Digital Forensics, eDiscovery,
& other Technology Risks for
       the HR Executive

           The Lorenzi Group
p@SSw0rDz
                             Facebook

                              LinkedIn

                            Match.com



• Less is More, hire a professional
This line of questioning could open discrimination issues
Concepts of Security are
         Changing
• The only thing you should be secure about is that
  nothing is secure



• Organized Crime
• Random

• Employees
• Hacktivists
Greatest Risk to
            Business?
• Employees, Contractors, Vendors & Partners



• Inside vs. Outside

• Don’t stop protecting outside…..
Virtual Machines & Child
           Porn
• The virtual world is going virtual
• CP (or CSAI – See-S-eye) is an addiction
• Pirated media a (profitable) hobby
• High bandwidth, “ghost” (vmware)


          The only thing you need to know:
                   Liability is HUGE.
Digital Forensics &
          eDiscovery

• 2 Step Process
  • Capturing and preserving everything
  • Preparing the “Useful” information
SMILE!
                       Digital Forensics
Digital Forensics                         Using a 35mm Camera
Create a Forensic Image (Preserve Data)   Take a Picture
Restore the Forensic Image                Develop the Film
Analyze the Information                   Choose the Pictures you want
Report (and Testify) as necessary         Build a Scrapbook
E-Z eDiscovery

1. Convert paper to electronic images

2. Combine images with Digital Forensics results

3. Filter out Unnecessary Info

4. Review Results

5. Submit
SPOLIATION
• The alteration and/or destruction of data



• Examples:
  •   Resending an email
  •   Opening a Word document
  •   Deleting a picture
  •   Turning on a computer
Litigation Hold
                          Legal Notice



 Starts the moment litigation becomes reasonably possible



      Requires parties to preserve all potential evidence



Failure to abide could bring sanctions, fines, dismissal of case, &
                        criminal charges
The IT Department –
  Your BEST Friend… and WORST Enemy

• Digital Forensics is all about 3 things:
  • Process
  • Experience
  • Defensibility



• CAN IT do some/all of it? Maybe.

• SHOULD IT do some/all of it? NO.
Any time…
  You think internal is better/cheaper/faster…




• Remember:
 • Legal, Financial, & Criminal Liability
 • IT fear of public speaking
 • Interpersonal relationships…… (ask about this)
Employee Monitoring
•   It’s not Big Brother, it’s SMART Business


•   Improves Data Security Exponentially
    •       Mistakes
    •       Desperate
    •       Criminal


•   Makes Compliance Easier


•   Can provide Productivity metrics
    •       Termination Justification
    •       Training Needs
    •       Resource Allocation
    •       Cost Saving Opportunities




Examples:


Lockheed, Fidelity, USPS, Kaiser Permanente
BYOD
• Stored Communications Act



• Employee Owned/Company Paid



• Company Owned
EADV


Electronic Devices and Social Media Misuse

         Major initiative for 2012
ADA
• EU says websurfing is an addiction



• What does the US say?



• REALLY????
Thoughts
            Social Media is good

     Acceptable Use Policies are required

Detailed Background Checks are better than FB
                   pages

  Ongoing Training & Reminders are critical
Thank You

     Rob Fitzgerald

   The Lorenzi Group

   866-632-9880 x123

www.thelorenzigroup.com

More Related Content

PPTX
Sec and ethics presentation
PPTX
Introduction to World Wide Web
PDF
Airport IT&T 2013 John McCarthy
PPTX
How to be a Tech-Smart Parent
PPTX
Responsible Use
PPT
Tech smart preschool parent 2 13
PPTX
How to Get a Job in Cyber Security 2018
PPTX
Social Engineering
Sec and ethics presentation
Introduction to World Wide Web
Airport IT&T 2013 John McCarthy
How to be a Tech-Smart Parent
Responsible Use
Tech smart preschool parent 2 13
How to Get a Job in Cyber Security 2018
Social Engineering

What's hot (20)

PPTX
Digital Forensics: Yesterday, Today, and the Next Frontier
PPTX
Ethics for IT Workers and IT Users
PDF
Effective Cyber Security: Successful Approaches and Experiences
PPTX
Chapter 3
PPT
11 27 07 Ezor Attorney E Mail Ethics Presentation
PPT
4.1.1 areas of computer ethics
PDF
What is Social Engineering? An illustrated presentation.
PDF
Social Engineering - Strategy, Tactics, & Case Studies
PPTX
Cyber security awareness
PDF
LinkedIn to Your Network - The Social Engineering Threat
PPTX
The Art of Human Hacking : Social Engineering
PPTX
Social engineering The Good and Bad
PPTX
Computer ethics and crime
PPTX
BYOD: Beating IT's Kobayashi Maru
PDF
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
PPTX
Social engineering
PDF
Crowdsourcing & ethics: a few thoughts and refences.
PDF
Social Engineering 2.0
PPTX
Chapter 4 2016
PPTX
Current enterprise information security measures continue to fail us. Why is ...
Digital Forensics: Yesterday, Today, and the Next Frontier
Ethics for IT Workers and IT Users
Effective Cyber Security: Successful Approaches and Experiences
Chapter 3
11 27 07 Ezor Attorney E Mail Ethics Presentation
4.1.1 areas of computer ethics
What is Social Engineering? An illustrated presentation.
Social Engineering - Strategy, Tactics, & Case Studies
Cyber security awareness
LinkedIn to Your Network - The Social Engineering Threat
The Art of Human Hacking : Social Engineering
Social engineering The Good and Bad
Computer ethics and crime
BYOD: Beating IT's Kobayashi Maru
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Social engineering
Crowdsourcing & ethics: a few thoughts and refences.
Social Engineering 2.0
Chapter 4 2016
Current enterprise information security measures continue to fail us. Why is ...
Ad

Similar to Digital Forensics, eDiscovery & Technology Risks for HR Executives (20)

PDF
Fighting Fraud With Digital Forensics
ODP
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
ODP
IT Security through governance, compliance and risk
PPTX
Electronic Data Discovery
PDF
Governance, legal compliance and risk across the online economy
PPTX
Digital Forensics & eDiscovery for the Financial Executive
PPTX
Effective Internal Investigations
PPTX
Digital evidence and the information security manager
PPT
164199724-Introduction-To-Digital-Forensics-ppt.ppt
PPTX
Occupational Fraud and Electronic Evidence Investigations
PDF
Information Security for Small Business
PDF
Information Security for Small Business
PDF
Personally owned devices at work
PPT
Chap 8
 
PPT
Book 3 chap-8
 
PDF
Internal Investigations
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PDF
Forensic data investigations in China
PPTX
Iamers presentation-2
PPTX
So, You Want To Work In Digital Forensics....
Fighting Fraud With Digital Forensics
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IT Security through governance, compliance and risk
Electronic Data Discovery
Governance, legal compliance and risk across the online economy
Digital Forensics & eDiscovery for the Financial Executive
Effective Internal Investigations
Digital evidence and the information security manager
164199724-Introduction-To-Digital-Forensics-ppt.ppt
Occupational Fraud and Electronic Evidence Investigations
Information Security for Small Business
Information Security for Small Business
Personally owned devices at work
Chap 8
 
Book 3 chap-8
 
Internal Investigations
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Forensic data investigations in China
Iamers presentation-2
So, You Want To Work In Digital Forensics....
Ad

More from The Lorenzi Group (18)

PPTX
Data Breach from the Inside Out
PPTX
ROAR in Real Like: Heartbeat Helper
PPTX
ROAR for IT Managers
PPTX
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
PPTX
The Many Faces of SHIELD
PPT
ROAR Provides Peace of Mind in Digital Enviroments
PPTX
ROARing Compliance
PPTX
ROAR in Real Life: Picture Perfect
PPTX
ROAR in Pictures: Biking
PPTX
DDoS Explained
PPTX
Digital Forensics: The Employees' Dilemma
PPTX
Rising Cost of Child Porn Defense
PPTX
Security Analytics for Certified Fraud Examiners
PPTX
eDiscovery IS Data Security
ODP
Active Network Monitoring brings Peace of Mind
PPTX
Introduction to the Epsilon Data Breach
PPT
Sex, Crime, & Online Slime
PPTX
Productivity 3.0
Data Breach from the Inside Out
ROAR in Real Like: Heartbeat Helper
ROAR for IT Managers
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
The Many Faces of SHIELD
ROAR Provides Peace of Mind in Digital Enviroments
ROARing Compliance
ROAR in Real Life: Picture Perfect
ROAR in Pictures: Biking
DDoS Explained
Digital Forensics: The Employees' Dilemma
Rising Cost of Child Porn Defense
Security Analytics for Certified Fraud Examiners
eDiscovery IS Data Security
Active Network Monitoring brings Peace of Mind
Introduction to the Epsilon Data Breach
Sex, Crime, & Online Slime
Productivity 3.0

