SlideShare a Scribd company logo
JOHN MICHAEL DULEY
Education
Masterof Education in Technology
Strayer University
Graduate Certificate inComputer Forensics
University of Central Florida
National Institute of Justice and National Center for Forensic Science
Bachelor of Science Degree in Computer Networking
Strayer University
Associate Degree in Business Administration
Sullivan University
Certifications
EnCE EnCase Certified Forensic Analysts
GCFA-GIAC Certified Forensic Analyst
MCSE-Microsoft Certified Systems Engineer
MCDBA-Microsoft Certified Database Administrator
CIW-Certified Instructor/Master Server Administrator
Network+ and A+ Certified
Security Clearance-Level ADP 2 (Public Trust)
eDiscovery/ForensicExperience:
Michael Duley is experienced in managing multiple Terabyte eDiscovery cases with Top 100
Corporations and AmLaw 100 legal firms. He has created and implemented large data
management environments for acquisition, analysis, review, and storage for eDiscovery and
managed review.
He has setup in-house collection and eDiscovery systems and written policies and procedures
for the Legal department and managed the SIRT (Security Incident Response Team) for
Humana. Michael has also been instrumental in developing new technology approaches to
large data management situations along with Kroll Ontrack for healthcare companies. These
processes are being used to create data maps, develop a strategic security approach, make data
available to Legal acquisition and collection of data, and also make data searchable and
discoverable for internal investigations, compliance, and other information governance issues.
Michael is working with Kroll Ontrack on the creation of real-time, proactive analytic
processes that shift from responsive to predictive data management that can utilize cloud-
based opportunities, data indexing and analytics for future use by clients.
Michael has 17+ years of hands on forensic examinations on multiple Operating Systems and
platforms, including UNIX, Linux (RedHat Fedora), Windows legacy systems i.e. 95, 98,
98SE, NT3.5, NT2000, XP, Vista, and Windows 7, 8 & 10. He has been an expert witness for
the prosecution and defense in many multi-jurisdictional cases, which include child
pornography, Internet and email abuse, and intellectual property theft, fraud, and industrial
espionage. Michael has worked with Symantec, EMC, NetApp and other large data sources in
the use of proprietary data collection and acquisition. He has worked with the FBI, Secret
Service, FDLE, local, and state governmental bodies in criminal and civil cases.
Michael has developed and trained the Lexington Police computer crime department in search
and seizure and forensic examinations. Worked on and supervised over 400 investigations in
the last 4 years. Michael has worked in areas of eDiscovery, search and seizure, memory
capture and analysis, cryptography, handwriting analysis, firearm/Tool mark identification and
analysis, evidence handling and Federal Rules of Civil Procedure.
Chief Forensic Consultant/ManagerSecurity Incident Response Team–
HEALTHCARE SECTOR (Humana-Top 100 Company)
Security and forensic professional with experience in the creation, development, and
implementation of digital forensic capabilities for Fortune 100 Healthcare/Insurance
company with over 30,000 associates. Management of enterprise implementations in
healthcare information, data loss prevention, legal and litigation support, Privacy, and
Security. Expertise in the eDiscovery field, including, investigations, forensic
acquisitions, collection, processing, analyzing, and document review. Developed in-
house eDiscovery web-based forms and procedures for legal holds, loose document
requests, email, and archive restores.
 Put in place an EDRM process internally for attorney review, processing, and
hosting.
 Developed procedures for investigating and mitigating Privacy, and Associate
Relations cases.
 Created new forensic lab and evidence room with software, hardware,
network forensic equipment, and state of the art mobile and memory
capabilities
 Developed a data recovery capability from failed hard drives using Atola,
replacement platter/casing procedures and other software applications.
 Email investigations with Postini, Barracudas, Lotus notes and Legato
applications
 Created Procedures and Processes for handling evidence and legal eDiscovery
investigations, using RFID inventory system
 Developed and implemented EnCase Enterprise rollout for forensic
investigations and eDiscovery
 Developed new memory forensic capabilities and Live network incident
response with SANS SIFT toolset.
 Zscaler and Netspective webfilters, Vontu, Barracuda, Digital Guardian,
CellDek, and RSA logging tools.
 Imaging with UNIX, Masster Solo, ProDiscover, and Linen (EnCase)
applications.
 Internet investigations using Vontu, NetAnalysis, Barracudas, Postini,
Gargoyle, F-Response, Volatility Memory Analysis, Mount Image Pro/Virtual
Forensic Computing, and EnCase.

