Exploring the Intersection of Digital Forensics and Identity Management 

You are here:
Date: June 26, 2024
Time: 7:00 PM IST | 8:30 AM CDT | 2:30 PM BST
Topic: Exploring the Intersection of Digital Forensics and Identity Management


Abstract: With the rise in the sophistication of cyberattacks, it has become imperative for cybersecurity experts to develop novel and interdisciplinary approaches to mitigation strategies. One such approach is the integration of digital forensics and identity management, which enhances forensic capabilities by incorporating identity-driven elements. Identity management systems provide a database for digital forensics to identify sources and develop reasonable proof of identity toward determining persistent threats and threat actors. This webinar explains the interplay between these two disciplines and explores how evidence collection and identity management processes are interdependent. It further highlights the challenges and elements associated with each domain, such as data integrity, chain of custody, the evolving nature of threats, authentication, and identity and access management.

Key Takeaways: 

  • Introduction to digital forensics and identity management
  • Challenges associated with each discipline
  • Blockchain as a potential cybersecurity solution
  • Leveraging digital forensics to bolster identity management
  • The role of identity management in addressing digital forensics challenges
  • Integrating digital forensics into identity and access management frameworks

Tejas ShroffTejas Shroff, Senior Director of Managed Security Services, NTT DATA Services
Bio:Tejas is currently the Senior Director of Managed Security Services at NTT DATA, managing the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. He is a board member of FBI-affiliated non-profit InfraGard National, serves on the advisory board for Collin College’s cyber security program, and mentors the UTD Cybersecurity Club.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
You may also like

Train with EC-Council

Cyber Talks
Recent Posts