Abstract: As businesses expand their digital operation network to include mobile devices for better access and convenience, threat actors aim to compromise these devices to gain access to the organization’s digital infrastructure. Consequently, these devices become both targets and sources of evidence for security incidents. In response to these evolving threats, this webinar, part of the series on digital forensics, explores the rapidly advancing field of mobile device forensics. It focuses on the latest techniques and tools used by forensic professionals to extract, analyze, and preserve data. Additionally, it sheds light on the forensic analysis of cloud data accessed through mobile devices, addressing the technical and ethical challenges, as well as trends associated with it. Attendees will gain a comprehensive understanding of mobile forensics processes, along with analytic skills and tactics necessary for security professionals to conduct mobile forensic investigations effectively.
Key Takeaways:
- Overview of mobile forensics principles
- Mobile data types and extraction techniques
- Advanced tools for mobile device forensic
- Mobile application and cloud data forensic tactics
- Legal and ethical considerations for mobile device forensics
Speaker:
Bennie L. Cleveland Jr., AVP, Cyber Incident Management
Bio: Bennie L. Cleveland Jr. is a distinguished cybersecurity leader with over two decades of experience in Cyber Incident Management, Enterprise Security, and Risk Management. Holding certifications such as the C|HFI, C|CISO, CISM, CISA, CRISC, and CIPM, Bennie has demonstrated exemplary leadership in Incident Response, Forensics, and Threat Intelligence. Currently serving as AVP of Cyber Incident Management at Chubb, he specializes in identifying high-risk vulnerabilities and mitigating ransomware. Bennie has a proven track record of accelerating incident resolution and enhancing business continuity. He is also a Cybersecurity Adjunct at Valley Forge Military Academy & College, where he teaches Digital Forensics. His strategic oversight ensures robust compliance and comprehensive security measures.
*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)