Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Events » Digital Forensics: How to Make Remote Data Collection & Analysis More Efficient

Refine your results by

Digital Forensics: How to Make Remote Data Collection & Analysis More Efficient

KEYWORDS: network / remote / remote access
9/7/23 2:00 pm to 9/7/24 EDT
Contact: Amy Jackson
Earn: 0.1 IACET CEU 

  IACET Logo

As an IACET Accredited Provider, BNP Media offers IACET CEUs for its learning events that comply with the ANSI/IACET Continuing Education and Training Standard.

Participants completing this course may be eligible to receive Continuing Professional Education credit or CPEs toward ASIS re-certification.

Training may qualify for related continuing education for recertification activity through NICET. Students may claim one (1) Continuing Professional Development (CPD) point per hour of instruction towards their NICET recertification requirement for any sessions that expand their knowledge of the subject matter pertaining to the certifications they hold.


Remote collection & analysis is an important part of any internal investigation within your corporate network. Pulling a full forensic image of an endpoint can be time-intensive and can consume network resources, but a targeted collection can alleviate these concerns. This webinar discusses the most useful artifacts to collect in an internal investigation, such as Event Logs, LNK files, Shell Bags, Device Information, and more. Focusing on these types of artifacts will reduce the impact on your network during remote collection and reduce the amount of time needed to analyze the information and draw conclusions.

Learning Objectives

  1. Understand the advantages of remote collection in internal investigations

  2. Identify the most helpful key artifacts used for analysis of an endpoint

  3. Optimize remote collection techniques to reduce network impact

  4. Delve into a practical example where the adoption of remote collections has conserved both time and money, while also reducing stress  

Sponsored By: 


Register for this Event

Related Articles

Business email compromise during a pandemic: Why cyber insurance is more urgent than ever

Taking a Closer Look at Remote Workplace Fraud Vulnerabilities: How to Mitigate Escalating Threats

Digital security infrastructure unlocks the door to a more secure return to the office

How to Make Unreliable Video Reliable

Related Events

How to Enhance Corporate Investigations for Mac Computer Forensics

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing