About this webcast:
Despite the massive size of today's Internet and the millions of miles network data packets travel every millisecond, each one of those packets leaves a mark -- in routers, firewalls, Web proxies, and within enterprise networks. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. But do you know the tools and techniques needed to find it?
In this live SearchSecurity.com webcast, learn how enterprise network security teams can recognize hackers’ tracks and uncover network-based evidence of digital crime. Experts Sherri Davidoff and Jonathan Ham, co-authors of the new Prentice Hall book, “Network Forensics: Tracking Hackers through Cyberspace”, shared secrets they've learned conducting real incident-response interventions and digital forensics investigations.
Davidoff and Ham also answered questions about network forensics questions. One lucky participant received a free copy of “Network Forensics: Tracking Hackers through Cyberspace”.
About the experts:
Sherri Davidoff and Jonathan Ham are security consultants with Lake Missoula Group, LLC. They specialize in penetration testing, network assessments, forensics, and incident response.
This was first published in June 2012