SlideShare a Scribd company logo
TRENDS IN THE INDUSTRY
Digital Forensics
Kristin E. Williams
TOP 3 TRENDS
1. Multiple Device Forensics
2. Job Specialization
3. Continuing Education
MULTIPLE DEVICE FORENSICS
http://callisto.ggsrv.com/imgsrv/FastFetch/UBER1/ZI-6GGG-2013-APR00-IDSI-50-1
JOB SPECIALIZATION
• Identity Theft
• Internet Fraud
• Financial Crime
• Money Laundering & gambling
• Hacking & Network Intrusion
• Theft of Intellectual Property & Piracy
• Robbery
• Child Pornography
• Homicide, Harassment & Stalking
• Terrorism
Čisar, P., & Maravić Čisar,
S. (2012)
CONTINUING EDUCATION
• Formal Education
• Certification & Training
• Academic Conferences
• Journals, Studies & Case law
• Professional Associations
STAYING RELEVANT
• Be Proactive, not
Reactive
• Never stop learning
• Find your passion and be
an expert
• Network
REFERENCES
(2014). CORRECTION - Cellebrite: Cellebrite Research Reveals Top Trends Shaping Mobile Forensics: Multi-Device, Field Analysis, Social Evidence, Big
Data and Malware. PR Newswire. Retrieved on August 5, 2015, from
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgbe&AN=edsgcl.360112176&site=eds-live&scope=site
Berryhill, J. (2005). Finding a qualified computer forensic analyst. Law Enforcement Technology, (5). 122. Retrieved on August 5, 2015, from
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=edsgbe&AN=edsgcl.132870094&site=eds-live&scope=site
Čisar, P., & Maravić Čisar, S. (2012). GENERAL DIRECTIONS OF DEVELOPMENT IN DIGITAL FORENSICS. Acta Technica Corvininesis - Bulletin Of
Engineering, 5(2), 87-91. Retrieved on August 5, 2015, from
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=74126125&site=eds-live&scope=site
Damshenas, M., Dehghantanha, A., & Mahmoud, R. (2014). A survey on digital forensics trends. International Journal Of Cyber-Security And Digital
Forensics, (4), 209. Retrieved on August 5, 2015, from
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgic&AN=edsgcl.387349458&site=eds-live&scope=site
Kanable, R. (2005). Modern forensic science today and tomorrow: an interview with Dr. Henry Lee. Law Enforcement Technology, (7). 8. Retrieved on August 5,
2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgbe&AN=edsgcl.134816754&site=eds-
live&scope=site
Reese, S. (2009). Gazing into the Future. Techniques: Connecting Education And Careers, 84(5), 14-19. Retrieved on August 5, 2015, from
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ840444&site=eds-live&scope=site

More Related Content

What's hot

Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
ferguspitt
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
Rownel Cerezo Gagani
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
GranthamEdu
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
Nickardo Salmon
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
Murray Security Services
 

What's hot (6)

Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 

Viewers also liked

Announcements 7 31-2016
Announcements 7 31-2016Announcements 7 31-2016
Announcements 7 31-2016
scarter392
 
Role Of Swiss Bank In World War II
Role Of Swiss Bank In World War IIRole Of Swiss Bank In World War II
Role Of Swiss Bank In World War II
Gagan Kumar
 
We work
We workWe work
We work
3196748
 
Christmas time in Madrid
Christmas time in MadridChristmas time in Madrid
Christmas time in Madrid
AIL Madrid Spanish Language Academy
 
1
11
PREMIUM PROTECTION
PREMIUM PROTECTIONPREMIUM PROTECTION
PREMIUM PROTECTION
Jaremy Savage
 
Swiss Banks & German Customers
Swiss Banks & German CustomersSwiss Banks & German Customers
Swiss Banks & German Customers
Andrew Leighton Chamberlain
 
Visa
VisaVisa
Visa
3196748
 
Sports Bars in Madrid
Sports Bars in MadridSports Bars in Madrid
Діяльність учнівського самоврядування
Діяльність учнівського самоврядуванняДіяльність учнівського самоврядування
Діяльність учнівського самоврядування
Adriana Himinets
 
Stay in shape in Madrid!
Stay in shape in Madrid!Stay in shape in Madrid!
Stay in shape in Madrid!
AIL Madrid Spanish Language Academy
 
Досвід роботи кл.кер. Пуги Х.Я.
Досвід роботи кл.кер. Пуги Х.Я.Досвід роботи кл.кер. Пуги Х.Я.
Досвід роботи кл.кер. Пуги Х.Я.
Adriana Himinets
 

Viewers also liked (12)

Announcements 7 31-2016
Announcements 7 31-2016Announcements 7 31-2016
Announcements 7 31-2016
 
Role Of Swiss Bank In World War II
Role Of Swiss Bank In World War IIRole Of Swiss Bank In World War II
Role Of Swiss Bank In World War II
 
We work
We workWe work
We work
 
Christmas time in Madrid
Christmas time in MadridChristmas time in Madrid
Christmas time in Madrid
 
1
11
1
 
PREMIUM PROTECTION
PREMIUM PROTECTIONPREMIUM PROTECTION
PREMIUM PROTECTION
 
Swiss Banks & German Customers
Swiss Banks & German CustomersSwiss Banks & German Customers
Swiss Banks & German Customers
 
Visa
VisaVisa
Visa
 
Sports Bars in Madrid
Sports Bars in MadridSports Bars in Madrid
Sports Bars in Madrid
 
Діяльність учнівського самоврядування
Діяльність учнівського самоврядуванняДіяльність учнівського самоврядування
Діяльність учнівського самоврядування
 
Stay in shape in Madrid!
Stay in shape in Madrid!Stay in shape in Madrid!
Stay in shape in Madrid!
 
Досвід роботи кл.кер. Пуги Х.Я.
Досвід роботи кл.кер. Пуги Х.Я.Досвід роботи кл.кер. Пуги Х.Я.
Досвід роботи кл.кер. Пуги Х.Я.
 

Similar to TrendsintheIndustry (1)

Wandschneider ischool symposium
Wandschneider ischool symposiumWandschneider ischool symposium
Wandschneider ischool symposium
Stephen Abram
 
UW Cybersecurity Lecture 9 - Social Media
UW Cybersecurity Lecture 9 - Social MediaUW Cybersecurity Lecture 9 - Social Media
UW Cybersecurity Lecture 9 - Social Media
Dr Stylianos Mystakidis
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
CREST
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
Jason Hong
 
Physical Security for Data Centers OWASP July 16, 2015
Physical Security for Data Centers OWASP July 16, 2015Physical Security for Data Centers OWASP July 16, 2015
Physical Security for Data Centers OWASP July 16, 2015
Michael Marotta
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
Tyrone Grandison
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
Nancy J. Brandwein
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
AugmentedWorldExpo
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
MajedahAlkharji
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdf
libowskymcinnisell69
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
metanautix
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
SamanthaAdlerMcGuire
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
NANDI AYANA
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
SensePost
 
Asdourian, Jon
Asdourian, Jon Asdourian, Jon
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
John Blue
 
Ethical risks in online social work: e-Professionalism and the implications f...
Ethical risks in online social work: e-Professionalism and the implications f...Ethical risks in online social work: e-Professionalism and the implications f...
Ethical risks in online social work: e-Professionalism and the implications f...
husITa
 

Similar to TrendsintheIndustry (1) (20)

Wandschneider ischool symposium
Wandschneider ischool symposiumWandschneider ischool symposium
Wandschneider ischool symposium
 
UW Cybersecurity Lecture 9 - Social Media
UW Cybersecurity Lecture 9 - Social MediaUW Cybersecurity Lecture 9 - Social Media
UW Cybersecurity Lecture 9 - Social Media
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Physical Security for Data Centers OWASP July 16, 2015
Physical Security for Data Centers OWASP July 16, 2015Physical Security for Data Centers OWASP July 16, 2015
Physical Security for Data Centers OWASP July 16, 2015
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdf
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Asdourian, Jon
Asdourian, Jon Asdourian, Jon
Asdourian, Jon
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
 
Ethical risks in online social work: e-Professionalism and the implications f...
Ethical risks in online social work: e-Professionalism and the implications f...Ethical risks in online social work: e-Professionalism and the implications f...
Ethical risks in online social work: e-Professionalism and the implications f...
 

TrendsintheIndustry (1)

  • 1. TRENDS IN THE INDUSTRY Digital Forensics Kristin E. Williams
  • 2. TOP 3 TRENDS 1. Multiple Device Forensics 2. Job Specialization 3. Continuing Education
  • 4. JOB SPECIALIZATION • Identity Theft • Internet Fraud • Financial Crime • Money Laundering & gambling • Hacking & Network Intrusion • Theft of Intellectual Property & Piracy • Robbery • Child Pornography • Homicide, Harassment & Stalking • Terrorism Čisar, P., & Maravić Čisar, S. (2012)
  • 5. CONTINUING EDUCATION • Formal Education • Certification & Training • Academic Conferences • Journals, Studies & Case law • Professional Associations
  • 6. STAYING RELEVANT • Be Proactive, not Reactive • Never stop learning • Find your passion and be an expert • Network
  • 7. REFERENCES (2014). CORRECTION - Cellebrite: Cellebrite Research Reveals Top Trends Shaping Mobile Forensics: Multi-Device, Field Analysis, Social Evidence, Big Data and Malware. PR Newswire. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgbe&AN=edsgcl.360112176&site=eds-live&scope=site Berryhill, J. (2005). Finding a qualified computer forensic analyst. Law Enforcement Technology, (5). 122. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=edsgbe&AN=edsgcl.132870094&site=eds-live&scope=site Čisar, P., & Maravić Čisar, S. (2012). GENERAL DIRECTIONS OF DEVELOPMENT IN DIGITAL FORENSICS. Acta Technica Corvininesis - Bulletin Of Engineering, 5(2), 87-91. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=74126125&site=eds-live&scope=site Damshenas, M., Dehghantanha, A., & Mahmoud, R. (2014). A survey on digital forensics trends. International Journal Of Cyber-Security And Digital Forensics, (4), 209. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgic&AN=edsgcl.387349458&site=eds-live&scope=site Kanable, R. (2005). Modern forensic science today and tomorrow: an interview with Dr. Henry Lee. Law Enforcement Technology, (7). 8. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgbe&AN=edsgcl.134816754&site=eds- live&scope=site Reese, S. (2009). Gazing into the Future. Techniques: Connecting Education And Careers, 84(5), 14-19. Retrieved on August 5, 2015, from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ840444&site=eds-live&scope=site