Most organizations are aware of the risks posed by the various threat actors that are making the headlines, but they don’t know what their attacks look like once it has happened. In this presentation I will cover the following digital forensic elements: 1. The threat landscape 2. Finding Patient Zero 3. The bright light before the “detonation” 4. Indicators of compromise 5. Don’t forget the memory 6. Timeline generation 7. Determining the full scope 8. Remediation Bob Gaines is the Director of cybersecurity for HKA. Bob brings 25 years of experience working in the information technology field, and is a subject matter expert for incident response and digital forensics.
Mr. Robert Gaines