top of page

Digital Forensics Best Practices

by Jean-Simon Gervais, Fullblown Security


In our tech-driven era, digital computing has evolved from a mere tool into a core element of business and personal life. It powers organizations with precision and automation, redefining the balance between efficiency and convenience. Each day, our data grows, offering opportunities for insights. Simultaneously, communication methods evolve swiftly. Networks now span the globe in nanoseconds, enabling instant global exchanges, fueling industries, and reshaping interactions.


Yet, amidst these remarkable advancements, serious challenges have also emerged. How can we ensure control and enable proper decisions when digital property is maliciously exploited, spoofed, stolen, or inadvertent mistakes occur?


This is where Digital Forensics emerges as the obvious solution. Rooted in established scientific methodologies and armed with specialized tools, it uncovers subtle or even hidden digital traces. Forensics practitioners meticulously dissect the aftermath of digital interactions, preserving and analyzing fragments of data that serve as essential pieces of the puzzle, unraveling complex narratives. Whether addressing HR matters, legal intricacies, data breaches, technical audits, fraud investigations, or security incidents, the capabilities of digital forensics brings clarity to these challenges.


We cordially extend an invitation to an exclusive demonstration and informative session on the forensics subject. This unique opportunity will allow you to witness firsthand the power and simplicity of the forensics workflow through real-life examples. Experience how a versatile forensics provider can empower your daily search for answers, helping you discern critical behavioral patterns, quantify crucial data, and make well-informed decisions during an investigation.


Our team of experts is prepared to provide you with an insightful showcase of the cutting-edge equipment employed both within our lab and during field operations for the purpose of collecting digital evidence. This demonstration will encompass an array of intriguing tools, including write blockers, duplicators, and bootable forensics USB systems, all instrumental in the meticulous gathering of crucial data.


A comprehensive discussion will ensue regarding the prerequisites for preserving evidence, a paramount consideration preceding the collection process. This discourse will encapsulate strategies to minimize the potential loss of ephemeral information, such as RAM.


You will then be presented with various use cases highlighting data extraction from contemporary mobile devices (Android, iOS) and office computers (Windows). The focal point of this presentation will revolve around familiarizing you with the typical fundamental features of forensics software platforms, using Exterro FTK and Belkasoft Evidence Center for the matter. Subsequently, our experts will delve into a range of examples with distinct data artifacts pivotal to diverse investigative contexts. These concrete examples will encompass a multitude of aspects, including health sensor logs, geolocation traces embedded within images and applications, as well as the story-telling metadata entrenched within system and application dynamics.


Join us as we navigate the dynamic route of digital empowerment and security, embarking on a journey to restore truth and confidence within an ever-evolving digital terrain. Jean-Simon Gervais of FullBlown Security will lead the course. JS is a former Canadian Armed Forces Officer with 20 years of experience in information security and privacy, specializing in applied Cybersecurity, Governance Advisory (GRC), Digital Investigations, and Incident Response. His work is aligned with industry-recognized US and international frameworks and standards, namely ISO/IEC 27035 and 27037, as well as NIST SP800-61, SP800-83, and SP800-86.

4 views0 comments

Recent Posts

See All

Maritime Cyber Risk Evaluation and Management

by Max Bobys, VP, HudsonCyber Across the digital maritime supply chain, organizations confront an escalating, ever increasingly sophisticated range of cyber threats. In today’s era of accelerated digi

bottom of page