Enviar pesquisa
Carregar
Why Have A Digital Investigative Infrastructure
•
0 gostou
•
396 visualizações
Kevin Wharram
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 20
Baixar agora
Baixar para ler offline
Recomendados
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
Data Loss Prevention
Data Loss Prevention
Reza Kopaee
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
Jack Nichelson
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Network Intelligence India
A6704d01
A6704d01
mudigonda
DLP Executive Overview
DLP Executive Overview
Kim Jensen
Recomendados
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
Data Loss Prevention
Data Loss Prevention
Reza Kopaee
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
Jack Nichelson
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
Network Intelligence India
A6704d01
A6704d01
mudigonda
DLP Executive Overview
DLP Executive Overview
Kim Jensen
Electronic Data Discovery
Electronic Data Discovery
Carahsoft
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
Imperva
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
finance40
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies
Investor Presentation
Investor Presentation
Company Spotlight
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
Investor presentation2013
Investor presentation2013
Company Spotlight
Information Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
Julius Clark, CISSP, CISA
Information Security For Small Business
Information Security For Small Business
Julius Clark, CISSP, CISA
Co3 rsc r5
Co3 rsc r5
Patrick Florer
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Sounil Yu
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
Data security in a big data environment sweden
Data security in a big data environment sweden
IBM Sverige
Mais conteúdo relacionado
Mais procurados
Electronic Data Discovery
Electronic Data Discovery
Carahsoft
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
Imperva
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
finance40
APT & What we can do TODAY
APT & What we can do TODAY
James Ryan, CSyP, EA, PMP
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies
Investor Presentation
Investor Presentation
Company Spotlight
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
Investor presentation2013
Investor presentation2013
Company Spotlight
Information Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
Julius Clark, CISSP, CISA
Information Security For Small Business
Information Security For Small Business
Julius Clark, CISSP, CISA
Co3 rsc r5
Co3 rsc r5
Patrick Florer
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
japijapi
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Sounil Yu
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
Mais procurados
(20)
Electronic Data Discovery
Electronic Data Discovery
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
APT & What we can do TODAY
APT & What we can do TODAY
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Investor Presentation
Investor Presentation
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Investor presentation2013
Investor presentation2013
Information Security for Small Business
Information Security for Small Business
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
Information Security For Small Business
Information Security For Small Business
Co3 rsc r5
Co3 rsc r5
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
Semelhante a Why Have A Digital Investigative Infrastructure
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
Data security in a big data environment sweden
Data security in a big data environment sweden
IBM Sverige
On Demand Cloud Services Coury
On Demand Cloud Services Coury
Arman Sadat Hossain
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
Fernando Mesa
Big data security
Big data security
CloudBees
Shield db data security
Shield db data security
Mousumi Manna
Shield db data security
Shield db data security
Mousumi Manna
Shield db data security
Shield db data security
Tapan Biswas
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
Big data security the perfect storm
Big data security the perfect storm
Ulf Mattsson
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
Bonagiri Rajitha
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
European Data Forum
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
olambel
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
finance40
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
Semelhante a Why Have A Digital Investigative Infrastructure
(20)
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Data security in a big data environment sweden
Data security in a big data environment sweden
On Demand Cloud Services Coury
On Demand Cloud Services Coury
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
Big data security
Big data security
Shield db data security
Shield db data security
Shield db data security
Shield db data security
Shield db data security
Shield db data security
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Big data security the perfect storm
Big data security the perfect storm
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
Último
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
ChristopherTHyatt
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Último
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Why Have A Digital Investigative Infrastructure
1.
“Why have a
Digital Investigative Infrastructure” Kevin Wharram CISSP, CISM, CEH Technical Manager – Guidance Software Inc. – The Maker of EnCase © 2008 Guidance Software, Inc. All Rights Reserved.
2.
P A G
E 1 © 2008 Guidance Software, Inc. All Rights Reserved.
3.
Agenda
P A G E 2 Industry Headlines Cause and Cost of data breaches Identify some methods on how data is taken Identify Challenges in protecting data What to do after you have a had a data breach Case Study EnCase Enterprise © 2008 Guidance Software, Inc. All Rights Reserved.
4.
Industry Headlines
P A G E 3 T.J. Maxx Breach Costs Hit $17 Million BOSTON - Information from at least 45.7 million credit and debit cards was stolen by hackers who accessed TJX’s customer information in a security breach that the discount retailer disclosed more than two months ago. Thieves setup data Old hard drives still full supermarkets of sensitive data Web criminals are stepping back from infecting Hard drives full of confidential data are still computers themselves and creating "one-stop turning up on the second-hand market, shops" which offer gigabytes of data for a fixed researchers have reported. price. Credit card details are cheap, however, the log files of big companies can go for up to $300 © 2008 Guidance Software, Inc. All Rights Reserved. 3
5.
Cause of Data
Breaches P A G E 4 Source : The Ponemon Institute - (PGP Survey) © 2008 Guidance Software, Inc. All Rights Reserved. 4
6.
Cost of Data
Breaches P A G E 5 Key Statistics Data breaches cost US companies an average of $197 for every record lost The size of the losses examined ranged from from $225,000 to almost $35 million Source : The Ponemon Institute © 2008 Guidance Software, Inc. All Rights Reserved. 5
7.
What type of
Data are at Risk? P A G E 6 Intellectual Property Customer Data Design Documents Personal Data Source Code Credit card numbers Trade secrets Customer financial data Corporate Data Government Data Financial data Economic data i.e. Mergers & Acquisition info Dobanda – “what is it worth?” HR data i.e. employee data Intelligence information Marketing and Sales data Law Enforcement Information © 2008 Guidance Software, Inc. All Rights Reserved. 6
8.
What leads to
a Data Breach P A G E 7 Lack of senior management understanding and recognition of a problem Criminal / Malicious Intent Lack of internal processes and controls Weak internal controls (role and access right changes) Vulnerability Management / Patching practices Organisation Culture (they owe me attitude) Incidental opportunities © 2008 Guidance Software, Inc. All Rights Reserved. 7
9.
How is Data
Taken? P A G E 8 Portable storage devices – USB, Cameras, PDA’s etc iPods and MP3 players – “PodSlurping” email – personal webmail i.e. Yahoo, Google, etc Taking out or sending DVD / CD’s Spear Phishing – targeting specific companies for information; then using that information to steal data Exploiting corporate systems, networks and laptops through system and software vulnerabilities Using telephone conference pin numbers © 2008 Guidance Software, Inc. All Rights Reserved. 8
10.
Challenges facing Companies
P A G E 9 Confusing Regulatory environment – EU Data Protection Directive 95/46/EC, Internet Banking Code MCTI, International Banking Regulation, SOX, PCI compliance, etc Ensuring sensitive data is not located in unauthorised areas of the network Not being able to remediate instances of confidential information residing where it shouldn't be Not being able to remediate instances of unauthorised applications, software and files on systems Not having a procedural and technical infrastructure in place to respond to security breaches © 2008 Guidance Software, Inc. All Rights Reserved. 9
11.
P A G
E 10 My Data is gone! – “what do I do?” © 2008 Guidance Software, Inc. All Rights Reserved. 10
12.
Incident Response
P A G E 11 Don’t panic Follow your incident response plan and procedures Investigate completely using a forensically sound investigation platform Disclose information only on a need to know basis Clean up & Remediate © 2008 Guidance Software, Inc. All Rights Reserved. 11
13.
Inadequate Incident Response
P A G E 12 OPERATING SYSTEM You can’t FIX or STOP what you can’t FIND … quickly SK! I SK! RI R HARD DISK & MEMORY © 2008 Guidance Software, Inc. All Rights Reserved.
14.
Case Study Global 100
Technology Firm – EnCase Data Audit & Policy Enforcement P A G E 13 Situation Solution Results Global 100 computer EnCase Data Audit & Targeted audit of over 50 entertainment company Policy Enforcement devices in one day including; suspected IP leakage across implemented in 24 hours laptops, desktops, servers, the network at a central site email accounts, USB’s and internet histories Need to search global EnCase identified the Zero disruption to the network spanning 91 suspect had access to business countries numerous other workstations & servers Entire investigation took 2 Goal was to identify across the network weeks from start to finish source, all instances of with significant cost savings leaked IP, identify the trail Audit performed vs. outsource options to external sites, preserve overnight on all endpoints, EnCase Data Audit deployed evidence, and remediate including a 4 terabyte as part of a standard IP & server, to find files HR audit process company- Process required significant stealth so as to wide not alert employees “The non-disruptive element of EnCase minimized the financial, commercial and operational impact of the leaked IP and accelerated the successful resolution of this incident.” CEO & President - European Operations, Global 100 Technology Firm © 2008 Guidance Software, Inc. All Rights Reserved.
15.
EnCase Enterprise
P A G E 14 EnCase Enterprise is a powerful, network-enabled, multi-platform enterprise investigation solution. EnCase enables immediate response to computer- related incidents of any kind and enables thorough forensics platform and framework allowing organisations to immediately respond to enterprise information incidents and threats. © 2008 Guidance Software, Inc. All Rights Reserved. 14
16.
Benefits of EnCase
Enterprise P A G E 15 Contain and reduce corporate fraud Conduct network-enabled forensic investigations for anything, anywhere, anytime Perform a complete compromise assessments after a security intrusion Reduce business disruption and losses due to security breaches Respond to more security incidents with less manpower Conduct network-enabled HR investigations © 2008 Guidance Software, Inc. All Rights Reserved.
17.
The “Data Iceberg”
P A G E 16 Data found by common tools (such as Windows Explorer) Additional data uncovered by EnCase Enterprise Purposely deleted files Renamed to disguise content Concealed files Misplaced / Difficult to locate files 16 © 2008 Guidance Software, Inc. All Rights Reserved.
18.
Examples of where
EnCase helps P A G E 17 Threat / challenge Examples Leavers Possible unfair dismissal claims Corporate espionage – taking out confidential data Employee Integrity Harassing co workers Pornography - (Civil Action can be brought upon by an employee for being affected by porn HR Policy Breaches E-mail misconduct Internet misconduct PC / Desktop misuse (Personal Software) Audits Software audits SOX audits Regulatory Compliance EU Data Directive 95 / 46 Fraud Investigating various forms of fraud IP Theft Investigating IP theft within your organisation Legal Cases Helping legal with various request for legal cases Malware & Rootkits Investigating and finding various forms of Malware and Rootkits Unauthorised software Finding and detected unauthorised software i.e. MP3, Video etc Investigating Incidents Helping the security team to investigate incidents © 2008 Guidance Software, Inc. All Rights Reserved.
19.
EnCase Customers
P A G E 18 © 2008 Guidance Software, Inc. All Rights Reserved.
20.
Multumesc! kevin.wharram@guidancesoftware.com
© 2008 Guidance Software, Inc. All Rights Reserved.
Baixar agora