More Related Content

What's hot

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
mj tanasas
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
Firoze Hussain
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
Damir Delija
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
amiable_indian
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
fernando_bruaj
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
Jennifer Cataluña
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
Jennifer Cataluña
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
richbryansalvo
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Onkar1431
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
Jennifer Cataluña
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
Guevarra Institute of Technology
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
Jennifer Cataluña
 
Jenevie
JenevieJenevie
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
Guevarra Institute of Technology
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
aejay_neri
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
 

What's hot (17)

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Ediscovery 101
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 

Viewers also liked

Media Music Video Conventions
Media Music Video ConventionsMedia Music Video Conventions
Media Music Video Conventions
courtxo
 
Ukraine Global Scholars presentation
Ukraine Global Scholars presentationUkraine Global Scholars presentation
Ukraine Global Scholars presentation
Misha Lemesh
 
UWA_NotSoLonelyGuide_Excerpt__NotForDistribution
UWA_NotSoLonelyGuide_Excerpt__NotForDistributionUWA_NotSoLonelyGuide_Excerpt__NotForDistribution
UWA_NotSoLonelyGuide_Excerpt__NotForDistribution
Antony Gray
 
media theorist conventions
media theorist conventions media theorist conventions
media theorist conventions
courtxo
 
Media new
Media new Media new
Media new
courtxo
 
Ukraine Global Scholars presentation
Ukraine Global Scholars presentationUkraine Global Scholars presentation
Ukraine Global Scholars presentation
Misha Lemesh
 
Basic anatomy
Basic anatomyBasic anatomy
Basic anatomy
university of lahore
 
Bibliography
BibliographyBibliography
Bibliography
122237
 
SC line ingles mini
SC line ingles miniSC line ingles mini
SC line ingles mini
Elizabeth Londono
 
Human development slideshare
Human development slideshareHuman development slideshare
Human development slideshare
oliviabertin
 
Презентация Ukraine Global Scholars
Презентация Ukraine Global Scholars Презентация Ukraine Global Scholars
Презентация Ukraine Global Scholars
Misha Lemesh
 
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
ue_ta
 
Format xls sheets Demo Mode
Format xls sheets Demo ModeFormat xls sheets Demo Mode
Format xls sheets Demo Mode
Jared Bourne
 
GTMF2016 catch up stingray
GTMF2016 catch up stingrayGTMF2016 catch up stingray
GTMF2016 catch up stingray
ue_ta
 
3DCGMeetup08_MayaRigSystem_mGear
3DCGMeetup08_MayaRigSystem_mGear3DCGMeetup08_MayaRigSystem_mGear
3DCGMeetup08_MayaRigSystem_mGear
ue_ta
 
Implementation-Plan_X_Corp
Implementation-Plan_X_CorpImplementation-Plan_X_Corp
Implementation-Plan_X_Corp
Jared Bourne
 

Viewers also liked (16)

Media Music Video Conventions
Media Music Video ConventionsMedia Music Video Conventions
Media Music Video Conventions
 
Ukraine Global Scholars presentation
Ukraine Global Scholars presentationUkraine Global Scholars presentation
Ukraine Global Scholars presentation
 
UWA_NotSoLonelyGuide_Excerpt__NotForDistribution
UWA_NotSoLonelyGuide_Excerpt__NotForDistributionUWA_NotSoLonelyGuide_Excerpt__NotForDistribution
UWA_NotSoLonelyGuide_Excerpt__NotForDistribution
 
media theorist conventions
media theorist conventions media theorist conventions
media theorist conventions
 
Media new
Media new Media new
Media new
 
Ukraine Global Scholars presentation
Ukraine Global Scholars presentationUkraine Global Scholars presentation
Ukraine Global Scholars presentation
 
Basic anatomy
Basic anatomyBasic anatomy
Basic anatomy
 
Bibliography
BibliographyBibliography
Bibliography
 
SC line ingles mini
SC line ingles miniSC line ingles mini
SC line ingles mini
 
Human development slideshare
Human development slideshareHuman development slideshare
Human development slideshare
 
Презентация Ukraine Global Scholars
Презентация Ukraine Global Scholars Презентация Ukraine Global Scholars
Презентация Ukraine Global Scholars
 
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
[Road to Stingray] Stingrayで進めるアニメーションワークフローについて
 
Format xls sheets Demo Mode
Format xls sheets Demo ModeFormat xls sheets Demo Mode
Format xls sheets Demo Mode
 
GTMF2016 catch up stingray
GTMF2016 catch up stingrayGTMF2016 catch up stingray
GTMF2016 catch up stingray
 
3DCGMeetup08_MayaRigSystem_mGear
3DCGMeetup08_MayaRigSystem_mGear3DCGMeetup08_MayaRigSystem_mGear
3DCGMeetup08_MayaRigSystem_mGear
 
Implementation-Plan_X_Corp
Implementation-Plan_X_CorpImplementation-Plan_X_Corp
Implementation-Plan_X_Corp
 

