Computer Forensics Pervades All Industries

Tuesday, October 05, 2010

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

Computer Forensics strategies is widely prevalent across multiple industries today. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics activities on their jobs.

It is utilized in prosecutors' offices, law firms, consulting firms, police departments, law enforcement organizations, Immigration and Naturalization Services, the FBI, the Drug Enforcement Administration, and the U.S. Customs Service, and more.

The reality today is that every computer is a potential crime scene and must be treated as such. When companies need to conduct internal investigations, especially those involving litigation, discovering and maintaining evidence becomes paramount.

The Computer Forensics Show, November 1-2, 2010 at the Fort Mason Center in San Francisco, is a strategically important for all IT Security, Legal, Accounting, Risk Management, Executive and Law Enforcement professionals.

As a media partner, Infosec Island is pleased to help promote this conference.

For individuals and companies currently not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your bottom line.

For IT professionals already familiar with computer forensics, The Computer Forensics Show assembles the leading minds and operational experts in the industry who will inform you about industry developments, technology advances and trends.

In my recent conversation with the show's event coordinator, Frank Manley provided some insight into the event's origins and evolution:

I would say that when we looked around before we started The Computer Forensics Show, we saw that the field in general was exploding and that the technology and what was possible had many different applications.

There have been some conferences that simply offer training for those already involved in Forensics, but our goal and mission is to bring some of that knowledge and expertise to the greater IT world and to also show how computer forensics will be an issue that almost everyone in IT Security will need to be concerned with going forward.

I think there can be greater synergy in the IT community by taking aspects from what the Computer Forensics Professionals are doing and applying that to each organizations over-all IT Security plan. So while some of our show does provide seminars and training for those already in forensics, it also can give IT professionals an idea of what is going on.

One of the conference's featured presenters is Matthijs van der Wel, MBA CISSP CISA RON QSA, and Manager of Investigative Response for Verizon Business Security Solutions.

Matt provides some insight into how computer forensics is instrumental to security efforts in the adaptation of cloud-based services:

Cloud services means the user knows nothing about the underlying platform and structure, where we as forensic investigators want to know everything. When a security incident occurs, forensic investigators need to be able to investigate the incident successfully.

But if users of cloud computing do not properly prepare themselves, investigating a security incident may not be possible or seriously hindered. Best to be aware of potential pitfalls before the incident occurs, than to be faced with them in a crisis situation.

Participants will learn what the potential difficulties may occur while conducting a forensic IT investigation that includes cloud-based services or data stored in the cloud. Participants will also learn what to do now and what to ask your provider in advance to allow for a successful investigation in the future when they move to the cloud.

There Are Six Main Tracks in the Conference:

  • Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.
  • Legal (A) - EDD, including Litigation and Best Practice Issues.
  • Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.
  • IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.
  • IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.
  • Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.

Presentation Descriptions and Presenters Biographies:

Register today to attend The Computer Forensics Show, and keep coming back to Infosec Island for the latest in security news, vulnerability alerts, and commentary from industry experts.

Possibly Related Articles:
6413
Infosec Island
Forensics Infosec Island
Post Rating I Like this!
244450a5d4391583f3af2e4b23e44a09
Christine Stagnetto-Sarmiento Well, after make a depth audit, those traces are evidence, and the criminals must go to jail. We have laws for that.
1287523431
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.