Digital Forensics Services
|
|
|
- John Watts
- 10 years ago
- Views:
Transcription
1 Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk
2 Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together Data Collection, Evidence Handling, Processing, Analysis, Reporting and Testimony to corporate, legal and government organisations. We have extensive experience in collecting and analysing material from a broad range of electronic data sources utilised by our clients including desktop PCs, laptop computers, servers, backup tapes, mobile devices and telephony systems. Our team contains a breadth of Forensic Computing experience, including former Law Enforcement and computer analysts. All of our computer forensic analysts have been trained in the use of recognised Evidential Continuity Procedures and Forensic Computing tools. Capability KPMG Forensic Technology professionals provide a wide range of IT forensic services. We use advanced digital evidence recovery techniques to support our investigations in a way that does not compromise the integrity of the evidence. We can investigate breaches of information security policy, IT asset misuse or hacking activities and are experienced at capturing and analysing data from a wide range of electronic devices, media and sources including desktop and laptop computers, servers, backup tapes, mobile devices and telephony systems. Once the data has been collected, we use our suite of market leading processing and review tools to process, search and analyse that data further. Available solutions include: Voice technology we are experienced at collecting, phonetically key-word searching and reviewing voice data. Instant Messaging/Bloomberg/Reuters chat data we use specialised parsers to facilitate the searching and review of chat data. Digital Evidence Recovery and Early Case Assessment tools these can be used to extract and process large volumes of electronic data and search that data for key words, date ranges, conversation threads, and potentially suspicious patterns. We offer a wide range of specialist tools including Encase, Forensic Technology Toolkit (FTK), Trident Wave, Index Engines, Nuix and many others. Investigative tools we use I2 Analyst Notebook, Tableau and NetMap to perform visual analysis and the charting of data. These tools are also extensively used by law enforcement, intelligence agencies and regulators. Innovative use of these tools can substantially increase the speed and effectiveness of investigations. Internet Search capabilities and social network analysis utilising the Envisional technology suite. Review Platforms we offer a number of platforms which facilitate the review of data, including Clearwell and Relativity. These tools facilitate predictive coding and enable users to identify key themes, concepts and patterns and thereby review the most relevant data earlier. 1
3 Our experts have given evidence in the UK Crown Court, UK High Court and US Federal Court in both criminal and civil proceedings and for both Prosecution and Defence. They have appeared as forensic experts on Civil search orders, provided witness statements and affidavits in support of civil applications and attended pre-trial mediation meetings. As a team we have attended court to give oral testimony directly relating to computer forensic matters on more than ten previous occasions, and continue to do so currently providing expert testimony in both UK Crown Court and in a European court as part of ongoing engagements. The team also attend court to provide testimony regularly in support of wider investigations including acting as Expert Witnesses. In addition to oral testimony we have provided expert reports and witness statements for court in civil litigation and criminal matters on a number of other occasions where we were not called to give evidence due to the clarity and uncontested nature of our findings. Court experiences 2
4 REACTIVE E-DISCOVERY KPMG s Forensic Technology team can help you respond to information requests rapidly, cost effectively and securely. We provide access to a wide range of market-leading technology applications and through the experience, skill and technical capability of our people can help you to reduce disclosure costs, enhance case strategy and manage risk. How we can help turn risk to advantage We offer e-discovery services across the entire spectrum of the EDRM (Electronic Discovery Reference Model) above and provide a dedicated project manager to guide you through each project s data collection, processing and review phases. Our First Response Team secures and collects data anytime, anywhere. We work with you to ensure that all potentially relevant data is preserved in order to minimise the risk of later challenge. We provide practical and pragmatic solutions to reduce the data set to a more manageable size. We process and cull data (including key word search) in many formats and from many sources, including voice, instant messages, cloud and social networking sites. We will advise you on the technology best suited to the needs of your case, including data sampling options, early case assessment tools, and suitable review platforms. We can host the collected data for review at either our secure data centre or on a mobile solution at your offices. We can help you reduce cost by: providing technology-enabled solutions that are tailored to your needs and which enable you to focus on the most relevant material quickly and efficiently. What sets us apart? Our people have significant experience in providing e- Discovery services to a varied client base including insurer clients, financial services client s and other corporations. We are technology Independent, we offer flexible technology solutions to meet specific client needs. We regularly test the latest developments to ensure that we offer leading technology solutions. Our Forensic Technology teams have certified technology specialists who know how to get the best out of the technology to meet the demands of each matter and are able to suggest innovative solutions to ensure that your matter is conducted as efficiently as possible. PROACTIVE E-DISCOVERY Information governance is the key to minimising risks and reducing costs in advance of an e-discovery matter. Our Litigation Readiness assessments involve reviewing the current state of Information Governance for our clients (including Records Retention) and discovery response practices and setting agreed targets based on efficiency and defensibility. We achieve this by identifying the gaps in the current state against the targets and then we support you in implementing our recommendations. When undertaking litigation readiness assessments we utilise our global methodology for discovery readiness. In addition, we also include a review of any existing technology solutions that you may have. Potential benefits to you We can help you reduce risk by: guiding you on best practice. providing forensically sound data handling. 3
5 CONTACT US KPMG G-Cloud Services Team T +44 (0) E [email protected] The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International.
KPMG Forensic Technology Services
KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production
e-discovery Forensic Services kpmg.ch Advisory
e-discovery Advisory Forensic Services kpmg.ch e-discovery You or your client are involved in a dispute, investigation, regulatory or internal review. You need to review evidence and may need to disclose
Best Practices in Electronic Record Retention
I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.
Electronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics [email protected] 410-659-3473 Table of Contents Page 1 Electronic
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
Corporations Take Control of E-Discovery
Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
Understanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
Acknowledgments Introduction: Welcome to the Labyrinth. CHAPTER 1 Gathering the Evidence 1. CHAPTER 2 Third-Party Experts 25
Acknowledgments Introduction: Welcome to the Labyrinth xi xiii CHAPTER 1 Gathering the Evidence 1 Form 1.1: General Preliminary Electronic Evidence Questions for Your Client 3 Form 1.2: Checklist to Define
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Symantec Enterprise Vault E-Discovery Connectors
Symantec Enterprise Vault E-Discovery Connectors Extending chain of custody beyond Enterprise Vault Discovery Accelerator Overview Symantec Enterprise Vault Discovery Accelerator extends the basic search
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
From Chaos to Clarity.
LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners
DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
Deloitte Discovery Caribbean & Bermuda Territory Guide
Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Overview The complexity and volume of data in today s corporate climate means businesses in the Caribbean & Bermuda Countries (
Symantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
Forensic Services. kpmg.hu
Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
The Portcullis Guide to Disclosing Electronically Stored Information (ESI)
The Portcullis Guide to Disclosing Electronically Stored Information (ESI) Portcullis Computer Security Limited www.portcullis-security.com http://labs.portcullis.co.uk/ Tel: +44 (0)20 8868 0098 Email:
1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6
Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...
E- Discovery in Criminal Law
E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically
For Your ediscovery... Software
For Your ediscovery... Software is not enough Leading Provider of Investigatory and Litigation Support Services for Corporations, Governmental Agencies and Am Law Firms Worldwide. Our People Make the
Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
What You Should Know About ediscovery
KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix
Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Ady Cassidy Systems Consultant Nuix Ady is a computer forensic investigator and ediscovery consultant with more than 10 years experience as a Computer
How To Become A Forensic Technician
PERSON SPECIFICATION Area: EMSOU Job Title: Digital Forensic Technician Weekly Hours: Section: CCU Scale: SO2 Version: V1 Post No: HP083 Status: Substantive Version Date: 37 January 2014 Please describe,
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
HOBS OVERVIEW INTRODUCTION
OVERVIEW 2 HOBS OVERVIEW INTRODUCTION Hobs Legal Docs Limited www.hobslegaldocs.com - is a company within the Group of Hobs Reprographics plc - www.hobsrepro.com The Hobs Group of companies, was founded
Digital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
The Clearwell ediscovery Platform
The Clearwell ediscovery Platform Delivering Intelligent ediscovery Clearwell has been instrumental in helping us manage our in-house ediscovery practice, saving NBC Universal valuable resources in people
Intelligent Information Management: Archive & ediscovery
Intelligent Information Management: Archive & ediscovery Byron Chang Senior Systems Engineer / Symantec Hong Kong Agenda 1 Today s Information Management Challenges 2 Why Information Management? 3 The
In-House Solutions to the E-Discovery Conundrum
125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION
Central and Eastern European Data Theft Survey 2012
FORENSIC Central and Eastern European Data Theft Survey 2012 kpmg.com/cee KPMG in Central and Eastern Europe Ever had the feeling that your competitors seem to be in the know about your strategic plans
Veritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition
GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...
KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014
KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition
EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.
TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
Director of Computer Forensic Services
www.orionforensics.com Call us:02-714-3801-3 Director of Computer Forensic Services I am a self-motivated person, with the ability to work unsupervised or as part of a team. As a Director and well-trained
DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Investigation. Investigations
Investigation The Forensic Services team of PricewaterhouseCoopers has the knowledge and experience necessary to conduct comprehensive fraud investigations. Our team in Poland has jointly performed in
Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator
Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator Enforceable Email Retention Accelerated Electronic Discovery Aligns Legal, IT, and Business
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER
Elements of a Good Document Retention Policy Discovery Services WHITE PAPER Document retention especially the retention of electronic data has become a hot topic in the legal industry. In the wake of several
Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY
2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014
CLIENT MEMORANDUM Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014 August 28, 2014 Mandatory application of e-discovery Mandatory application of e-discovery to
Streamlining the ediscovery
Streamlining the ediscovery Response Process Dean Gonsowski, Esq. Sr. ediscovery Counsel Streamlining the FOIA Process 1 Today s Speaker Dean Gonsowski, Esq. Sr. ediscovery Counsel Mr. Gonsowski is the
Solving Key Management Problems in Lotus Notes/Domino Environments
Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
Controls over CIS. Ryan O Halloran, Senior Manager KPMG Hobart. TAO Client Information Session. May 2015
Controls over CIS Ryan O Halloran, Senior Manager KPMG Hobart TAO Client Information Session May 2015 Agenda The KPMG presenters information: Ryan O Halloran Advisory Senior Manager, Hobart Tel: (03) 6230
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
Clearwell Legal ediscovery Solution
SOLUTION BRIEF: CLEARWELL LEGAL ediscovery SOLUTION Solution Brief Clearwell Legal ediscovery Solution The Challenge: Months Delay in Ascertaining Case Facts and Determining Case Strategy, High Cost of
ediscovery: The New Information Management Battleground Developments in the Law and Best Practices
Sponsored by ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Kahn Consulting Inc. (847) 266-0722 [email protected] Introduction The following
AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products
AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The
Electronic documents questionnaire
Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes
