PREVIEW: How to be ready for forensic investigations - Workshop eBook

Download
File
eForensics Magazine 2018 09 How to be Ready for Forensic Investigations Workshop eBook PREVIEW.pdf

Dear Readers,

This month, in addition to a regular issue we have a special edition - based on our How to be ready for forensic investigations online course. The eBook contains the entire reading material from the course, while skipping practical exercises and videos. It also includes a few additional articles related to the topic of forensic readiness that you will be able to read only in this issue!

The bonus articles are a publication by the instructor of the course, Dauda Sule, entitled “Blockchain for Enhanced Forensic Readiness”, a paper by Collins Bunde on how to improve incident response capability, Florence Love Nkosi’s article on information systems management and security, and “Establishing Incident Escalation Process”. We’re extremely excited that they are finally out! If you would like to access video materials from the workshop, and get a certificate proving you mastered this material, consider joining the course!

Regards,

Dominika Zdrodowska

and the eForensics Magazine Editorial Team


INSIDE OF THE PREVIEW: Full article by Dauda Sule "Blockchain for Enhanced Forensic Readiness


Subscriber? Click here to download the whole issue

Buy this issue


Table of Contents


Establishing Incident Escalation Process

by Nikhil Singhvi S

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future recurrence. If not managed, an incident can escalate into an emergency, crisis or a disaster. Incident management is therefore the process of limiting the potential disruption caused by such an event, followed by a return to business as usual. Without effective incident management, an incident can disrupt business operations, information security, IT systems, employees, customers, or other vital business functions.


Blockchain for Enhanced Forensic Readiness

by Dauda Sule

Blockchain technology is a potential disruptive technology that is up and coming. It is expected that this technology is going to revolutionize a lot of industries and create a lot of improvements and elimination of some middlemen. It originated from the cryptocurrency Bitcoin, but has found application in far reaching fields, part from finance, like supply chain management, quality assurance, health, entertainment and so on.


How to improve information systems management and security

by Florence Love Nkosi

Information has become an important asset to all businesses, so are the information systems at the center of processing and storing this information. There is also an increased dependency on information systems and it is greatly being used by businesses to meet their objectives in the digital world. Information systems have no doubt become the hub of most businesses and have greatly improved the performance of most business ventures worldwide.


How to improve incident response capability

by Collins Bunde

Incident response is an act of responding in a systematic and methodical way to internal and external security breaches. To battle today’s threats, you need an effective IR strategy. That is, you need to prepare for, respond to and remediate. Notably, the IR team is a panoply of experienced workforce, proven methodologies and the right technology to analyze an attacker’s TTPs and piece together a coherent finding for the breach. These findings should include details of how the attacker got in, which systems were compromised, what was accessed, and whether such information is governed by any laws, regulations or contracts. Sometimes reducing the mean time to remediation is the role of an effective IR.


How to be ready for forensic investigations - Complete nline course reading materials

by Dauda Sule

  • Module 1 - Introduction
  • Module 2 - Importance
  • Module 3 - Implementation Checklist
  • Module 4 - Challenges and Trends

Download
File
eForensics Magazine 2018 09 How to be Ready for Forensic Investigations Workshop eBook PREVIEW.pdf

June 12, 2019

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2]

Performance

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr
_ga, _gid, _gat, __utma, __utmt, __utmb, __utmc, __utmz
vuid

Marketing


tr, fr
ads/ga-audiences