Resource Center

Webinars

Fraud, IP Theft, and an Intrusion: A Case Study with Gillware Digital Forensics

When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same question: What did they take, and how did they get in?

In order to answer these questions, examiners must correlate a lot of different data. From the primary source files of interest, to system and network logs, to supporting artifacts that indicate user and file activity, there is a lot of data to go through and having a sound process and reliable tools can help answer these questions.

In this webinar, Nathan Little, Gillware Digital Forensics and Jamie McQuaid, Magnet Forensics will use a real case to demonstrate how Magnet AXIOM can be used to help identify the source of an intrusion and what sensitive data was taken by the attackers.

To access the recorded webinar, complete the form below.

View the Webinar

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top