Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Spotlight

There is a truism in today’s clickable economy: wherever there is commerce, there is also the risk for cybercrime.Whether a financial institution, an Internet storefront that does business with online shoppers, and now even hospitals with the rising tide of ransomware, cybercrime has no boundaries. In fact, anyone with an email address, an inbox, or a social media account is a target. Most organizations or individuals are not even aware of the bullseye on their back for hackers, cyber thieves, and extortionists until it’s already too late to respond or recover from being attacked.

OTHER ON-DEMAND WEBINARS

Controls are the Key to Cybersecurity Management Success

Controls are the critical foundation of an effective enterprise cybersecurity program. With more threats, more systems to protect, more tools to deploy and more people to manage, there is constant pressure to move faster and keep up with the ever-changing risk landscape. As a result, there is a need for the organization to have the proper controls in place to manage cybersecurity threats and risks across applications, systems, facilities and third parties.
Watch Now

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation: A Roadmap

Our cybersecurity experts Sharath Acharya and Prayukth K V as they discuss the roadmap to Integrating IT & OT Security, addressing cyber risks and pitfalls through innovation. This On-Demand webinar will offer critical insights for evolving an enterprise-wide strategy to ensure adequate IT and OT security integration and closure of postural gaps and security deficiencies.
Watch Now

Don’t Diverge, Converge - Build a Zero Trust Strategy with FortiGate NGFW

Hybrid networks enable organizations to implement critical new business applications and services, but they also increase the attack surface.
Watch Now

Spotlight

There is a truism in today’s clickable economy: wherever there is commerce, there is also the risk for cybercrime.Whether a financial institution, an Internet storefront that does business with online shoppers, and now even hospitals with the rising tide of ransomware, cybercrime has no boundaries. In fact, anyone with an email address, an inbox, or a social media account is a target. Most organizations or individuals are not even aware of the bullseye on their back for hackers, cyber thieves, and extortionists until it’s already too late to respond or recover from being attacked.

resources