Similar to MikeDuley-Legal-CV

R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
lillian Kobusingye
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
heidirobison
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
Eli Lane
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
shyamv3005
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
amallblitz0
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
mohammadbinshad332
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
trashbin306
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
sharinblitz
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
Firoze Hussain
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Shawn Tuma
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
Lblum1234
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 

Similar to MikeDuley-Legal-CV (20)

R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 

MikeDuley-Legal-CV

  • 1. JOHN MICHAEL DULEY Education Masterof Education in Technology Strayer University Graduate Certificate inComputer Forensics University of Central Florida National Institute of Justice and National Center for Forensic Science Bachelor of Science Degree in Computer Networking Strayer University Associate Degree in Business Administration Sullivan University Certifications EnCE EnCase Certified Forensic Analysts GCFA-GIAC Certified Forensic Analyst MCSE-Microsoft Certified Systems Engineer MCDBA-Microsoft Certified Database Administrator CIW-Certified Instructor/Master Server Administrator Network+ and A+ Certified Security Clearance-Level ADP 2 (Public Trust) eDiscovery/ForensicExperience: Michael Duley is experienced in managing multiple Terabyte eDiscovery cases with Top 100 Corporations and AmLaw 100 legal firms. He has created and implemented large data management environments for acquisition, analysis, review, and storage for eDiscovery and managed review. He has setup in-house collection and eDiscovery systems and written policies and procedures for the Legal department and managed the SIRT (Security Incident Response Team) for
  • 2. Humana. Michael has also been instrumental in developing new technology approaches to large data management situations along with Kroll Ontrack for healthcare companies. These processes are being used to create data maps, develop a strategic security approach, make data available to Legal acquisition and collection of data, and also make data searchable and discoverable for internal investigations, compliance, and other information governance issues. Michael is working with Kroll Ontrack on the creation of real-time, proactive analytic processes that shift from responsive to predictive data management that can utilize cloud- based opportunities, data indexing and analytics for future use by clients. Michael has 17+ years of hands on forensic examinations on multiple Operating Systems and platforms, including UNIX, Linux (RedHat Fedora), Windows legacy systems i.e. 95, 98, 98SE, NT3.5, NT2000, XP, Vista, and Windows 7, 8 & 10. He has been an expert witness for the prosecution and defense in many multi-jurisdictional cases, which include child pornography, Internet and email abuse, and intellectual property theft, fraud, and industrial espionage. Michael has worked with Symantec, EMC, NetApp and other large data sources in the use of proprietary data collection and acquisition. He has worked with the FBI, Secret Service, FDLE, local, and state governmental bodies in criminal and civil cases. Michael has developed and trained the Lexington Police computer crime department in search and seizure and forensic examinations. Worked on and supervised over 400 investigations in the last 4 years. Michael has worked in areas of eDiscovery, search and seizure, memory capture and analysis, cryptography, handwriting analysis, firearm/Tool mark identification and analysis, evidence handling and Federal Rules of Civil Procedure. Chief Forensic Consultant/ManagerSecurity Incident Response Team– HEALTHCARE SECTOR (Humana-Top 100 Company) Security and forensic professional with experience in the creation, development, and implementation of digital forensic capabilities for Fortune 100 Healthcare/Insurance company with over 30,000 associates. Management of enterprise implementations in healthcare information, data loss prevention, legal and litigation support, Privacy, and Security. Expertise in the eDiscovery field, including, investigations, forensic acquisitions, collection, processing, analyzing, and document review. Developed in- house eDiscovery web-based forms and procedures for legal holds, loose document requests, email, and archive restores.  Put in place an EDRM process internally for attorney review, processing, and hosting.  Developed procedures for investigating and mitigating Privacy, and Associate Relations cases.  Created new forensic lab and evidence room with software, hardware, network forensic equipment, and state of the art mobile and memory capabilities  Developed a data recovery capability from failed hard drives using Atola, replacement platter/casing procedures and other software applications.
  • 3.  Email investigations with Postini, Barracudas, Lotus notes and Legato applications  Created Procedures and Processes for handling evidence and legal eDiscovery investigations, using RFID inventory system  Developed and implemented EnCase Enterprise rollout for forensic investigations and eDiscovery  Developed new memory forensic capabilities and Live network incident response with SANS SIFT toolset.  Zscaler and Netspective webfilters, Vontu, Barracuda, Digital Guardian, CellDek, and RSA logging tools.  Imaging with UNIX, Masster Solo, ProDiscover, and Linen (EnCase) applications.  Internet investigations using Vontu, NetAnalysis, Barracudas, Postini, Gargoyle, F-Response, Volatility Memory Analysis, Mount Image Pro/Virtual Forensic Computing, and EnCase.