SlideShare a Scribd company logo
1 of 31
Logs & The Law What is Admissible in Court? Dominique Levin, VP Product Management Logs & The Law: What’s Admissible in Court? MGT-4,  June 12, 2006
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Sources Of Data in the Enterprise 10/09/200317:42:57,146.127.94.13,48352,146.127.97.14,909,,,accept,tcp,,,,909,146.127.93.29,,0,,4,3,,' 9Oct2003 17:42:57,accept,labcpngfp3,inbound,eth2c0,0,VPN-1 & FireWall-1,product=VPN-1 & FireWall-1[db_tag={0DE0E532-EEA0-11D7-BDFC-927F5D1DECEC};mgmt= labcpngfp3;date=1064415722;policy_name= Standard],labdragon,48352,146.127.97.14,909, tcp,146.127.93.145,',eth2c0,inbound Oct 9 16:29:49 [146.127.94.4] Oct 09 2003 16:44:50: %PIX-6-302013: Built outbound TCP connection 2245701 for outside:146.127.98.67/1487 (146.127.98.67/1487) to inside:146.127.94.13/42562 (146.127.93.145/42562) 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 SENSORDATAID="138715" SENSORNAME="146.127.94.23:network_sensor_1" ALERTID="QPQVIOAJKBNC6OONK6FTNLLESZ" LOCALTIMEZONEOFFSET="14400" ALERTNAME="pcAnywhere_Probe“ ALERTDATETIME="2003-10-20 19:35:21.0" SRCADDRESSNAME="146.127.94.10" SOURCEPORT="42444" INTRUDERPORT="42444" DESTADDRESSNAME="146.127.94.13" VICTIMPORT="5631" ALERTCOUNT="1" ALERTPRIORITY="3" PRODUCTID="3" PROTOCOLID="6" REASON="RSTsent" 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 Systems Structured Unstructured
Log Data is 30% of all Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Systems 30% of all data
Logs are a Fingerprint User and System Activity Privileges Assigned/Changed Customer Transaction Email BCC Failed Logon Security Breach File Up/Download Credit Card Data Access Information Leak
Logs Can Tell You Who Is Doing What … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Many Precedents For Using Logs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preparedness is the Best Defense “ Unfortunately, that [no log data being available] happens more often than I would like… If your home had been robbed, you would have to tell the police office what was stolen and how the burglar got in. The same is also true for the network. If you simply tell us you have been broken into, and have no evidence to support it, we may be empathetic, but we can’t open a case.”   Shelagh Sayers, special agent, FBI, San Francisco
You have Legal Obligations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layers Of Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices Recommend Log Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federal, State & Intl’ Laws Impacting Log Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Log Lies, Myths & Rumor… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Immutable Logs Matter ,[object Object],[object Object],[object Object],“ When audited logs are immutable and cannot be altered, there are additional advantages for deterrence and proof of policy or legal violations With immutability, deterrence may be improved for all users of the system.”   Markle Foundation Implementing a Trusted Information Sharing Environment February, 2006
Overcoming Admissibility Hurdles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ten Steps To Immutable Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ten Steps To Immutable Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Things to Avoid ,[object Object],[object Object],[object Object],[object Object],[object Object]
Clear Benefits “ With forensically sounds logs, companies can reduce the potential of loosing a lawsuit, diminish the costs associated with discovery and defense, increase the likelihood of forcing an opponent into settlement, and be a resource to define against actions related to corporate governance.”   Erin Kenneally FSA Times The Institute of Internal Auditors
Reducing Costs of Compliance Guillermo Kopp Vice President Cross-Industry Compliance Costs (USD in Billions) 40% 60% 84% 16% 85% 15% TACTICAL APPROACH REGULATORY  ONSLAUGHT AUTOMATION Source: TowerGroup
Log Management & Intelligence Real-Time Analysis Historical Archives Complete Aggregation Automation Of Collection Processes & Controls
High-Performance Architecture for Global 2000 Best Practices Reports and Alerts  Business Policies and IT Controls Definition IT Controls - Policy Statements Import Compliance Reports and Alerts Export 100% Message Collection. 100% Pure Storage. Behavioral Alerts. Compliance Reports. Real-time Search.   Only the CEO should access this data What  should be happening? Who is actually accessing this data? What  is  happening? Backup Software SAN/NAS Storage Enterprise Apps Mail Servers Proxy Servers Win/Linux Servers Network Devices Security Devices CEO COO CSO CIO HR Customer Legal BOD Operations Network Security Datacenter Audit
Architecting to meet Legal Obligations Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs NTP Server Microsecond accuracy: for example 30.123456 seconds
Securing Log Data Transport Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs Encryption, Authentication, TCP, Compression. Buffer in case of  WAN  Failure.
Avoid Collusion with Distributed Log Storage Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs Off-site storage in 2 places: requires multi-party conspiracy to alter logs. LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
Perform Analysis on a Copy of the Log Data Disaster Recovery Site Management Station SOAP Request XML Responses Main Data Center Existing Networked Storage raw logs ST 2000 Raw Logs Remote Office Remote Office Remote Office Raw Logs Log Analysis LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
Make Archives Tamper Proof with Hashing Each 1 minute file has it’s  own hash file.
No Human Intervention: Auto-Retention Settings Logs get deleted by software automatically, not by users.
Store Logs on WORM or encrypted device ,[object Object],[object Object],ST 2000 raw logs LX 2000 metalogs ST 2000 raw logs LX 2000 metalogs NAS NetApp Decru.
Take Action! ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You!  Join us for a demo!   http://www.loglogic.com/resources/screencasts/   loglogic.com blog.loglogic.com  Automating Compliance. Mitigating Risk.

