CSI Techniques for IT Security
In 2003, Mueller left Law Enforcement for a position with Guidance Software as a Master Instructor and trainer for law enforcement, military, government and corporate examiners. While there, he developed several of the training courses that are still in use by the company. Mueller then transitioned to Guidance’s professional services division where he conducted incident response and forensic examinations for many of their Fortune 500 clients.
Mueller then took a position with the US Department of State Antiterrorism Assistance (ATA) program in 2005, traveling to multiple countries to teach digital forensics best practices, setting up computer forensics laboratories and conducting forensic capability assessments.
For the last two years, Mueller has worked at Qualcomm as a member of their global security team, responsible for conducting incident response, digital forensics and worldwide investigations. He also maintains a popular forensics blog: www.ForensicKB.com.
Mueller currently works as the Director of Forensics at Magnet Forensics, where he works closely with Founder & CTO, Jad Saliba to provide feedback and ideas on useful features that forensics examiners can leverage to assist in completing their cases quickly and efficiently.
An IT security incident is often the first step in a sequence that can ultimately ruin your organization. The tipping point can be as innocuous as a misplaced laptop or as malicious as a rogue employee. For most organizations the only option is to stay ahead of the curve. This means providing IT with the necessary tools and technology to proactively monitor for early warning signs, allowing them to take meaningful action before any damage can occur.
Attend to learn how to:
• Take proactive measures to guard against data breaches, rogue employees, and other security risks
• Determine the value of persistence technology for a constant connection to devices that store corporate data
• Decide how war zone IT security measures can work for corporate
• Gain real life examples of security incidents and how they can be mitigated or avoided altogether
Register for this webinar to join Lance Mueller, Director of Forensics at Magnet Forensics for a fascinating look at investigative and other techniques IT can use to safeguard sensitive data, intellectual property, and corporate equipment.