Long gone are the days of viewing digital forensics as an exotic part of data collection. Lawyers today must be aware of the evidence available through digital forensics. Investigative digital forensics may be crucial to your case or the protection of your client’s assets. They provide capability to detect malfeasance, to support or refute alibis, to show assent, consent or intent, to prove the integrity and authenticity of records, to best remediate breaches and vulnerabilities, and to ensure compliance with burgeoning data privacy and security regulations.
Knowing what to look for, when and where in a company’s computer network, applications and local or cloud storage and in its employees’ “bring-your-own-devices,” is essential for protecting its value. Understanding how-digital recovery and enhancement, “predictive coding” to parse millions of emails into relevant sets, procedures to ensure admissibility in court and administrative tribunals-is required to maintain parity with contemporary adversaries.
Our panel of experts survey digital forensic investigation and share their experience and visions for the near future. They provide practical suggestions to help you get started and to advance your ability to represent your clients competently as required by current ethical rules. Don’t leave evidence out there that you could use to win your next case!
Knowing what to look for, when and where in a company’s computer network, applications and local or cloud storage and in its employees’ “bring-your-own-devices,” is essential for protecting its value. Understanding how-digital recovery and enhancement, “predictive coding” to parse millions of emails into relevant sets, procedures to ensure admissibility in court and administrative tribunals-is required to maintain parity with contemporary adversaries.
Our panel of experts survey digital forensic investigation and share their experience and visions for the near future. They provide practical suggestions to help you get started and to advance your ability to represent your clients competently as required by current ethical rules. Don’t leave evidence out there that you could use to win your next case!
Course Content
9:30 - 9:35 am
9:35 - 10:00 pm
10:00 - 10:45 am
10:45 - 11:00 am
11:00 - 11:20 am
11:20 - 11:50 am
11:50 - 12:15 pm
12:15 - 12:25 pm
12:25 - 12:30 pm
Please Note
Speakers
ChairStephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston
Faculty
Courtney S. Dayter,
Kroll, Secaucus
Lucie J. Hayward,
Cyber Security and Investigations, North America, Nashville
Mark Spencer,
Arsenal Consulting, Chelsea