Few incident responders dispute the importance of memory analysis in incident response. Not only is memory acquisition faster than acquiring the hard drives of multiple (even hundreds of) computers; it’s often the only source of evidence in an ongoing attack. Frequently, memory contains valuable traces of system activity even when the attacker takes steps to hide what they’re doing. This webinar will delve into the processes and user sessions that produce data across multiple users and one malicious file. With an emphasis on system activity, you’ll learn about memory artifacts including running processes, registry hives and keys, and other data that can help you determine what’s happening—and how to stop it. Join Jessica Hyde and Aaron Sparling to learn more about memory analysis and how it could help you in your investigations.
If you are interested, Part 2 of this webinar “Memory Analysis for Investigations of Fraud and Other Wrongdoing” can be found here.
To register for this webinar, please fill out the form below.
Please ensure you select the correct time slot.