Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. However, business communication is being carried out on mobile devices. The risk of data leakage is greater than ever from conversations carried out on mobile devices using apps that may not be synced to company cloud resources. This presentation will cover key aspects of responding to and analyzing mobile device data in a corporate environment.
Learning Objectives:
- Understand the current ecosystem and how mobile devices are utilized in corporate environments.
- Understand the challenges organizations face in responding to events that include mobile device data.
- Identify key artifacts related to many investigations, and how that information can be utilized to assess risk and scope.
- Address the concerns between security and response capabilities concerning mobile device data.