DIGITAL FORENSICS (DFOR)

DIGITAL FORENSICS TIMELINES

Temporal data is located everywhere on a computer system. File system modified/access/creation/change times, log files, network data, registry data, and Internet history files all contain time data that can be correlated into critical analysis to successfully solve cases. Pioneered by Rob Lee in 2001, timeline analysis has become a critical incident response and forensics technique to solve complex cases. New timeline analysis frameworks provide the means to conduct simultaneous examinations of a multitude of time-based artifacts

DIGITAL FORENSICS INVESTIGATIONS

SANS Institute
• GIAC Certified Forensic Analyst (GCFA #10209) expires 2/2018
State of Virginia Department of Justice Services
• Licensed Private Investigator (License # RE-011240)
ISC2: Certified Information System Security Professional (CISSP) since 2003
ISACA: Certified Information Security Manager (CISM) since 2004
Department of Defense: Basic Digital Forensic Examiner (DFE) 2006
Basic Cyber Crime Investigator (CCI) 2006

The Hidden Agenda Cables

Build An Insider Threat Program

    The chart below depicts a possible design of an insider threat program for a moderate sized entity.

Intel on Insiders

Apply for a DFOR Consultation

Need Timeline Analysis?

Apply for an Assessment or a Consultation and receive a copy of MIIRA, the Malicious Insider Iterative Risk Assessment framework, from the creators of the National Insider Threat Task Force.

 

 

Availability is limited