What is Forensic Analysis?
If you saw an episode of “CSI” and are looking for the latest information on crime scene forensics try this article “How Crime Scene Investigation Works.”
If you suspect that you’re the victim of a data breach, call
us now for guidance, or if you just want to learn more about forensic analysis
Forensic Analysis is the use of controlled and documented analytical and investigative techniques to identify, collect, examine and preserve digital information. Recognizing the fragile nature of digital data, and the legal and regulatory requirements to properly preserve electronically stored information (ESI) during forensic investigations, SecureState maintains standards relating to protecting ESI against manipulation or destruction.
The 'Why & How' of a Forensic Investigation
When an incident occurs, a forensic investigation may be needed based upon legal, financial or regulatory requirements. The purpose of forensics is to determine actions, motives, vectors, effects and evidence for incidents misuse, theft, or fraudulent activities.
During the course of an investigation, forensic analysis focuses on three primary areas: Evidence Acquisition, Evidence Analysis, and Evidence Reporting. For details about this process view our Approach and Methodology.
SecureState’s Incident Response Team is comprised of industry experts with experience in Military Intelligence, Law Enforcement, and Big X Consulting. Members of our Team have been involved in the acquisition and forensic analysis of data in high profile events including the Space Shuttle Columbia Disaster. They have coordinated Incident Response teams that included FEMA, AFCERT, and DHS against inclement weather, terrorist activities, and world-wide threat events. Several members of the Team have high-level government security clearances and are trusted with the nation’s most classified secrets. Our strategic partnerships with the FBI, DHS, US-CERT and InfraGard permit SecureState to obtain the latest cutting-edge and persistent attacker techniques and exploits, which gives us the information necessary to identify those attacks, contain and eradicate them.