Leverage Digital Forensic resources effectively

With many universities offering master's in digital forensics study and with other training, the supply of forensics resources increasing. Not sure if these resources are leveraged in their full potential in enterprises. Also, if all of them are getting the right career, many I met felt disappointed in narrowing their domain expertise in digital forensics, difficulty in finding right job.

Years back essential requirement sought for a person to start their security career was experience and expertise in operating systems or networks based on their prior work experience or studies. But now many start their careers in security out of collages and built expertise over time, which may be impacting the quality of skill to an extent. One reason for this is security resource demand and supply unbalance

Digital forensics resources build forensics capabilities over OS and network fundamentals, essential for each security domain, but most time, their career opportunities shrink to evidence collection, preservation, and documentation or cracking mobiles and systems.

Not saying that out of college, they are fully ready to take up the more significant role soon, but for sure, there is a fantastic career path for them with proper mentoring, broaden reading and attitude. Worked with few forensic experts, they preferred to be only as a technologist, tool experts in Encase and FTK they may be limiting themselves.

Regulations, investigations, audits, and contractual clauses are demanding the role of digital investigators in enterprises. Many a time this role is handled by a non-technical person leveraging forensic analyst for imaging, preserving the chain of custody, and documenting the evidence.

A key objective of a digital investigator to find answers to 6 questions

  1. Who, did it?
  2. What, did they do?
  3. When, did they do?
  4. How, how did they do?
  5. Where, did they come from and to where?
  6. Why, did they do it?

Out of these 6 questions, 5 answers are the output of forensic analyst engaged — the answer to the question 'why' most of the time is a gray area. With a few additional skills, a good business case for a forensic analyst to move as a digital investigator.

Deposition in courts, is expertise very few people have intent and experience to do. Digital forensics personal are a good fit for those engagements, especially since they have a first-hand understanding of the issue and laws related to the domain.

Incident handlers struggle at times when they cannot find indicators to most of the 6 questions mentioned above. The forensic analyst could proactively work with incident handlers to validate and establish if those (most) of questions answered for each of the use cases / potential incident scenarios for which specific data sources and events of interest collected. Forensic experts are an asset in incident handling / SOC team leveraging their OS, registry, rootkit, filesystem expertise.

Enterprise policies, standards, and regulations mandate collection and preserves of logs; the struggle for many is on defining what to collect and where to collect. In some cases, existing applications may not be even generating required logs. The forensic analyst could be leveraged to identify, coordinate, and validate the adequacy in this regard. Forensic experts in Security engineering / Governance function is an asset

Every audit activity has a considerable digital component, good to leverage forensic analyst part of the audit team through the lifecycle of its digital landscape.

Enterprise CERTs, work on potential new indicators, vulnerabilities and threats, which need technical expertise to reverse engineer, validate assumptions and provide recommendations, Forensic experts are right resources to be in the core team

Suggestion to individuals building their careers in digital forensic is to be aware of an ample space available to develop their careers. Your expertise is niche and valuable needs to further enhance with readings to psychology, investigation methods, case studies, standards, regulations, threat intelligence, security blogs, IT laws, changing IT environment and, more importantly, enterprise policies. (intent is not to generalize this field of study)

Sample curriculum of a digital investigator (from a leading US university)

  • Computer forensics, mobile device forensics, and malware
  • Network forensics
  • Fraud investigation
  • Digital forensics and the law
  • Understanding the legal system
  • Psychology of cybercrime
  • Incident response and timeline analysis
  • Digital forensics in digital archives
  • Database forensics, reverse engineering, and malware

Let us work together to make a safer Cyberspace.

Yogesh M.

Network Security & Routing SME | Network Automation | Prisma Access | Principal Network Security

5 年

Useful!

Excellent article. My forensics career started as a part of a fraud investigation team. It really helped that along with forensics, I was also involved in financial fraud and corporate espionage investigation.

Halim Kahwaji

Helping customers address modern complex cyber-security challenges

5 年

Quite interesting

Nice, short but informative, well organized post. Kudos !

Good article Sunil. Key will be to also look at the impact to the organization as one discovers the answer esp. to 'Why' question

要查看或添加评论,请登录

Sunil Varkey的更多文章

  • Building an Application Security Program - A high level approach

    Building an Application Security Program - A high level approach

    The majority of the security incident category in recent time is related to exploits of vulnerabilities or…

    18 条评论
  • Fishing in Muddy Water

    Fishing in Muddy Water

    Most of the enterprise networks are too noisy, with huge volume of bad traffics getting denied at host of systems…

    4 条评论
  • 2021 Security Predictions

    2021 Security Predictions

    Security events triggered by Solarwinds episode and others, will trigger revalidation of security strategy, mainly on…

    21 条评论
  • Elephants, Tigers and Snakes

    Elephants, Tigers and Snakes

    Many incident handlers and analysts defend cyber-attacks with a 'One size fits all' standard response, which most of…

    2 条评论
  • 2020 Cyber Security – Strategy Considerations

    2020 Cyber Security – Strategy Considerations

    With the new financial year, Cybersecurity strategy and budget discussions are now in the finalising stage at…

    3 条评论
  • Blueprint, your Digital Estate

    Blueprint, your Digital Estate

    For any digital environment to sustain and to be defensible, there are few principles, hygiene, DNA it needs to…

    1 条评论
  • Persona based Adaptive security

    Persona based Adaptive security

    In the interconnected cyber world, access and privileges to sensitive information and critical infrastructure…

    3 条评论
  • Cyber Crisis Communication – A Key factor in Incident Response

    Cyber Crisis Communication – A Key factor in Incident Response

    With incident and crisis becoming a routine activity in the Cyberworld, communications with stakeholders during various…

    5 条评论
  • Time based Security - Relevance

    Time based Security - Relevance

    One of the fundamental principles of security is to understand the criticality of the asset to be safeguarded, its…

    6 条评论
  • Scale-up response strategy, credentials in the Dark web

    Scale-up response strategy, credentials in the Dark web

    Recent reports of large-scale credential exposure in the Dark web is alarming and warrants a scaled response strategy…

    3 条评论

社区洞察

其他会员也浏览了