This presentation was made in the Woodlands, Texas on August 21, 2019 before a local group of certified computer forensic examiners.
Electronic Discovery
- Forensic Analysis of Servers, Desktop and Laptop PC's
- Forensic Analysis of Windows, Mac OS X and Linux Filesystems
- Forensic Analysis of Cloud-based Applications and Data
- Litigation Hold Notices
- Requests for Production of Electronically Stored Information
- Interrogatories Related to Electronically Stored Information
- Sanctions for the Spoliation of Electronically Stored Information
This is a presentation about computer forensics expert witnesses, and what you should look for in one. This presentation was made on May 9, 2017 as part of a web video recording at the State Bar of Texas studios.
Presented at a webinar for the Information Systems Security Association (ISSA) on November 17, 2015. There was a panel of three individuals who covered how to detect a hacker, how to find the hacker, and then what to do about it. My focus was on the latter of the three, and in particular what evidence do you need to collect in order to make a case against the hacker.
Presented to the Gulf Coast Chapter of the High Technology Crime Investigation Association on November 21, 2014 in Houston, Texas.
Presented to the "Introduction to Computer Forensics" class at the University of Houston on February 15, 2014. The focus of this presentation was to inform students (future forensic examiners) as to what attorneys were looking for in a forensics expert, and to inform the students of the legal rules of evidence and how those rules would affect their investigations.
This presentation was made before the Statewide Attorneys General Conference in San Antonio, Texas on July 20, 2007.