Webinar Computer Forensic: Hide, Seek, and Find: Memory Analysis for Fast Incident Response

Few incident responders dispute the importance of memory analysis in incident response. Not only is memory acquisition faster than acquiring the hard drives of multiple (even hundreds of) computers; it’s often the only source of evidence in an ongoing attack. Frequently, memory contains valuable traces of system activity even when the attacker takes steps to hide what they’re doing.

This webinar will delve into the processes and user sessions that produce data across multiple users and one malicious file. With an emphasis on system activity, you’ll learn about memory artifacts including running processes, registry hives and keys, and other data that can help you determine what’s happening—and how to stop it.

Webinar Computer Forensic: Memory Analysis for Investigations of Fraud and Other Wrongdoing

Computer memory is more than just another digital data source in an investigation—it’s a potential trove of actionable intelligence. Faster than acquiring a hard drive and composed of no more than a few gigabytes (compared to potentially terabytes of data), evidence found in memory can focus and shape interviews of compliant victims, witnesses, and suspects, as well as the deeper digital forensic examination of digital media.

Using a case scenario involving the cloning of credit card / personally identifiable information (PII), this webinar will show you how to recognize the circumstances in which memory acquisition makes sense, and why it matters. With an emphasis on user activity, you’ll learn how memory analysis delivers otherwise encrypted results, including device and account passwords. Understand memory artifacts including hiberfil.sys, pagefiles, $MFT resident data, registry hives and keys, and why they matter.

Webinar Computer Forensic: Still Using IEF? Learn What You May Be Missing Out

Have you ever asked, “What does Magnet AXIOM have that IEF doesn’t?” After two years, the answer is: More than you might think. Join us for a free one-hour webinar to learn exactly what you’re missing out on if you’re still using IEF and you haven’t yet upgraded to AXIOM.

In this webinar, Senior Product Manager Cody Bryant and Product Marketing Manager Warren Pamukoff highlight:

  • The differences between IEF and AXIOM when it comes to processing and reviewing evidence
  • Our ability to acquire both physical and logical mobile images – including the ability to bypass passcodes
  • How easy it is to ingest 3rd party mobile images like GrayKey
  • The importance of reviewing cloud evidence in addition to mobile and computer evidence to ensure that nothing is missed
  • How Magnet.AI can save time by identifying relevant picture and chat evidence faster than a manual review
  • The importance of visualizing the history of key digital evidence to understand where it came from, where it went and who it was associated with

Webinar Mobile Forensic: An In-Depth Look at Different Password Bypass Options

As mobile technology continues to mature, and the amount security and encryption continues to strengthen, it’s becoming more of a challenge to know how to access data on smartphones that are password-protected. On top of the encryption challenge is the manufacturing variants that can create different roadblocks along the way.

In this webinar, Jamie McQuaid, Forensic Consultant, uses Magnet AXIOM to give a detailed walkthrough of a variety of different methods available to bypass passwords on LG, Samsung, and Motorola phones as well as phones using MTK and Qualcomm chipsets. You will also see how you can use TWRP and custom recovery images for a variety of Android devices.

Webinar Mobile Forensic: Addressing the Serious Threat of Cybercrime with Magnet AXIOM Cyber

Cybercrime provides its own unique challenges. Every case of fraud, workplace harassment, insider threats, identify theft, data exfiltration, IP theft, network intrusions, malware and ransomware attacks have the potential to devastate not only individuals, but corporations of all sizes.

In fact, in 2015, cybercrime cost the world over $3 trillion and if current trends continue, it’s predicted that by 2021 the cost of cybercrime will be in excess of $6 trillion.

When cybercrime occurs, it’s critical to understand the extent of what was done, how it happened, and who did it.

Join Drew Roberts, Product Manager at Magnet Forensics, as he introduces Magnet AXIOM Cyber: a new solution that helps digital forensics professionals acquire and examine evidence from computer, mobile, and cloud sources and is purpose-built to address the unique challenges presented by cybercrime.

During the webinar, Drew will demonstrate the power of AXIOM Cyber including:

  • Creation and deployment of a remote acquisition agent that can connect to and collect evidence from target endpoints
  • Collection of evidence from Amazon S3 buckets
  • Use of Admin credentials to acquire evidence from a user’s account in Enterprise deployments of Google, Microsoft, and Box as well as Slack