Trove Online Generator <- Open

Overview

Join us for the next installment of the SANS-APAC webcast series where we will provide a technical look at Mobile Device Forensics.

If you’re only doing a logical analysis then you have to consider that you are in all probability really only getting part of the evidence that may in fact exist. Simply put, a thorough analysis requires a physical extraction and its more complete examination.

As an example, in a physical acquisition and analysis of an iPhone the additional evidence recovered

22,000+ images
59 videos
1000+ audio files
16,000+ locations
60+ chats (included Facebook and Skype)
30+ MMS
3300+ text files

Performing anything less than a physical acquisition and analysis is simply not a thorough forensic examination!

Speaker Bio

Paul A. Henry

Paul Henry is a Senior Instructor with the SANS Institute and one of the world’s foremost global information security and computer forensic experts with more than 20 years’ experience managing security initiatives for Global 2000 enterprises and government organizations worldwide.

Paul is a principal at vNet Security, LLC and is keeping a finger on the pulse of network security as the security and forensic analyst at Lumension Security.

Throughout his career, Paul has played a key strategic role in launching new network security initiatives to meet our ever-changing threat landscape. Paul also advises and consults on some of the world’s most challenging and high-risk information security projects, including the National Banking System in Saudi Arabia, the Reserve Bank of Australia, the Department of Defense’s Satellite Data Project (USA), and both government as well as telecommunications projects throughout Southeast Asia.

Paul is frequently cited by major and trade print publications as an expert in computer forensics, technical security topics, and general security trends and serves as an expert commentator for network broadcast outlets, such as FOX, NBC, CNN, and CNBC. In addition, Paul regularly authors thought leadership articles on technical security issues, and his expertise and insight help shape the editorial direction of key security publications, such as the Information Security Management Handbook, where he is a consistent contributor. Paul serves as a featured and keynote speaker at seminars and conferences worldwide, delivering presentations on diverse topics including anti-forensics, network access control, cyber crime, DDoS attack risk mitigation, firewall architectures, security architectures, and managed security services.

Trove Online Generator <- Open