Gregory S Miles Computer Forensics a Critical Process in Your Incident Response Plan

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=ywWWck9jX_Y



Duration: 1:17:09
5 views
0


Gregory S. Miles, Ph.D., Director, CyberCrime Response - JAWZ Inc.
Computer Forensics: A Critical Process in Your Incident Response Plan

HOW? How did my computer die? How did my website get hacked? Sometimes the answer is clear and sometimes its hidden. This presentation will focus on the critical elements of Computer Forensics as it relates to Incident Response. Computer Forensics is as much a legal and procedural capability as it is a technical capability. Assuring you follow the appropriate procedures is as important as the technical capability of your analyst. A brief overview of the Incident Response process will provide you with the basis for the computer forensics process. We will cover the different kinds of computer forensics, the computer forensics process, technical and legal aspects, tools of the trade, and possible future aspects. This presentation provides the basics to target your incident response and computer forensics capabilities.

Greg has over fourteen years in Computer and Information Systems. The last ten years have been focused in the design, development, and implementation of Information System Security Solutions. He currently serves as the Director of CyberCrime Response for JAWZ Inc and the COO/CFO for Security Horizon Inc. Greg is responsible for JAWZâ Computer Incident Response Team (CIRT), Computer Forensic analysis and investigation, and all JAWZ computer security and forensics training courses.

Greg possesses a Ph.D in Engineering Management, an M.S. in Administration, and a B.S. in Electrical Engineering. He has extensive training in technology and management and has authored articles for security periodicals and websites, to include The International Journal on CyberCrime , DuckTank, and Security Horizon (www.securityhorizon.com).

Black Hat - USA - 2001 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Gregory S. Miles