an expert (i.e. special knowledge, skill, experience, training, or education); — Expert possesses reasonable probability regarding his/her opinion; and — Opinion is supported by a proper factual basis. The expert’s opinion may be based on 1 or more of the 3 possible sources of information: (i) personal observation, (ii) facts made known to the expert at trial, or (iii) facts not known personally, but supplied to him outside the courtroom and of a type reasonably relied upon by experts in the particular field
  • 6. #RSAC Framing the Discussion: Key Concepts 6 Evidentiary Issues in Digital Cases Authentication — Proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is — Several methods to authenticate (e.g., authentication by reply or content) — Chain-of-Custody issues Hearsay — An out of court statement (i.e. oral, written, or conduct) offered in evidence to prove the matter asserted; generally inadmissible, unless an exception applies — Ex. Business Record Exception  Likely accurate since they are made for running a business vs. for a litigation purpose
  • 7. #RSAC Framing the Discussion: Key Concepts 7 Purpose of Testimony Trial Style Preparation Scope Relevance Forensic Findings Traps Speculation Technical Limitations Remember: The underlying technology is NOT on trial!
  • 8. #RSAC Framing the Discussion: Key Concepts 8 DO… Look Nice Be Polite Speak Up and Clearly Prepare Eye Contact Be Truthful Answer the Questions DO NOT…. Volunteer Take the Bait Try to Win the Case Fill Silences Get Mad or Combative Open the Door Use Tech Jargon
  • 9. #RSAC Simulation: Data Breach Trial 9 BuyMore Industries (“BMI”) is a company of 2,000 employees which manufactures artisanal snooze alarm back scratchers, sold primarily online through their homegrown ecommerce site. Last year, an intrepid reporter on the cybersecurity breach contacted your CIO to let them know that your data was available on the black market, shortly thereafter the story broke. BMI customers filed a class-action lawsuit against BMI alleging its failure in safeguarding their data. You are BMI’s Network Engineer, reporting directly to the CIO. You are responsible for network security as well as keeping the lights on. You have been asked to testify regarding the facts of the data breach.
  • 10. #RSAC Simulation: Data Breach Trial 10 In conducting your investigation, you have prepared a report regarding A forensic examination of BMI’s CEO’s computer, which received a spear phishing email with a malicious file attachment (found in unallocated space) How the malware attacked BMI’s network and led to the exfiltration of 10 million customer records The report is shared with BMI and the plaintiffs’ attorney. Trial commences and BMI calls you to take the stand
  • 11. #RSAC Simulation: Data Breach Trial 11 Witness’ Testimony: Key Points I. BMI’s network security was in accordance with industry best practices and norms II. BMI’s main database of customer information was compromised III. The database contained 10 million customer records IV. The breach originated with a phishing attack on the CEO’s personal email account
  • 12. #RSAC Simulation: Data Breach Trial 12 Spear phishing email sent to BMI CEO CEO downloads an attachment laden with malware The malware accesses a malicious C&C server and delivers a decoy .doc file Attacker gains access to customer data base containing sensitive PII of 10M users Witness’ Testimony: Key Points cont.
  • 13. #RSAC Simulation: Data Breach Trial 13 Phishing email recovered from unallocated space on CEO’s computer Exhibit 1: HR Manager <HR-Manager@BMI-HR.com> BMI.CEO@gmail.com Dear CEO, BMI’s Human Resources Department asks that you review your annual executive benefits elections for FY2016 in the attached document. BMI HR Department: Annual Benefits Elections
  • 14. #RSAC Simulation: Data Breach Trial 14 Demonstrative exhibit showing BMI’s network topology Exhibit 2:
  • 15. #RSAC Simulation: Data Breach Trial 15 Demonstrative exhibit showing breach process Exhibit 3: