Content Industry: Service Providers
Hang on! That’s not SQLite! Chrome, Electron and LevelDB
SQLite has become a ubiquitous data storage format for digital forensic practitioners to consider. First popularised by smartphone platforms it now forms part of almost every investigation in one form or another. SQLite’s ubiquity was built upon the growing market share of the platforms that used it extensively so it’s interesting to ask the question: … Continued
Understanding Ransomware: How to Build Up Your Defenses Using Law and Technology
This talk will provide an in-depth review of the U.S. Department of the Treasury’s Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments, issued on October 1, 2020. The Advisory highlights “the sanctions risks associated with ransomware payments related to malicious cyber-enabled activities.” During this talk, Daniel Garrie will review the numerous OFAC-designated cyber actors … Continued
CMD42 Lock: Bypassing Embedded System Security for Forensic Data Acquisition
Security of digital data is of paramount importance to individual security and national security. The ability to access protected or deleted data from embedded systems memory puts the security of sensitive data at risk. This talk will demonstrate the bleeding-edge of what is possible in overcoming embedded hardware security in the most common forms of … Continued
(Air)dropping by Unannounced: Analyzing remote Mac access with AXIOM Cyber
In response to a global pandemic, we saw a global workforce decentralize and work from home. It’s clear now that work from home is here to stay in some form, even if it’s a hybrid office/work from home format. While that’s convenient to the employee, it does raise legitimate issues when it comes to security, … Continued
The Internet of Things (IoT) is now ubiquitous, but the analysis of data is not… Yet.
Join us for a discussion on the potential relevance of IoT data to different corporate or civil case scenarios, and the potential need for obtaining discovery from, for example, internet-connected cameras; home automation systems; smart speakers, TVs, and refrigerators, and wearables. In the industrial realm we will discuss the challenge of IoT data generated in … Continued
The Cybersecurity Challenges Plaguing Healthcare
The healthcare industry specifically has faced its fair share of challenges lately, and that also unfortunately extends into cybersecurity incidents. Threats are posed both externally from bad actors and internally from employees inadvertently introducing risk by falling victim to a phishing attack. Investigating these events with speed and insight requires a team approach. Join Gene Polk, Director of Digital Forensics and eDiscovery, from Banner Health as he describes how his team uses Portable Case to collaborate cross-functionally with key stakeholders such as HR, Privacy & Compliance, Incident Response, and Legal.
Fast and Efficient Collections and Analysis in AWS
Learn how to collect and analyze Windows instances in AWS at neck-breaking speeds. AWS offers a way to build an AXIOM Cyber Windows investigation server with your choice of processors, memory and storage in a matter of minutes that you only pay for while you are using. Build a Windows instance for every one of … Continued
Cache Up Ep.37 Jay Sasportas
Get More Insight with New and Updated Artifacts in Magnet AXIOM and AXIOM Cyber 4.10
With AXIOM and AXIOM Cyber 4.10, we’re helping you do more in your investigations with a number of new and updated artifacts!