Methodology for Testing Forensic Hypothesis and Finding Truth

You are here:

Jessica Hyde

Speaker: Jessica Hyde ,
Designation: Director of Forensics, Magnet Forensics, Adjunct Professor, George Mason University
Topic: Methodology for Testing Forensic Hypothesis and Finding Truth
Date of Webinar: 17th February, 2021
Time and Location: 11:00 AM EST / 9:30 PM IST / 4:00 PM GMT

Watch Now

Speaker Bio:

Jessica Hyde is an experienced forensic examiner in both the commercial and government sectors. She is currently the Director of Forensics at Magnet Forensics and an Adjunct Professor teaching Mobile Forensics in the graduate program at George Mason University, where she achieved an MS in Computer Forensics. Jessica is the host of Cache Up, a weekly podcast where she interviews digital forensics practitioners. She is also involved in several community efforts including as Chair of DFIR Review, 1st Vice President of the New York Metro High Tech Crime International Association Chapter, advisory board for Cyber Sleuths Lab, and a member of the Editorial Board for the Forensic Science International: Digital Investigations Journal. Her previous roles included performing forensic examinations as a Sr. Mobile Exploitation Analyst for Basis Technology, Senior at EY, and Senior Electrical Engineer at American Systems. Jessica is also proud to be a veteran of the United States Marine Corps.

Topic Abstract:

Why test? When examiners have questions, the answers are often found through testing. Where do you start? How do you test? What about documentation? How do you share your findings with the community? Jessica will share the lessons she’s learned and the best practices and methodology she’s developed to properly, efficiently, and effectively research and test artifacts.

Key takeaways:

  • Understanding when you should perform testing as part of digital forensic analysis.
  • Knowing a concrete methodology for testing digital forensic artifacts, namely, Discover, Test, Find, Parse, Script, and Share.
  • How to locate data of interest from a particular application or process.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
You may also like

Train with EC-Council

Cyber Talks
Recent Posts