Long gone are the days of viewing digital forensics as an exotic part of data collection. Lawyers today must be aware of the evidence available through digital forensics. Investigative digital forensics may be crucial to your case or the protection of your client’s assets. They provide capability to detect malfeasance, to support or refute alibis, to show assent, consent or intent, to prove the integrity and authenticity of records, to best remediate breaches and vulnerabilities, and to ensure compliance with burgeoning data privacy and security regulations.
Knowing what to look for, when and where in a company’s computer network, applications and local or cloud storage and in its employees’ “bring-your-own-devices,” is essential for protecting its value. Understanding how-digital recovery and enhancement, “predictive coding” to parse millions of emails into relevant sets, procedures to ensure admissibility in court and administrative tribunals-is required to maintain parity with contemporary adversaries.
Our panel of experts survey digital forensic investigation and share their experience and visions for the near future. They provide practical suggestions to help you get started and to advance your ability to represent your clients competently as required by current ethical rules. Don’t leave evidence out there that you could use to win your next case!
Knowing what to look for, when and where in a company’s computer network, applications and local or cloud storage and in its employees’ “bring-your-own-devices,” is essential for protecting its value. Understanding how-digital recovery and enhancement, “predictive coding” to parse millions of emails into relevant sets, procedures to ensure admissibility in court and administrative tribunals-is required to maintain parity with contemporary adversaries.
Our panel of experts survey digital forensic investigation and share their experience and visions for the near future. They provide practical suggestions to help you get started and to advance your ability to represent your clients competently as required by current ethical rules. Don’t leave evidence out there that you could use to win your next case!
Course Content
9:30 - 9:35 amWelcome and Introduction
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston
9:35 - 10:00 pm
Overview of Data Privacy and Security and Their Relevance
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston
10:00 - 10:45 am
Digital Forensics Basics, Practical Observations and Step-by-Step Through a Case
Courtney S. Dayter,
Kroll, Secaucus
Lucie J. Hayward,
Cyber Security and Investigations, North America, Nashville
10:45 - 11:00 am
Networking and Refreshment Break
11:00 - 11:20 am
Ethical Pitfalls: Where and How You Can Look
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston
11:20 - 11:50 am
Identifying Smoke & Mirrors
Mark Spencer,
Arsenal Consulting, Chelsea
11:50 - 12:15 pm
Additional Case Examples
Mark Spencer,
Arsenal Consulting, Chelsea
12:15 - 12:25 pm
Panel Discussion
12:25 - 12:30 pm
'Ask the Experts' Q&A Session
Panel
Please Note
This webcast is delivered completely online, underscoring their convenience and appeal.
There are no published print materials. All written materials are available electronically only.
They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.
Speakers
ChairStephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston
Faculty
Courtney S. Dayter,
Kroll, Secaucus
Lucie J. Hayward,
Cyber Security and Investigations, North America, Nashville
Mark Spencer,
Arsenal Consulting, Chelsea