SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
eDISCOVERY AND FORENSICS 
Steve Watson 
Intel Corporation
DISCLAIMER 
The opinions expressed and materials shared in this presentation 
are my own and may not reflect the opinions, policies, nor 
procedures of my employer. 
2
BACKGROUND 
 Current industry practitioner with 7 years of experience 
related to these topics. 
 PhD research student of Digital Forensics focused on new 
and emerging technologies. 
3
ODCA WHITEPAPER 
 Session will review 
some key concepts of 
the whitepaper. 
 Explore some specific 
challenges with an 
industry practitioner. 
 Q/A of how we might 
address the challenges. 
4
WHY ARE WE TALKING ABOUT THIS? 
 eDiscovery and forensics affects all of our companies – 
subscribers and providers. 
 Industry, academia and regulators are struggling with these 
challenges. 
 New ideas in this space will be needed to solve the challenges. 
5
DEFINITION OF TERMS 
 eDiscovery 
• aka electronic discovery, 
e-disclosure, and 
electronic disclosure 
• ESI – electronically stored 
information (data) 
6 
 Forensics 
• forensic science 
• digital forensics 
• investigations 
• digital evidence (data) 
It’s all 
about the 
data!
EDISCOVERY 
 What is “Discovery”? 
 When does “eDiscovery” occur? 
 What do I need to know as a cloud provider or subscriber? 
7
SUBPROCESSES TO HIGHLIGHT 
 Preservation and Collection sub-process 
• Keep the data from going away (preservation). 
• Collect a copy of the data to provide for the matter (collection). 
 Search and Review sub-process 
• Narrowing the data down to the data relevant to the legal matter. 
• Legal directed activity. 
• Even if completed by technical individuals (subscriber or provider), this 
is directed by legal teams. 
8
EDBP MODEL 
9 
Electronic Discovery Best Practice work flow model
10
WHAT ABOUT FORENSICS? 
 There may be data about the incident unavailable to the 
cloud subscriber. 
 The cloud provider may need to assist in accessing and 
collecting the data relevant to user or administrative activity. 
11
INVESTIGATIONS REQUIRING FORENSICS 
Subscriber: 
Accessible data limited to 
what provider has granted 
access to. 
1. Subset of full data 
related to subscriber 
account. 
12 
2. User created data. 
3. User activity data 
(limited). 
4. User social media data. 
5. Limited access to 
preserve or collect. 
Provider: 
All of the subscriber 
accessible data. 
Plus… 
1. Subscriber account 
information. 
2. Full user created 
data. 
3. Administrative data. 
4. Provider access 
data. 
5. Malware activity.
BIGGEST CHALLENGE 
 The gap between data accessible to the subscriber and data 
accessible to the provider is the biggest challenge for 
investigations. 
How do we close the gap without revealing provider’s intellectual 
property, other subscribers or compromising their security and 
networks? 
13
TAKEAWAYS 
 It’s not if, it’s when. 
 Remember the preservation piece of eDiscovery. 
 Contractual agreement between provider and subscriber. 
 How do we close the gap for forensic investigations? 
14
15
16 
© 2 0 1 4 O p e n D a t a C e n t e r A l l i a n c e , I n c . A L L R I G H T S R E S E R V E D .
ADDITIONAL RESOURCES 
 Draft NIST IR 8006, “NIST Cloud Computing Forensic Science 
Challenges” 
 The Sedona Conference, Commentary on Cloud Computing 
(DRAFT) 
17
ATTRIBUTION: 
Slide 9. EDBP model image courtesy Ralph Losey, www.edbp.com. 
Slide 10. EDRM model image provided by EDRM.net. 
18

Más contenido relacionado

La actualidad más candente

OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015Marcel Hoffmann
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Bryan Beecher
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power SystemsNathan Wallace, PhD, PE
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
 
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...NUS-ISS
 

La actualidad más candente (20)

OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
PETRAS - Internet of Things Research Hub
PETRAS - Internet of Things Research HubPETRAS - Internet of Things Research Hub
PETRAS - Internet of Things Research Hub
 
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
IoT_Structure
IoT_StructureIoT_Structure
IoT_Structure
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
 

Destacado

Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?trentlivingston
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5scm24
 
E Discovery Cloud
E Discovery CloudE Discovery Cloud
E Discovery Cloudgjohansen
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 
A Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document ReviewA Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document ReviewLexbe_Webinars
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 

Destacado (8)

Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
E discovery 2-cloud_v5
E discovery 2-cloud_v5E discovery 2-cloud_v5
E discovery 2-cloud_v5
 
E Discovery Cloud
E Discovery CloudE Discovery Cloud
E Discovery Cloud
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
A Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document ReviewA Litigator's Guide to Cloud-Based eDiscovery and Document Review
A Litigator's Guide to Cloud-Based eDiscovery and Document Review
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 

Similar a Forecast 2014: eDiscovery and Forensics

IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxNoreen Whysel
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems OverviewRuss Holmes
 
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012Bg linkedin bigdata_martinschultz_symposium_yale_oct2012
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012Bhaskar Ghosh
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxjennifer822
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of ThingsPaul Hastings
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeElasticsearch
 
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)Mark Underwood
 
Data science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonData science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonDavid Stephenson, Ph.D.
 
