News & Analysis as of

Cyberforensics

Baker Donelson

Cybersecurity Awareness Month 2025: How to Preserve Privilege in Cyber Investigations

Baker Donelson on

In the aftermath of a cyberattack, forensic investigations are often launched under intense pressure to identify what went wrong, why, and how to fix it. A common practice following such an investigation is the preparation of...more

Epiq

Vanishing Evidence: The Challenges of Ephemeral Messaging in Digital Forensics

Epiq on

Key Takeaway: Ephemeral messaging creates compliance and legal risks by auto-deleting business communications, complicating digital forensics. Automated archiving solutions help organizations proactively capture and preserve...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 216 | Justin Tolman of Exterro sits down with Mary Mack and Holley Robinson

Justin Tolman, forensic evangelist for EDRM's longstanding Trusted Partner Exterro, sits down with EDRM's Mary Mack and Holley Robinson. In this episode, Justin shares his journey from traditional IT work to serving in a...more

Purpose Legal

Crushing the Marathon (Without Running in it): A Lesson in Digital Evidence Verification

Purpose Legal on

I was recently in Chicago for Relativity Fest 2025 and completed a sunrise run around Navy Pier during the week. Let me be clear, I did NOT stay in town to participate in the 47th running of the Chicago Marathon. I did,...more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

J.S. Held

Integrating AI in eDiscovery and Digital Forensics for Corporate Investigations

J.S. Held on

When most people think of Artificial Intelligence (AI), they often envision Generative AI (Gen-AI) tools that create content (such as images, videos, or text) or imagine futuristic scenarios involving intelligent robots or...more

Ankura

White Collar Crime in the Digital Age: Emerging Trends and Investigation Techniques

Ankura on

White Collar Crime in the Digital Age: Emerging Trends and Investigation Techniques - The digital revolution has transformed white-collar crime into a sophisticated enterprise, leveraging technology to execute complex...more

Association of Certified E-Discovery...

[Webinar] Legal Data Intelligence - Mitigating and Managing Data Breach Incidents - July 21st, 9:00 pm - 10:00 pm PDT

The world of data and tech are advancing at lightning speed. Associated with this, governments and regulators are imposing more robust frameworks and legislative requirements to help safeguard organisations and the data they...more

HaystackID

[Webinar] Faster Finds, Fewer Files: A Smarter Approach to Email Investigations - May 21st, 11:00 am CDT

HaystackID on

Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more

StoneTurn

Legal Investigations: Digging Deeper into White-Collar Crime and Financial Crime

StoneTurn on

White-collar and financial crimes have risen sharply, with the U.S. DOJ reporting a 300% increase in monetary recoveries in 2024. Successful investigations now require a proactive and adaptable approach to detect and prevent...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

HaystackID

[Webcast Transcript] From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators

HaystackID on

Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more

HaystackID

From Evidence to Misinformation: Courts Brace for Deepfake Challenges

HaystackID on

As deepfake technology becomes increasingly sophisticated and accessible, courts are now facing unprecedented challenges in distinguishing authentic evidence from AI-generated fabrications. This issue, particularly critical...more

Troutman Pepper Locke

Does Every Incident Require a Forensic Report? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Troutman Pepper Locke

Should Companies Conduct Their Own Forensic Investigations? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Troutman Pepper Locke

Following the Trail of Lost or Destroyed ESI with Forensic Imaging

Troutman Pepper Locke on

When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more

Maynard Nexsen

Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton

Maynard Nexsen on

This week, hosts Tina and Cherie are joined by Clark Walton, a Digital Forensics Expert, Attorney, and Legal Forensics Instructor for Reliance Forensics. They have an insightful discussion on digital forensics and what...more

EDRM - Electronic Discovery Reference Model

[Webinar] Tracking User Behavior using the Windows Registry - February 29th, 1:00 pm - 2:00 pm ET

The Windows Registry has been around forever and is sometimes looked at as a HIVE of random chaos. However, even after all these years there is a lot of great information that can be pulled from the registry. This...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Constangy, Brooks, Smith & Prophete, LLP

Stupid plaintiff tricks: Faking emails to win

People, it doesn't work. There was a court decision last week from my home state of North Carolina that left me shaking my head. A social worker sued her ex-employer, a non-profit, claiming (among other things) that she...more

Ankura

Combatting Financial Crime in the Metaverse

Ankura on

...The internet-enabled virtual world of the metaverse is capturing the imagination of so many people that by the end of the decade five billion could be using it, according to a forecast by Citi. The metaverse is also...more

Troutman Pepper Locke

Forensic Artifacts Play Legal Role in Cyber Incident Response

Troutman Pepper Locke on

When a business experiences a data security incident, there is invariably one principal question that the affected business wants answered: Who do we tell? Originally published in Law360 on December 2, 2022....more

Troutman Pepper Locke

The Do's and Dont's of Cybersecurity Forensic Investigations

Troutman Pepper Locke on

According to the Verizon Wireless 2022 Data Breach Investigations Report, there are four prominent paths that threat actors use to gain unauthorized access into an organization’s network... Originally published in Law360 on...more

Troutman Pepper Locke

Can Cyber Investigations Be Canned? - Unauthorized Access Podcast

Troutman Pepper Locke on

Can cyber investigations be canned? Find out what Sadia, Kamran, and this month’s guest, Shawn Tuma of Spencer Fane, have to say. The gloves come off as these three breach coaches duke it out for the final word on this topic....more

64 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide