Using Forensic Readiness and E-Discovery in Quality Information Risk Management Planning

Using Forensic Readiness and E-Discovery in Quality Information Risk Management Planning

Dauda Sule (ISACA, Nigeria)
Release Date: January, 2017|Copyright: © 2017 |Runtime: 52 mins
EISBN13: 9781522517702|DOI: 10.4018/978-1-5225-1770-2

Description

The use of digital platforms offers numerous benefits to people and organizations as a whole; however, these tools also allow criminals the opportunity to conduct illegal or illicit activities, if the platforms are left vulnerable.

Using Forensic Readiness and E-Discovery in Quality Information Risk Management Planning explores the utilization of digital evidence prior to the occurrence of cybercrime activity and how such methods enable organizations to protect their assets. Highlighting innovative methods on the collection, storage, and usage of data, this video resource is ideally designed for professionals, practitioners, managers, and academics interested in the application of digital forensic evidence.

Topics Covered

  • Archiving Methods
  • Data Collection
  • Data Preservation
  • Data Processing
  • Employee Privacy
  • Information management

Table of Contents

Introduction
1:40 mins
Section 1:Digital Evidence and Forensic Readiness
 
Lesson 1:Digital Evidence and Forensic Readiness
8:25 mins
 
Section 2:Forensic Readiness and the E-Discovery Process
 
Lesson 2:Information Management and Identification
4:19 mins
 
Lesson 3:Preservation, Collection and Processing
5:38 mins
 
Lesson 4:Review and Analysis
3:46 mins
 
Lesson 5:Production and Presentation
4:25 mins
 
Section 3:Issues, Controversies, Problems
 
Lesson 6:What and What not to Archive and for How Long
1:32 mins
 
Lesson 7:Privacy Concerns from Employees
1:31 mins
 
Lesson 8:Too Many IT Security Related Policies
1:11 mins
 
Lesson 9:Communication Gap Between IT and Legal
1:46 mins
 
Lesson 10:Foreign Discovery
1:36 mins
 
Lesson 11:Laws and Guidelines Seem to be U.S. Based
1:21 mins
 
Section 4:Solutions and Recommendations
 
Lesson 12:What and What Not to Archive and for How Long
2:47 mins
 
Lesson 13:Privacy Concerns from Employees
2:56 mins
 
Lesson 14:Too Many IT Security Related Policies
1:31 mins
 
Lesson 15:Communication Gap Between IT and Legal
1:50 mins
 
Lesson 16:Foreign Discovery
1:53 mins
 
Lesson 17:Laws and Guidelines Seem to be U.S. Based
3:04 mins