Implementing Digital Forensic Readiness: From Reactive to Proactive Process

  • 5h 10m
  • Jason Sachowski
  • Elsevier Science and Technology Books, Inc.
  • 2016

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

  • Explores the training needed to ensure competent performance of the handling, collecting, and preservation of digital evidence
  • Discusses the importance of how long term data storage must take into consideration confidentiality, integrity, and availability of digital evidence
  • Emphasizes how incidents identified through proactive monitoring can be reviewed in terms of business risk
  • Includes learning aids such as chapter introductions, objectives, summaries, and definitions

About the Author

Jason has over a decade of experience in digital forensic investigations, secure software development, and information security architecture. He currently manages a team of forensic investigators and data breach analysts for The Bank of Nova Scotia, commonly known as Scotiabank, Canada’s third largest and most international bank.

Throughout his career, Jason has performed hundreds of digital forensic investigations involving Enterprise servers, network logs, smart phones, and database systems. Complimentary to his technical experiences, he has also developed and maintained processes and procedures, managed large information security budgets, and governed the negotiation of third-party contracts.

In addition to his professional career, Jason serves as a contributing author and content moderator for DarkReading, is a subject matter expert for (ISC)2 professional exam development, and volunteers as an advocate for CyberBullying prevention and CyberSecurity awareness. He holds several Information Security and Digital Forensic certifications including: Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP), Systems Security Certified Practitioner (SSCP), and EnCase Certified Examiner (EnCE).

In this Book

  • Understanding Digital Forensics
  • Investigative Process Models
  • Evidence Management
  • Understanding Forensic Readiness
  • Define Business Risk Scenarios
  • Identify Potential Data Sources
  • Determine Collection Requirements
  • Establish Legal Admissibility
  • Establish Secure Storage and Handling
  • Enable Targeted Monitoring
  • Map Investigative Workflows
  • Establish Continuing Education
  • Maintain Evidence-Based Reporting
  • Ensure Legal Review
  • Accomplishing Forensic Readiness
  • Test Case Document
  • Investigator Logbook
  • Chain of Custody Tracking Form
  • Investigative Final Report
  • Service Catalog
  • Business Case Document
  • Net Present Value
  • Threat/Risk Assessment Report
  • Data Source Inventory Matrix
  • Project Charter Document
  • Requirements Specification Document
SHOW MORE
FREE ACCESS