News & Analysis as of

Cyberforensics

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

HaystackID

[Webcast Transcript] From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators

HaystackID on

Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more

HaystackID

From Evidence to Misinformation: Courts Brace for Deepfake Challenges

HaystackID on

As deepfake technology becomes increasingly sophisticated and accessible, courts are now facing unprecedented challenges in distinguishing authentic evidence from AI-generated fabrications. This issue, particularly critical...more

Troutman Pepper

Does Every Incident Require a Forensic Report? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Troutman Pepper

Should Companies Conduct Their Own Forensic Investigations? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Locke Lord LLP

Following the Trail of Lost or Destroyed ESI with Forensic Imaging

Locke Lord LLP on

When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more

Maynard Nexsen

Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton

Maynard Nexsen on

This week, hosts Tina and Cherie are joined by Clark Walton, a Digital Forensics Expert, Attorney, and Legal Forensics Instructor for Reliance Forensics. They have an insightful discussion on digital forensics and what...more

EDRM - Electronic Discovery Reference Model

[Webinar] Tracking User Behavior using the Windows Registry - February 29th, 1:00 pm - 2:00 pm ET

The Windows Registry has been around forever and is sometimes looked at as a HIVE of random chaos. However, even after all these years there is a lot of great information that can be pulled from the registry. This...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Constangy, Brooks, Smith & Prophete, LLP

Stupid plaintiff tricks: Faking emails to win

People, it doesn't work. There was a court decision last week from my home state of North Carolina that left me shaking my head. A social worker sued her ex-employer, a non-profit, claiming (among other things) that she...more

Ankura

Combatting Financial Crime in the Metaverse

Ankura on

...The internet-enabled virtual world of the metaverse is capturing the imagination of so many people that by the end of the decade five billion could be using it, according to a forecast by Citi. The metaverse is also...more

Troutman Pepper

Forensic Artifacts Play Legal Role in Cyber Incident Response

Troutman Pepper on

When a business experiences a data security incident, there is invariably one principal question that the affected business wants answered: Who do we tell? Originally published in Law360 on December 2, 2022....more

Troutman Pepper

The Do's and Dont's of Cybersecurity Forensic Investigations

Troutman Pepper on

According to the Verizon Wireless 2022 Data Breach Investigations Report, there are four prominent paths that threat actors use to gain unauthorized access into an organization’s network... Originally published in Law360 on...more

Troutman Pepper

Can Cyber Investigations Be Canned? - Unauthorized Access Podcast

Troutman Pepper on

Can cyber investigations be canned? Find out what Sadia, Kamran, and this month’s guest, Shawn Tuma of Spencer Fane, have to say. The gloves come off as these three breach coaches duke it out for the final word on this topic....more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Public Relations...

Jenner & Block on

In our last newsletter, we analyzed the reluctance of courts to apply privilege to the work of forensic computer consultants following data breaches. Here, we address often unavailing efforts to fit communications with...more

Association of Certified E-Discovery...

[Webinar] Falsified Documents: Finding the Facts Behind Fraudulent Files With Digital Forensics - October 20th, 11:00 am - 12:00...

Falsified documents have been used to support (or defend against) legal claims for hundreds of years. While analysis may once have focussed areas such as handwriting, the composition of ink or the alignment of typewriter...more

Association of Certified E-Discovery...

[Webinar] Forensic Collections for eDiscovery Activities - October 13th, 1:00 pm - 2:00 pm EDT

With more employees working remotely, it's more important than ever to ensure you can preserve and collect data in a variety of ways from a variety of sources. Depending on the use case - internal investigation, government or...more

Ballard Spahr LLP

Another Federal Court Orders Production of Data Breach Forensic Report

Ballard Spahr LLP on

Following in the footsteps of the Eastern District of Virginia’s Capital One decision last year and the District of D.C.’s Clark Hill decision earlier this year, the Eastern District of Pennsylvania has just ordered the...more

HaystackID

[Webcast Transcript] Operationalizing Data Mapping: From Practices and Protocols to Proven Processes

HaystackID on

Editor’s Note: On June 23, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how to consider and operationalize data mapping processes utilized in the...more

Burr & Forman

Your Business Experienced a Ransomware Attack, and It Was Not Prepared – Now What?

Burr & Forman on

It is hard to find a news post without a story on a ransomware attack. The National Security Council has issued an open letter warning all businesses to be alert and prepared for ransomware attacks.  Various industry groups...more

Lowndes

Data Breach! Miranda Himself May Be Dead, But the Wisdom of the Case that Bears His Name Lives On

Lowndes on

Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more

HaystackID

[Webcast Transcript] From the Enterprise to Individuals: Are You Mitigating Departing Employee Risk?

HaystackID on

On December 3, 2020, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on considerations and approaches that can help organizations proactively and reactively...more

Nutter McClennen & Fish LLP

Step Carefully: Protecting Data Breach Expert Reports from Discovery

In order to provide legal advice to clients in the aftermath of a hacking, lawyers must rely on digital forensics investigators to understand the nature and scope of the breach. Corporations also use this type of information...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

53 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide