Mobile Device Forensics: Challenges and Solutions  

You are here:

Date: April 23, 2024
Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST
Topic: Mobile Device Forensics: Challenges and Solutions
Register

Abstract: As mobile technology continues to improve and deepen connectivity across the globe, the importance of mobile security has become more prominent. With mobile devices evolving into high capability devices for data processing and application hosting, they have become prime targets for malicious actors seeking to exploit vulnerabilities on a massive scale. Consequently, the rising tide of attacks on mobile devices underscores the urgent need for bolstered security measures and enhanced forensic capabilities to effectively handle incident response and disaster recovery.

Mobile device forensics poses various challenges, ranging from complex technological intricacies to thorny legal and ethical dilemmas. This webinar aims to demystify mobile device forensics, delving into challenges and exploring potential solutions. Further, it will highlight the technical challenges that impede forensic investigations, including data extraction and legal obligations, and provide strategies for overcoming them.

Key takeaways:

  • Introduction to mobile device forensics
  • Challenges associated with mobile forensics
  • Impact of emerging technologies and threat on mobile forensics
  • Mitigating emerging challenges in forensics
  • Skills and tools necessary to overcome forensics challenges

Speaker:
Mike SaylorDr. Mike Saylor, CEO at Blackswan Cybersecurity and Lecturer at the University

Bio: Dr. Mike Saylor is a 30-year IT/Cyber veteran and has spent 24 years serving as a University Professor of Cyber and Digital Forensics & Incident Response (DFIR). He has 20 years of experience in providing digital forensics expertise and services to law enforcement, litigation support, and expert testimony. Dr. Saylor is a member of the FBI InfraGard, the U.S. Secret Service Electronic Crimes Taskforce, and the North Texas Crime Commission. He serves as a Fusion Liaison officer for the North Texas Fusion Center. Further, he has co-authored the renowned book “Cyber Crime and Cyber Terrorism.”

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
You may also like

Train with EC-Council

Cyber Talks
Recent Posts