As our technology is getting smarter, so are the individuals that are looking to compromise your most sensitive data. Today, the hacking community is looking for the easiest way to brake into your network to expose Personal Identifier Information (PII), Personal Credit Information (PCI), and Personal Health Information (PHI). Most recently, law firms and financial institutions have been in the radar for a corporate data breach; as outlined in the Bloomberg article below.
“China-Based Hackers Target Law Firms to Get Secret Deal Data”
However, law firms and financial institutions are not the only industries in target, all service providers should be at risk. It is very important to understand the risk that you and your company faces with the daily activities with laptops, smartphone and tablets. It is also very important to understand the security precautions that should be addressed to keep you secure from a possible breach.
Please join DIGITS LLC in a Free webinar on October 9, 2012 at 11:00 a.m. EST
Click here to register http://tinyurl.com/8he3cye
Computer Forensics 101:Proactive Compliance
This Session focuses on the fundamentals of computer forensics analysis:
Real life case studies will be used to highlight what the computer forensic expert looks for on computers, smart phones and tablets. Identification of Electronically Stored Information (ESI) and how computer forensics is used to identify fraud as well as proactive compliance programs and regulatory inquires. You will learn what you can expect to gather from computers and smart phones whose contents become evidence in your cases.
Upon completion of this segment, you should be better able to:
1. Understand the practical use of Computer Forensics in Data Loss Prevention (DLP).
2. Understand what ESI is available from computers and smartphones.
3. How to implement Proactive Computer Forensics techniques into Human Resource, Regulatory, Compliance, FCPA and other regulatory, compliance and Audit Programs.