Digital Forensics in your Incident Response Plan

By clicking "Register", you acknowledge that you have read BNP Media’s Privacy Policy, agree to its terms, and consent to allow BNP Media to use your information consistent with the Privacy Policy. You agree your information submitted will be shared with the sponsor(s) of the webinar. To read our Privacy Policy, please click here
Live webinar airing on November 20, 2024 at 2:00 PM EST
Sponsored by Exterro
Presented by Justin Tolman

Learning Objectives:

  1. Learn how digital forensics fits into an incident response plan using NIST and CISA playbooks.
  2. Understand the latest trends in cybersecurity threats and how forensics can help identify them.
  3. Discover practical ways to use forensics to enhance security, ensure compliance, and minimize financial losses from breaches.
  4. Gain skills in integrating digital forensics tools and techniques with incident response workflows.

Credits:

IACET
0.1 IACET CEU*
 
1
As an IACET Accredited Provider, BNP Media offers IACET CEUs for its learning events that comply with the ANSI/IACET Continuing Education and Training Standard.
Training may qualify for related continuing education for recertification activity through NICET. Students may claim one (1) Continuing Professional Development (CPD) point per hour of instruction towards their NICET recertification requirement for any sessions that expand their knowledge of the subject matter pertaining to the certifications they hold.
Participants completing this course may be eligible to receive Continuing Professional Education credit or CPEs toward ASIS re-certification.

In today's rapidly evolving cyber threat landscape, organizations are facing increasingly sophisticated attacks that can jeopardize data integrity and disrupt operations. So, how can security leaders stay ahead of these threats and respond effectively when the worst happens? This insightful webinar will dive into the critical role of digital forensics in building a robust incident response plan. Using best-practice frameworks from NIST and CISA. We will also explore how forensic techniques are essential for not only identifying the root cause of security incidents but also for strengthening an organization's overall cybersecurity posture. Whether you're looking to refine your incident response strategy or safeguard your organization from future threats, this session will equip you with the knowledge and tools you need to respond faster, smarter, and more effectively.

Cover

Photo courtesy of Getty Images


Speaker

Justin Tolman has been working in digital forensics for 12 years. He has a bachelor’s degree in Computer Information Technology from BYU-Idaho and a master’s degree in Cyber Forensics from Purdue University. After graduating he worked as a Computer Forensic Specialist with the Ohio Bureau of Criminal Investigation. He joined AccessData in 2015 as a senior instructor where he trained digital forensic professionals worldwide in forensic tools, concepts, and workflows. He was later promoted to Director of Training over North America. Justin has written training manuals on computer and mobile device forensics, as well as (his personal favorite) SQLite database analysis. Justin currently works as the Forensic Subject Matter Expert and Evangelist at Exterro following the purchase of AccessData by Exterro. He is frequently presenting at conferences, on webinars, and hosts a podcast and produces YouTube content related to digital forensics and Forensic Toolkit. 

 

Exterro Founded in 2008 based on the belief that e-discovery is a business process like any other, subject to measurement, management, and optimization, Exterro has grown organically and through acquisitions into the industry leader providing legal technology’s only comprehensive Legal GRC software platform. Today, our passionate, talented, and experienced leadership team leads our efforts to deliver industry-defining software and world-class service to our partners and clients. Gain control over organizational data and minimize the risks posed by litigation, privacy regulations, and cybersecurity threats with Exterro’s unified e-discovery, privacy compliance, and digital forensics software. Get a comprehensive view of exactly what happened and who was involved. With our award-winning, court-cited digital forensics expertise, Exterro gives you the industry’s best tools to help you analyze computers, mobile devices and network communications. When you know more, you can do more. No matter the type of forensic investigation, there’s an FTK Solution designed specifically for your investigative workflow – all with the industry’s fastest processing engine for repeatable, defensible, forensically-sound collection and analysis.

 

Originally published in November 2024

Notice