DIGITAL FORENSICS TIMELINES
Temporal data is located everywhere on a computer system. File system modified/access/creation/change times, log files, network data, registry data, and Internet history files all contain time data that can be correlated into critical analysis to successfully solve cases. Pioneered by Rob Lee in 2001, timeline analysis has become a critical incident response and forensics technique to solve complex cases. New timeline analysis frameworks provide the means to conduct simultaneous examinations of a multitude of time-based artifacts
DIGITAL FORENSICS INVESTIGATIONS
SANS Institute
• GIAC Certified Forensic Analyst (GCFA #10209) expires 2/2018
State of Virginia Department of Justice Services
• Licensed Private Investigator (License # RE-011240)
ISC2: Certified Information System Security Professional (CISSP) since 2003
ISACA: Certified Information Security Manager (CISM) since 2004
Department of Defense: Basic Digital Forensic Examiner (DFE) 2006
Basic Cyber Crime Investigator (CCI) 2006
The Hidden Agenda Cables
Build An Insider Threat Program
The chart below depicts a possible design of an insider threat program for a moderate sized entity.