More Related Content

What's hot

Mastering negotiation skills
Mastering negotiation skillsMastering negotiation skills
Mastering negotiation skillsgihan aboueleish
 
The Negotiation Process Four Stages {Lecture Notes}
The Negotiation Process Four Stages {Lecture Notes}The Negotiation Process Four Stages {Lecture Notes}
The Negotiation Process Four Stages {Lecture Notes}FellowBuddy.com
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portabilityamitachouliger
 
The Concept of Innovation and Innovation Management
The Concept of Innovation and Innovation ManagementThe Concept of Innovation and Innovation Management
The Concept of Innovation and Innovation ManagementNadia Lushchak
 
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...Mohanumar S
 
Triz Basics -Product Design & Development
Triz Basics -Product Design & DevelopmentTriz Basics -Product Design & Development
Triz Basics -Product Design & DevelopmentQRCE
 
international and cross-culture Negotiation
international and cross-culture Negotiationinternational and cross-culture Negotiation
international and cross-culture NegotiationDreams Design
 
Introduction to Triz (TIPS)
Introduction to Triz (TIPS)Introduction to Triz (TIPS)
Introduction to Triz (TIPS)Vishnupriya T H
 
TRIZ overview and examples
TRIZ overview and examplesTRIZ overview and examples
TRIZ overview and examplesYaroslav Baronov
 
Dispute Resolution Methods
Dispute Resolution MethodsDispute Resolution Methods
Dispute Resolution MethodsElijah Ezendu
 
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)MaRS Discovery District
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layerteknetir
 

What's hot (20)

Business law
Business lawBusiness law
Business law
 
Mastering negotiation skills
Mastering negotiation skillsMastering negotiation skills
Mastering negotiation skills
 
The Negotiation Process Four Stages {Lecture Notes}
The Negotiation Process Four Stages {Lecture Notes}The Negotiation Process Four Stages {Lecture Notes}
The Negotiation Process Four Stages {Lecture Notes}
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portability
 
The Concept of Innovation and Innovation Management
The Concept of Innovation and Innovation ManagementThe Concept of Innovation and Innovation Management
The Concept of Innovation and Innovation Management
 
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 2-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
 
Triz Basics -Product Design & Development
Triz Basics -Product Design & DevelopmentTriz Basics -Product Design & Development
Triz Basics -Product Design & Development
 
Mediation and dispute resolution techniques and approaches
Mediation and dispute resolution techniques and approachesMediation and dispute resolution techniques and approaches
Mediation and dispute resolution techniques and approaches
 
international and cross-culture Negotiation
international and cross-culture Negotiationinternational and cross-culture Negotiation
international and cross-culture Negotiation
 
