The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."           Thomas Mann, 1896


The Business Forum held a Luncheon at
The Fairmont Olympic Hotel in Seattle, Washington
on the subject of
The Executive Liability of IT Professionals

With Experts from:   CyberTrust, Inc.


Those accepting our invitation to attend included:

Senior Business Analyst - GM Nameplate, Inc. * Information Technology Manager - GM Nameplate, Inc. * Partner - Integro Partnership * Audit Director - Todd Pacific Shipyards Corporation * Technology & Operations Manager - King County  * Manager Data Warehousing - University of Washington * Director Global Information Security - PACCAR, Inc. * Senior IT Analyst– Safeco * Senior IT Auditor – Safeco * Practice Director - Two Degrees Consulting * IT Specialist, Risk Management – Safeco * Senior Security Process Specialist - The Boeing Company * Director Information Systems - Todd Pacific Shipyards Corporation * Manager, Corporate IT Contract Administration - Russell Investment Group * Senior Technology Consultant - Russell Investment Group * Manager Systems & Programming - Milliman, Inc. * Director - County Government Central IT Organization - King County ITS * Manager of Enterprise Networks & Security – Nordstrom * Networks Administrator – Milliman, Inc. * Senior Security Risk Analyst - Russell Investment Group


For the benefit of those of our members and supporters who could not
attend the meeting we present the following white paper, with contacts
 


Forensics Data Handling

Author: Ty Gast
Contributed by: Cybertrust, Inc.

Computer forensics involves the complex task of accurately investigating events or activities on computer systems without adversely affecting the integrity of the data contained on those systems. This is a difficult task to perform properly, requiring expert handling and care. A forensics investigator is asked to answer fundamental questions surrounding an event: who did what, when did they do it, and how was it accomplished?

At the same time, they are expected to take precautions that ensure the integrity of the original data is maintained. To that end, investigators follow precise procedures to safeguard the data while allowing the investigation to proceed. These procedures include maintaining a chain of custody for all evidence material, maintaining the integrity of the data source media, and creating accurate mirror images of data sources. Only after these important steps are taken can an investigator begin the forensics analysis of mirrored data.


Contact for further Information:

CyberTrust, Inc.

Lori Winn 

Office:  707-762-7275
FAX:    707-762-2289

[email protected]


Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


Disclaimer

The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description


Home    Calendar    The Business Forum Journal     Features    Concept    History
  Library    Formats    Guest Testimonials    Client Testimonials    Experts    Search  
News Wire
      Join Why Sponsor     Tell-A-Friend     Contact The Business Forum


The Business Forum
9297 Burton Way, Suite 100
 Beverly Hills, CA 90210
 Tel: 310-550-1984 Fax: 310-550-6121
 [email protected]

webmaster: bruceclay.com