e-discovery Forensics Incident Response



Similar documents
Hands-On How-To Computer Forensics Training

Security Forensics Training

InfoSec Academy Forensics Track

How To Get A Computer Hacking Program

Information Security Services

CYBER SECURITY TRAINING SAFE AND SECURE

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Case Study: Hiring a licensed Security Provider

Information Systems Security Certificate Program

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

ACE Advantage PRIVACY & NETWORK SECURITY

plantemoran.com What School Personnel Administrators Need to know

Managing IT Security with Penetration Testing

Newcastle University Information Security Procedures Version 3

Standard: Information Security Incident Management

Ten Deadly Sins of Computer Forensics

Computer Forensics US-CERT

Business & Finance Information Security Incident Response Policy

Information Technology Policy

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Certified Digital Forensics Examiner

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Preemptive security solutions for healthcare

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

CyberSecurity Solutions. Delivering

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Penetration Testing Service. By Comsec Information Security Consulting

Solutions and IT services for Oil-Gas & Energy markets

Music Recording Studio Security Program Security Assessment Version 1.1

The E-Discovery Process

Certified Digital Forensics Examiner

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Certified Digital Forensics Examiner

HIPAA Security Alert

Certified Cyber Security Analyst VS-1160

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

White Paper. Information Security -- Network Assessment

How To Secure Your Information Systems

Bellevue University Cybersecurity Programs & Courses

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Cybersecurity: Protecting Your Business. March 11, 2015

Data Security Incident Response Plan. [Insert Organization Name]

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

CERTIFIED DIGITAL FORENSICS EXAMINER

Payment Card Industry Data Security Standard

Network & Information Security Policy

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Modalities for Forensic Review of Computer Related Frauds

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

10 Steps to Establishing an Effective Retention Policy

Injazat s Managed Services Portfolio

How To Manage Security On A Networked Computer System

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Overview of Computer Forensics

INCIDENT RESPONSE CHECKLIST

Five keys to a more secure data environment

Cisco Advanced Services for Network Security

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Security Controls What Works. Southside Virginia Community College: Security Awareness

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

Report on CAP Cybersecurity November 5, 2015

Information Technologies and Fraud

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Course Title: Penetration Testing: Network & Perimeter Testing

Network Usage Guidelines Contents

Information Security Policy

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

Information Security Incident Management Guidelines

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Transcription:

e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email: forensics@netsecurity.com Copyright 2008 NetSecurity Corporation. All rights reserved.

The Landscape IAPZCV7cIfwgXcqK6rj8FM6PmLNqq3ghDgOuCsM/Ac hz8+t+8dintellectualqpropertyqtheft2w5lxgz EEBECABQFAj+g/kP75nxEEBECABQFAj+g/kP75nxVs 4gtSystemqIntrusionE2iofhiLz9E1xTHVQxBB0Gk nrc1ng0rwcg/+qodhk/u2lpolicyjviolationofdc S7esD/R7QtqgZGvT5RQzEISEGr3dN4o7tvaWuF1XQ0 PX0aIllicitqPornographyVfX8/QCfQTB80eT0/QC fqtb80et0vb1rnyp77/mdok/76yo5ag0ep6cf77/md ok/76y57encrypted/deleted/hiddenqfilesdorr XF/QPhhDG0Eql35yj+4VnVnsHiRXF/QPhhDtSj8Uaf nfdenial2ofcserviceqattackv177/mdok/76yo5a 77OsCLFK/MDok/76YO5AHHVaJO1+PkRx/QCfQwgOsC LFKp8KXipdAMaliciousTSoftwareTOutbreakh6bp fvtghhd0kacdt4wdmspuit40fine2akhi72jcsuafn 7GCyberqExtortionMtvzXdswdAgZCfQTB80CfQTB8 02dU7/MDok/76Y7r/MD7Evidence+TamperingQCfQ TB80eT0VB1RNYP77/MDok/76YO5Ag0EVlf3HDCfQTB 80VEmailqSpoofingqAttacksiudE/F/Ha8g8VHMGH OfMlm/xX49Vl5u/2RUafn/QQTB80eT0VB1RNYP77/M Do7DigitalqCrime6YO5AasNetworkZHackingrw88 v0j93vyaxra3xnno5lkp7we5j280gtj3kkqc2aznso A1FHJConfidentialqInformationqLeakXa2NUu/I t1tqhsiyeumrhnsnn65aumpnrbvovj8hv8nqvsue17 Uafn/QCY35mVyComputerqMisusefQTB80eT0VB1RN YP77/MDok/76YOsCLFKOsCLFKOsO5AbmZvQG5ldRXF Digital information continues to grow at an exponential rate. Data is no longer stored solely in computer hard drives, backup tapes, or compact discs (CDs). With the growth of emerging portable data and storage devices, such as portable digital assistants (PDAs), cell phones, and Blackberry devices, crucial information can be anywhere and easily passed from device-todevice. Information stored in these changing media can be crucial sources of evidence in corporate, civil, and criminal investigations. Digital forensics is the process of acquiring, preserving, analyzing, and producing digital evidence. Forensics is required to determine if evidence exists, such as in incidents involving: intellectual property theft, network hacking, evidence tampering, employee misuse of computer, illicit pornography, policy violation, electronic harassment, and other digital crimes.

