Computer Forensic in responding to Data Breach issues

  • We encourage our users to use Real Names to build a real community, friendships and networking opportunities.

    [more information]

ridzuan93

New Member
Jun 16, 2018
3
0
#1
If a company is about to have their own Computer Forensic Team to investigate on the issues of internal data breach, misuse of IT facilities and such, what should be considered? any advise?
 

azuleonyx

Member
Experienced Member
Oct 20, 2018
33
Ratings
29
18
Charlotte, North Carolina Area
cyberfenixtech.blogspot.com
Twitter
https://twitter.com/AzuleOnyx
#2
What types of security products is the company already using? SIEM, DLP, and other software will help with investigate both in real time and after an incident occurs.
 

Lids

New Member
Experienced Member
Oct 23, 2018
22
Ratings
19
3
#3
You may want to determine if the employee/s that are in scope for the investigation have signed off on an "acceptable use policy" or similar document when they were hired. Any information related to user access rights, whether USB ports are locked down, ability for user's to install their own software (ala Dropbox), etc.
 

About us

  • Our community began in 2004. Since this time, we have grown to have over 29,000+ members within the DFIR & Cyber Security community.

    We are happy to announce that this forum is now under new ownership with the goal to once again become the main Digital Forensics Forum on the internet for DFIR, OSINT and Cyber Security.

    If you can think of ways to help us improve, please let us know.

    We pride ourselves on offering unbiased, critical discussion among people of all different backgrounds.

    We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu