cloud computing forensics · 2016. 7. 19. · cloud computing based forensics may be new to...

2
Cloud Computing Forensics lawandforensics.com | [email protected] | 1 (855) 529 - 2466 | @lawa4n6 Law & Forensics’ consultants are leaders in providing cloud computing computer forensics. We help law firms and companies run successful investigations and return to normal operations after they have been breached. Cloud computing based forensics may be new to mainstream media, but it’s old news to us. Our experienced team leads the industry in securing data in the cloud and responding to breaches. We deliver critical guidance on how to respond to and manage forensic and data breach issues specific to the cloud. CLOUD FORENSICS AND SOCIAL MEDIA Consulted, testified, and advised in 1000+ disputes Locate and recover deleted or partially disrupted files in private and public cloud computing environments using off-the-shelf and patent pending cutting edge software. Analyze social network platforms, establish authenticity of social media, and translate technical findings into digestible information for lawyers. EXPERT WITNESS Patent, Copyright, and Trademark Disputes, Theft of Trade Secrets, Class Actions, Embezzlement, Contract and Business Disputes, Regulatory Actions, Cyber Stalking, Malpractice Dispute Assist the court in understanding the technology relevant to a case and make recommendations regarding forensic issues specific to the dispute, especially where voluminous materials need to be reviewed or inspections outside of court facilities are necessary. I NCIDENT RESPONSE Red Team is available at a moment’s notice Investigate and respond to a data breach within hours of being retained. Use cutting edge systems and investigative technologies to quickly identify and remediate the source of the data breach. Analyze network packets, malware activity, RAM memory, video, and tapes at our labs. FORENSIC I NVESTIGATIONS Thousands of investigations all over the world Assist companies in finding relevant data by collecting and harvesting data in a wide range of media, including mobile devices, hard drives, and backup tapes (e.g., deleted, hidden, lost, or encrypted files), and preserving data in a forensically sound fashion (e.g., locked, fireproof safe for evidentiary). Atlanta, GA | Los Angeles, CA | New York, NY | Seattle, WA | Mumbai, India | Sao Paulo, Brazil

Upload: others

Post on 21-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud Computing Forensics · 2016. 7. 19. · Cloud computing based forensics may be new to mainstream media, but it’s old news to us. Our experienced team leads the industry in

Cloud Computing Forensics lawandforens ics .com | in [email protected] | 1 (855) 529 - 2466 | @lawa4n6

Law & Forensics’ consultants are leaders in providing cloud computing computer forensics. We help law firms and

companies run successful investigations and return to normal operations after they have been breached.

Cloud computing based forensics may be new to mainstream media, but it’s old news to us. Our experienced team

leads the industry in securing data in the cloud and responding to breaches. We deliver critical guidance on how to

respond to and manage forensic and data breach issues specific to the cloud.

CLOUD FORENSICS AND SOCIAL

MEDIA Consulted, testified, and advised in 1000+

disputes

Locate and recover deleted or partially disrupted files in private and public

cloud computing environments using off-the-shelf and patent pending cutting

edge software. Analyze social network platforms, establish authenticity of

social media, and translate technical findings into digestible information for

lawyers.

EXPERT WITNESS

Patent, Copyright, and Trademark Disputes, Theft

of Trade Secrets, Class Actions, Embezzlement,

Contract and Business Disputes, Regulatory

Actions, Cyber Stalking, Malpractice Dispute

Assist the court in understanding the technology relevant to a case and make

recommendations regarding forensic issues specific to the dispute, especially

where voluminous materials need to be reviewed or inspections outside of

court facilities are necessary.

INCIDENT RESPONSE

Red Team is available at a moment’s notice

Investigate and respond to a data breach within hours of being retained. Use

cutting edge systems and investigative technologies to quickly identify and

remediate the source of the data breach. Analyze network packets, malware

activity, RAM memory, video, and tapes at our labs.

FORENSIC INVESTIGATIONS Thousands of investigations

all over the world

Assist companies in finding relevant data by collecting and harvesting data in

a wide range of media, including mobile devices, hard drives, and backup

tapes (e.g., deleted, hidden, lost, or encrypted files), and preserving data in a

forensically sound fashion (e.g., locked, fireproof safe for evidentiary).

Atlanta

, G

A | L

os A

nge

les,

CA

| N

ew

York

, N

Y | S

eatt

le, W

A | M

um

bai, Ind

ia | S

ao P

aulo

, B

razil

Page 2: Cloud Computing Forensics · 2016. 7. 19. · Cloud computing based forensics may be new to mainstream media, but it’s old news to us. Our experienced team leads the industry in

Case Studies

CLOUD HOSTING PROVIDER AEROSPACE & DEFENSE COMPANY GLOBAL HEALTH & BEAUTY PRODUCT

Problem: Client was compromised by

malicious cyber attacker. Problem: CEO was breached. Problem: Client was unable to recover

deleted files.

Solution: L&F recovered more than a

dozen servers belonging to the

company that were taken off-line by

a malicious cyber attacker in less

than 48 hours. After L&F cleaned

and recovered the data from the

servers, it identified the source of the

breach and remediated the problem.

Solution: Retained by an aerospace

team to remediate a breach of their

private cloud. An L&F team member

was onsite at the data center located

in the Middle East within 24 hours of

the cyber incident. L&F identified the

breach in the private cloud, and

spearheaded the remediation efforts,

including cleaning and recovering

dozens of servers that hosted critical

and essential data in the company’s

private cloud.

Solution: Hired by a global health and

beauty products company to recover

hundreds of files deleted from a

Dropbox account by a disgruntled

employee. L&F also identified several

backdoors that the employee had left

that, if not deleted, could have resulted

in breach costing more than fifty million

dollars.

About Law & Forensics

Law & Forensics is a strategic consulting firm with a global presence that assists clients with sensitive

and complex electronic discovery, information governance, computer forensic, information security, and

privacy issues. With a strong record for getting results, reducing costs, mitigating legal risks, and

delivering value, Law & Forensics provides corporations, government agencies, law firms and other

legal, business, and technology stakeholders with solutions to address complex litigations, sensitive

investigations, and regulatory inquiries.

Law & Forensics team members act as testifying expert witnesses, discovery referees, forensic

neutrals, Special Masters, and electronic discovery consultants both in the U.S. and abroad, having

worked on hundreds of matters.

All of Law & Forensics’ work reflects the highest ethical standards, no matter the scope of the task at

hand. We consistently find new ways to serve our clients, and justice, better.