The Forensic Challenge Forensic investigation is a time-consuming effort that requires specialized expertise, procedures, tools, and lab environment. Proper investigation and evidence collection focused on forensically sound processes, is an absolute necessity. This ensures that the forensic process can withstand the scrutiny of an opposing legal counsel. It is essential to use experienced personnel when investigating a potential cyber crime. Inexperienced personnel may not know where or how to gather or preserve valuable evidence and may damage or erase critical data. This potential loss or tampering of evidence can result in an unfavorable ruling by a judge or the evidence may not be admissible in the case. Rest Assured. NetSecurity Corporation helps you reach your digital forensics goals, promptly and cost-effectively.

Corporate Overview NetSecurity is a digital forensics, security consulting and training company. We work with you to understand the unique goals and requirements of your business. Then we provide tailored, high quality, customer-focused, and cost-effective solutions. Our hands-on security solutions protect you against emerging security threats and help you manage your enterprise security risk proactively NetSecurity Forensic Labs delivers solutions that help you acquire, preserve, analyze, and produce digital evidence promptly Our proprietary Hands-On How-To training program provides you with the knowledge of real-world security issues through simulation and "how-to" exercises that enable you to do your job successfully NetSecurity s Benefits Selected Clients Public and private sector organizations continue to rely on NetSecurity to help them overcome their security and investigation challenges. A select list of customers includes: Public Sector Clients The Pentagon U.S. Navy U.S. Marine Corps Internal Revenue Service (IRS) Department of Veterans Affairs Department of Commerce Department of Homeland Security Private Sector Clients MAXIMUS Community Medical Health System Whonome Limited One of the largest hospitality chains Publicly-traded financial institutions Leading academic and training institutions Federal Integrators NetSecurity brings unparalleled expertise to guide you through the investigation of computer crimes and in delivering impeccable results in security engagements. Our security experts have worked in various establishments, including: The Pentagon, Navy, Marine Corps, IRS, DHS, VA, other Federal agencies, and publicly-traded companies. Our clients continue to rely on us because: We have a breadth of experience in computer security, privacy, and audit of a variety of information technology environments. Our forensic experts have worked in highly classified projects within DoD and other U.S. Federal agencies. We ensure and preserve the confidentiality of your case, investigation, and engagement. Our rapid response capability ensures you get the right information, timely, efficiently, and cost-effectively. We deliver unmatched customer service and quality results. NetSecurity Forensic Labs is equipped with state-of-the-art tools and technologies to excavate data from the latest storage devices and produce admissible results. We teach the latest forensics tools and techniques of the trade, using real-world scenarios. Our professionals have years of experience and have certifications in: CISSP, ISSAP, ISSMP, CISM, CISA, CHFI, etc. We avoid conflict of interest and are vendor neutral in the choice of our forensics and security tools.

NetSecurity s Expertise Digital forensics expertise requires more than an indepth familiarity with the latest tools and technologies of the trade. Forensics requires deep experience with computer architecture, operations, operating systems internals, network operations, and storage systems and components. Further, experience in computer security and hackers techniques provide a solid foundation. NetSecurity s engineers, researchers, analysts, and forensic experts have proven skills in auditing, privacy, risk management, security assessment, penetration testing, computer security, systems administration, database systems, email administration, wireless networks, and complex network design and operation. We leverage our deep knowledge in these areas ensuring that no stone is left unturned during each forensic investigation. Our forensics and discovery methods make certain that collected evidence can stand the rigors of legal scrutiny. Ethical hacking Intrusion Detection Systems (IDS) Centralized log infrastructure Routers, firewalls, Unix, Windows, Macintosh, etc. Portable storage devices Live forensic data collection Internal Audit Information Privacy Risk Assessment Computer Security System/Network Administration and Operation Wireless networks