Introduction to Triz (TIPS)
Introduction to Triz (TIPS)Introduction to Triz (TIPS)
Introduction to Triz (TIPS)
 
Mediation
MediationMediation
Mediation
 
TRIZ overview and examples
TRIZ overview and examplesTRIZ overview and examples
TRIZ overview and examples
 
Technology S-curves
Technology S-curvesTechnology S-curves
Technology S-curves
 
Negotiation skills
Negotiation skillsNegotiation skills
Negotiation skills
 
Dispute Resolution Methods
Dispute Resolution MethodsDispute Resolution Methods
Dispute Resolution Methods
 
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)
Negotiation and Conflict Resolution - Entrepreneurship 101 (2013/2014)
 
Negotiation skills
Negotiation skillsNegotiation skills
Negotiation skills
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
Decision theory
Decision theoryDecision theory
Decision theory
 
Group decision making
Group decision makingGroup decision making
Group decision making
 

Viewers also liked

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Logs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMAAnton Chuvakin
 

Viewers also liked (20)

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Justice2020
Justice2020Justice2020
Justice2020
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Court automation
Court automationCourt automation
Court automation
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Logs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMA
 
Court Case Management System
Court Case Management SystemCourt Case Management System
Court Case Management System
 
E courts project
E courts projectE courts project
E courts project
 

Similar to Logs & The Law: What is Admissible in Court?

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Productbdirking
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorAnton Chuvakin
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Osler, Hoskin & Harcourt LLP
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual UsesLog Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual UsesAnton Chuvakin
 

Similar to Logs & The Law: What is Admissible in Court? (20)

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Logs = Accountability
Logs = AccountabilityLogs = Accountability
Logs = Accountability
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Paul Johnson
Paul JohnsonPaul Johnson
Paul Johnson
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual UsesLog Management For e-Discovery, Database Monitoring and Other Unusual Uses
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Logs & The Law: What is Admissible in Court?

  • 1. Logs & The Law What is Admissible in Court? Dominique Levin, VP Product Management Logs & The Law: What’s Admissible in Court? MGT-4, June 12, 2006
  • 2.
  • 3. Primary Sources Of Data in the Enterprise 10/09/200317:42:57,146.127.94.13,48352,146.127.97.14,909,,,accept,tcp,,,,909,146.127.93.29,,0,,4,3,,' 9Oct2003 17:42:57,accept,labcpngfp3,inbound,eth2c0,0,VPN-1 & FireWall-1,product=VPN-1 & FireWall-1[db_tag={0DE0E532-EEA0-11D7-BDFC-927F5D1DECEC};mgmt= labcpngfp3;date=1064415722;policy_name= Standard],labdragon,48352,146.127.97.14,909, tcp,146.127.93.145,',eth2c0,inbound Oct 9 16:29:49 [146.127.94.4] Oct 09 2003 16:44:50: %PIX-6-302013: Built outbound TCP connection 2245701 for outside:146.127.98.67/1487 (146.127.98.67/1487) to inside:146.127.94.13/42562 (146.127.93.145/42562) 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 SENSORDATAID="138715" SENSORNAME="146.127.94.23:network_sensor_1" ALERTID="QPQVIOAJKBNC6OONK6FTNLLESZ" LOCALTIMEZONEOFFSET="14400" ALERTNAME="pcAnywhere_Probe“ ALERTDATETIME="2003-10-20 19:35:21.0" SRCADDRESSNAME="146.127.94.10" SOURCEPORT="42444" INTRUDERPORT="42444" DESTADDRESSNAME="146.127.94.13" VICTIMPORT="5631" ALERTCOUNT="1" ALERTPRIORITY="3" PRODUCTID="3" PROTOCOLID="6" REASON="RSTsent" 2003-10-20|15:25:52|dragonapp-nids|TCP-SCAN|146.127.94.10|146.127.94.13|0|0|X|------S-|0|total=484,min=1,max=1024,up=246,down=237,flags=------S-,Oct20-15:25:34,Oct20-15:25:52| Oct 20 15:35:08 labsnort snort: [1:1421:2] SNMP AgentX/tcp request [Classification: Attempted Information Leak] [Priority: 2]: {TCP} 146.127.94.10:43355 -> 146.127.94.13:705 Systems Structured Unstructured
  • 4.
  • 5. Logs are a Fingerprint User and System Activity Privileges Assigned/Changed Customer Transaction Email BCC Failed Logon Security Breach File Up/Download Credit Card Data Access Information Leak
  • 6.
  • 7.
  • 8. Preparedness is the Best Defense “ Unfortunately, that [no log data being available] happens more often than I would like… If your home had been robbed, you would have to tell the police office what was stolen and how the burglar got in. The same is also true for the network. If you simply tell us you have been broken into, and have no evidence to support it, we may be empathetic, but we can’t open a case.” Shelagh Sayers, special agent, FBI, San Francisco
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Clear Benefits “ With forensically sounds logs, companies can reduce the potential of loosing a lawsuit, diminish the costs associated with discovery and defense, increase the likelihood of forcing an opponent into settlement, and be a resource to define against actions related to corporate governance.” Erin Kenneally FSA Times The Institute of Internal Auditors
  • 20. Reducing Costs of Compliance Guillermo Kopp Vice President Cross-Industry Compliance Costs (USD in Billions) 40% 60% 84% 16% 85% 15% TACTICAL APPROACH REGULATORY ONSLAUGHT AUTOMATION Source: TowerGroup
  • 21. Log Management & Intelligence Real-Time Analysis Historical Archives Complete Aggregation Automation Of Collection Processes & Controls
  • 22. High-Performance Architecture for Global 2000 Best Practices Reports and Alerts Business Policies and IT Controls Definition IT Controls - Policy Statements Import Compliance Reports and Alerts Export 100% Message Collection. 100% Pure Storage. Behavioral Alerts. Compliance Reports. Real-time Search. Only the CEO should access this data What should be happening? Who is actually accessing this data? What is happening? Backup Software SAN/NAS Storage Enterprise Apps Mail Servers Proxy Servers Win/Linux Servers Network Devices Security Devices CEO COO CSO CIO HR Customer Legal BOD Operations Network Security Datacenter Audit
  • 23. Architecting to meet Legal Obligations Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs NTP Server Microsecond accuracy: for example 30.123456 seconds
  • 24. Securing Log Data Transport Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs Encryption, Authentication, TCP, Compression. Buffer in case of WAN Failure.
  • 25. Avoid Collusion with Distributed Log Storage Disaster Recovery Site Main Data Center Existing Networked Storage Remote Office Remote Office Remote Office ST 2000 Raw Logs raw logs Off-site storage in 2 places: requires multi-party conspiracy to alter logs. LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
  • 26. Perform Analysis on a Copy of the Log Data Disaster Recovery Site Management Station SOAP Request XML Responses Main Data Center Existing Networked Storage raw logs ST 2000 Raw Logs Remote Office Remote Office Remote Office Raw Logs Log Analysis LX 2000 Meta Logs LX 500 metalogs LX 1000 metalogs LX 2000 metalogs
  • 27. Make Archives Tamper Proof with Hashing Each 1 minute file has it’s own hash file.
  • 28. No Human Intervention: Auto-Retention Settings Logs get deleted by software automatically, not by users.
  • 29.
  • 30.
  • 31. Thank You! Join us for a demo! http://www.loglogic.com/resources/screencasts/ loglogic.com blog.loglogic.com Automating Compliance. Mitigating Risk.

Editor's Notes

  1. 08/19/09
  2. 08/19/09
  3. 08/19/09
  4. 08/19/09
  5. 08/19/09
  6. 08/19/09
  7. 08/19/09
  8. 08/19/09
  9. 08/19/09
  10. 08/19/09
  11. 08/19/09
  12. 08/19/09
  13. 08/19/09
  14. 08/19/09
  15. 08/19/09
  16. 08/19/09
  17. 08/19/09
  18. 08/19/09
  19. 08/19/09
  20. 08/19/09