Forensics Trends for 2013 —Government Info Security Reviewed by Momizat on . External Attacks, Data Loss are Top Concerns Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee  who says its not new types of at External Attacks, Data Loss are Top Concerns Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee  who says its not new types of at Rating: 0
You Are Here: Home » Forensic Accounting » Forensics Trends for 2013 —Government Info Security

Forensics Trends for 2013 —Government Info Security

External Attacks, Data Loss are Top Concerns

Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee  who says its not new types of attacks that concern him. It’s the old ones that continue to impact organizations. How can organizations learn from past incidents and respond in 2013?

The bulk of the cases he investigates are external breaches, not insider cases, says Lee, a seasoned forensics professional and curriculum lead and author for digital forensic and incident response training at the SANS Institute. When analyzing the incidents and reporting back to technical teams or executives, he’s often faced with the question, “How do we stop this?”

“Even though we’re learning more about what the capabilities are of the hackers and adversaries, we have not done a decent job of being able to truly implement solutions that will slow them down … and even stop the initial infiltration,” he says in an interview with Information Security Media Group [transcript below].

Moving forward, organizations need to address the breach at the point of data exfiltration.

“That ends up being a much louder and significant event on a host and a network and much easier to detect as a result,” Lee explains.

The main trend heading into 2013 will be for enterprises to formulate effective breach responses to tactics that continue to overwhelm them. And to get to that point, organizations need to embrace the power of big data, which has been difficult for some entities because of the sheer amount of information gathered within an enterprise.

“But as we’re moving forward, we’re starting to see some solutions creep forward that will give us that visualization and give us the capabilities to identify these anomalies as they’re ongoing,” Lee says.

In an interview about the process, skills and tools needed in a forensics investigation, Lee discusses:

  • Typical investigations he conducts;
  • Attack trends and what we can learn from them;
  • Most important skills for forensics pros to master.

government-security-internet

Security is Critical to Growth and Professional Advantage

The National Association of Certified Valuators and Analysts (NACVA) supports the users of business and intangible asset valuation services and financial forensic services, including damages determinations of all kinds and fraud detection and prevention, by training and certifying financial professionals in these disciplines.

Number of Entries : 1593

©2017 NACVA and the Consultants' Training Institute • (800) 677-2009 • 5217 South State Street, Suite 400 Salt Lake City, UT USA 84107

event themes - theme rewards

UA-49898941-1
lw