NetSecurity s Forensic Solutions NetSecurity Forensic Labs is a state-of-the-art, secure forensics facility equipped with leadingedge tools and technologies of the trade. NetSecurity Forensic Labs provides cost-effective solutions in electronic discovery (e-discovery), incident response, digital forensics, and training. e-discovery Through NetSecurity s e-discovery solutions, we help you search, locate, and secure electronic information for use as evidence in civil or criminal litigation. We work with you to identify, collect, preserve, recover, and produce electronic data to ensure that you comply with e-discovery requests promptly. Our vendor-neutrality ensures that the most cost-effective e-discovery strategy is executed. We gather electronic data from storage devices that serve as evidence from all file types, including: text, emails, chat, images, calendar files, databases, spreadsheets, audio files, servers, and computer applications. Incident Response Many companies have crisis management plans to cover natural disasters or unexpected employee concerns. However, it is also important to be prepared to handle information security incidents before any occur. A well-executed response can reveal the true extent of a compromise and prevent future occurrences. Our analysts have created methodologies to evaluate, mitigate, escalate, and contain incidents. We assist you in the creation, implementation, and rollout of your incident response capability. NetSecurity also helps you create policies and processes to ensure that security incidents are resolved effectively in the least amount of time. In addition, NetSecurity has well equipped and experienced incident responders with years of experience in information security intrusion detection. We help investigate systems, networks, operating systems, database systems, and other infrastructure components. NetSecurity is extremely nimble, which ensures that we respond to any security incident quickly. We take the additional step of securing the compromised system, forensically preserving the data, and analyzing the evidence to determine the perpetrator.

Digital Forensics NetSecurity Forensic Labs works with you to investigate computer systems and determine whether they have been used for criminal or unauthorized civil activities. We conduct forensic recovery and analysis on desktops, servers, systems, network devices, and removable media in a wide variety of formats. Using our techniques, we recover deleted/hidden/encrypted files, construct system usage activity, and determine whether an intruder has compromised a computer. Further, we help determine the data that the attacker modified, accessed, copied, or deleted. Our forensics investigations are focused on obtaining and reconstructing activities from data in various storage media: Evidence/data acquisition, preservation, recovery, analysis, and reporting Intellectual property theft Computer misuse Corporate policy violation Mobile device (PDA, cell phone) data acquisition and analysis Malicious software/application System intrusion and compromise Encrypted, deleted, and hidden files recovery Illicit pornography Confidential information leakage Computer networks Email systems Database management systems Handheld devices (PDA, Blackberry, cell phones, etc.) Backup tapes, and other internal/external storage media Hands-On How To Forensic Training NetSecurity provides Hands-On How-To training in digital forensics. Our real-world simulated scenarios demonstrate "how-to" conduct forensic investigations, including: Forensic investigations on hard drives and other storage devices Forensics on network systems and devices Forensics on live systems with volatile data Operating system forensics (PC, MAC, Unix) Forensics on mobile phones, Blackberry, and PDA devices Developing Computer Security Incident Response Team (CSIRT) Responding to computer incidents

NetSecurity s Approach Proper forensics investigation and data collection focused on sound processes and techniques ensure that evidence produced is admissible in a court action or corporate investigation. NetSecurity s forensic experts follow techniques that withstand the scrutiny of litigation. Our professionals have deep experience in ethical hacking, securing complex systems and networks, auditing information systems, and responding to security incidents. We have experience in investigating real network attacks and employee misuse of information resources. NetSecurity helps you answer the questions of who, what, when, where, why, and how about computer-related incidents. Further, we peer-review our work and reports to ensure clarity and ease of understanding by a non-technical audience. Also, we use more than one forensic tool to verify our work, ensuring that we produce accurate results. Forensic investigation is a time-consuming task requiring attention to details, specialized expertise, procedures, tools, and environments. NetSecurity Forensic Labs is equipped with appropriate tools and technologies that can find evidence in both current and older computer storage technologies. We follow proper forensics investigation and evidence collection processes, such as: physical isolation of the target system to ensure data integrity, preventing evidence contamination, and performing a bit-by-bit duplication of the original source storage media. We also follow strict technical procedures to ensure that evidence is admissible in regulatory compliance, litigation, and corporate investigations. At NetSecurity, we assume the worst-case scenario and treat each forensic project as if it will end up in court and undergo legal scrutiny. We maintain a strict chain of custody and stringent evidence control procedures. We combine our hands-on approach to information security with our in-depth experience in electronic discovery, incident response, and digital forensics to help you overcome cost-prohibitive forensic engagements.

Contacting NetSecurity Forensic Labs To assist you in locating, acquiring, preserving, analyzing, and producing solid digital evidence promptly or to find out more information about how NetSecurity can help you reach your goals, contact us. e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email: forensics@netsecurity.com