Ch1IntroductiontoDataScience.pptx
Ch1IntroductiontoDataScience.pptxCh1IntroductiontoDataScience.pptx
Ch1IntroductiontoDataScience.pptxAbderrahmanABID2
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersJeff Kayser
 
Data Science- Basics.pptx
Data Science- Basics.pptxData Science- Basics.pptx
Data Science- Basics.pptxRupaliKute3
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data ThingsKatina Toufexis
 
Eating the elephant
Eating the elephantEating the elephant
Eating the elephantRamece Cave
 
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc
 

Similar a Forecast 2014: eDiscovery and Forensics (20)

IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
eDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law FirmeDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law Firm
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems Overview
 
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012Bg linkedin bigdata_martinschultz_symposium_yale_oct2012
Bg linkedin bigdata_martinschultz_symposium_yale_oct2012
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docx
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
 
Data science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizonData science and pending EU privacy laws - a storm on the horizon
Data science and pending EU privacy laws - a storm on the horizon
 
Ch1IntroductiontoDataScience.pptx
Ch1IntroductiontoDataScience.pptxCh1IntroductiontoDataScience.pptx
Ch1IntroductiontoDataScience.pptx
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from Hackers
 
Data Science- Basics.pptx
Data Science- Basics.pptxData Science- Basics.pptx
Data Science- Basics.pptx
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
Eating the elephant
Eating the elephantEating the elephant
Eating the elephant
 
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data Graveyards
 

Más de Open Data Center Alliance

Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Cloud & Enterprise IT. Hybrid IT, Coexistence StrategiesCloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Cloud & Enterprise IT. Hybrid IT, Coexistence StrategiesOpen Data Center Alliance
 
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance
 
ODCA Board Best Practice: High Performance Computing at BMW
ODCA Board Best Practice: High Performance Computing at BMWODCA Board Best Practice: High Performance Computing at BMW
ODCA Board Best Practice: High Performance Computing at BMWOpen Data Center Alliance
 
Forecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: Making Better Business Decisions with Big Data and IoTForecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: Making Better Business Decisions with Big Data and IoTOpen Data Center Alliance
 
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash InnovationForecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash InnovationOpen Data Center Alliance
 
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: Why Open Platforms Matter to Enterprises and DevelopersForecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: Why Open Platforms Matter to Enterprises and DevelopersOpen Data Center Alliance
 
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Open Data Center Alliance
 
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...Open Data Center Alliance
 
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: Maximizing Your Cloud Service Quality and Costs Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: Maximizing Your Cloud Service Quality and Costs Open Data Center Alliance
 
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!Open Data Center Alliance
 
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New? Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New? Open Data Center Alliance
 
Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: Infrastructure as a Service (IaaS)Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: Infrastructure as a Service (IaaS)Open Data Center Alliance
 
Forecast 2014: Business Strategy Enabled by Cloud
Forecast 2014:  Business Strategy Enabled by Cloud Forecast 2014:  Business Strategy Enabled by Cloud
Forecast 2014: Business Strategy Enabled by Cloud Open Data Center Alliance
 
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...Open Data Center Alliance
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Open Data Center Alliance
 

Más de Open Data Center Alliance (20)

ODCA DevOps: Magnifying Business Value
ODCA DevOps: Magnifying Business ValueODCA DevOps: Magnifying Business Value
ODCA DevOps: Magnifying Business Value
 
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Cloud & Enterprise IT. Hybrid IT, Coexistence StrategiesCloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
 
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud AdoptionOpen Data Center Alliance 2014 Member Survey on Cloud Adoption
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
 
ODCA Board Best Practice: High Performance Computing at BMW
ODCA Board Best Practice: High Performance Computing at BMWODCA Board Best Practice: High Performance Computing at BMW
ODCA Board Best Practice: High Performance Computing at BMW
 
Forecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: Making Better Business Decisions with Big Data and IoTForecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: Making Better Business Decisions with Big Data and IoT
 
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash InnovationForecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
 
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: Why Open Platforms Matter to Enterprises and DevelopersForecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
 
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0
 
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
 
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: Maximizing Your Cloud Service Quality and Costs Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
 
Forecast 2014: TOSCA Proof of Concept
Forecast 2014: TOSCA Proof of ConceptForecast 2014: TOSCA Proof of Concept
Forecast 2014: TOSCA Proof of Concept
 
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
 
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New? Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New?
 
Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications Forecast 2014: Cloud-Aware Applications
Forecast 2014: Cloud-Aware Applications
 
Forecast 2014: Cloud Service Brokering
Forecast 2014: Cloud Service BrokeringForecast 2014: Cloud Service Brokering
Forecast 2014: Cloud Service Brokering
 
Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: Infrastructure as a Service (IaaS)Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: Infrastructure as a Service (IaaS)
 
Forecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data ExchangeForecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data Exchange
 
Forecast 2014: Business Strategy Enabled by Cloud
Forecast 2014:  Business Strategy Enabled by Cloud Forecast 2014:  Business Strategy Enabled by Cloud
Forecast 2014: Business Strategy Enabled by Cloud
 
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
 

Último

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Forecast 2014: eDiscovery and Forensics

  • 1. eDISCOVERY AND FORENSICS Steve Watson Intel Corporation
  • 2. DISCLAIMER The opinions expressed and materials shared in this presentation are my own and may not reflect the opinions, policies, nor procedures of my employer. 2
  • 3. BACKGROUND  Current industry practitioner with 7 years of experience related to these topics.  PhD research student of Digital Forensics focused on new and emerging technologies. 3
  • 4. ODCA WHITEPAPER  Session will review some key concepts of the whitepaper.  Explore some specific challenges with an industry practitioner.  Q/A of how we might address the challenges. 4
  • 5. WHY ARE WE TALKING ABOUT THIS?  eDiscovery and forensics affects all of our companies – subscribers and providers.  Industry, academia and regulators are struggling with these challenges.  New ideas in this space will be needed to solve the challenges. 5
  • 6. DEFINITION OF TERMS  eDiscovery • aka electronic discovery, e-disclosure, and electronic disclosure • ESI – electronically stored information (data) 6  Forensics • forensic science • digital forensics • investigations • digital evidence (data) It’s all about the data!
  • 7. EDISCOVERY  What is “Discovery”?  When does “eDiscovery” occur?  What do I need to know as a cloud provider or subscriber? 7
  • 8. SUBPROCESSES TO HIGHLIGHT  Preservation and Collection sub-process • Keep the data from going away (preservation). • Collect a copy of the data to provide for the matter (collection).  Search and Review sub-process • Narrowing the data down to the data relevant to the legal matter. • Legal directed activity. • Even if completed by technical individuals (subscriber or provider), this is directed by legal teams. 8
  • 9. EDBP MODEL 9 Electronic Discovery Best Practice work flow model
  • 10. 10
  • 11. WHAT ABOUT FORENSICS?  There may be data about the incident unavailable to the cloud subscriber.  The cloud provider may need to assist in accessing and collecting the data relevant to user or administrative activity. 11
  • 12. INVESTIGATIONS REQUIRING FORENSICS Subscriber: Accessible data limited to what provider has granted access to. 1. Subset of full data related to subscriber account. 12 2. User created data. 3. User activity data (limited). 4. User social media data. 5. Limited access to preserve or collect. Provider: All of the subscriber accessible data. Plus… 1. Subscriber account information. 2. Full user created data. 3. Administrative data. 4. Provider access data. 5. Malware activity.
  • 13. BIGGEST CHALLENGE  The gap between data accessible to the subscriber and data accessible to the provider is the biggest challenge for investigations. How do we close the gap without revealing provider’s intellectual property, other subscribers or compromising their security and networks? 13
  • 14. TAKEAWAYS  It’s not if, it’s when.  Remember the preservation piece of eDiscovery.  Contractual agreement between provider and subscriber.  How do we close the gap for forensic investigations? 14
  • 15. 15
  • 16. 16 © 2 0 1 4 O p e n D a t a C e n t e r A l l i a n c e , I n c . A L L R I G H T S R E S E R V E D .
  • 17. ADDITIONAL RESOURCES  Draft NIST IR 8006, “NIST Cloud Computing Forensic Science Challenges”  The Sedona Conference, Commentary on Cloud Computing (DRAFT) 17
  • 18. ATTRIBUTION: Slide 9. EDBP model image courtesy Ralph Losey, www.edbp.com. Slide 10. EDRM model image provided by EDRM.net. 18