Connecting Artifacts and Users to Prove Intellectual Property Theft
What happens when two employees, accused of exfiltrating sensitive data, deny their intentions? How do you connect the dots to prove your case?
Join Jessica Hyde, Director of Forensics at Magnet Forensics, to learn what intentional intellectual property theft might look like and how to link common evidentiary artifacts with the users who created them. Replicating the data’s journey to see who interacted with what, which activities can be attributed to whom, and most of all, what kind of intent that journey indicates.