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
What is a Computer? Input Devices /output devices
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Five Habits of High-Impact Board Members
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Modernising the Digital Integration Hub
PDF
Unlock new opportunities with location data.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A review of recent deep learning applications in wood surface defect identifi...
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Assigned Numbers - 2025 - Bluetooth® Document
What is a Computer? Input Devices /output devices
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
NewMind AI Weekly Chronicles – August ’25 Week III
Web Crawler for Trend Tracking Gen Z Insights.pptx
Five Habits of High-Impact Board Members
Benefits of Physical activity for teenagers.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
O2C Customer Invoices to Receipt V15A.pptx
Modernising the Digital Integration Hub
Unlock new opportunities with location data.pdf
Getting started with AI Agents and Multi-Agent Systems
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
STKI Israel Market Study 2025 version august
A contest of sentiment analysis: k-nearest neighbor versus neural network
A review of recent deep learning applications in wood surface defect identifi...

Digital Forensics, eDiscovery & Technology Risks for HR Executives

  • 1. Digital Forensics, eDiscovery, & other Technology Risks for the HR Executive The Lorenzi Group
  • 2. p@SSw0rDz Facebook LinkedIn Match.com • Less is More, hire a professional This line of questioning could open discrimination issues
  • 3. Concepts of Security are Changing • The only thing you should be secure about is that nothing is secure • Organized Crime • Random • Employees • Hacktivists
  • 4. Greatest Risk to Business? • Employees, Contractors, Vendors & Partners • Inside vs. Outside • Don’t stop protecting outside…..
  • 5. Virtual Machines & Child Porn • The virtual world is going virtual • CP (or CSAI – See-S-eye) is an addiction • Pirated media a (profitable) hobby • High bandwidth, “ghost” (vmware) The only thing you need to know: Liability is HUGE.
  • 6. Digital Forensics & eDiscovery • 2 Step Process • Capturing and preserving everything • Preparing the “Useful” information
  • 7. SMILE! Digital Forensics Digital Forensics Using a 35mm Camera Create a Forensic Image (Preserve Data) Take a Picture Restore the Forensic Image Develop the Film Analyze the Information Choose the Pictures you want Report (and Testify) as necessary Build a Scrapbook
  • 8. E-Z eDiscovery 1. Convert paper to electronic images 2. Combine images with Digital Forensics results 3. Filter out Unnecessary Info 4. Review Results 5. Submit
  • 9. SPOLIATION • The alteration and/or destruction of data • Examples: • Resending an email • Opening a Word document • Deleting a picture • Turning on a computer
  • 10. Litigation Hold Legal Notice Starts the moment litigation becomes reasonably possible Requires parties to preserve all potential evidence Failure to abide could bring sanctions, fines, dismissal of case, & criminal charges
  • 11. The IT Department – Your BEST Friend… and WORST Enemy • Digital Forensics is all about 3 things: • Process • Experience • Defensibility • CAN IT do some/all of it? Maybe. • SHOULD IT do some/all of it? NO.
  • 12. Any time… You think internal is better/cheaper/faster… • Remember: • Legal, Financial, & Criminal Liability • IT fear of public speaking • Interpersonal relationships…… (ask about this)
  • 13. Employee Monitoring • It’s not Big Brother, it’s SMART Business • Improves Data Security Exponentially • Mistakes • Desperate • Criminal • Makes Compliance Easier • Can provide Productivity metrics • Termination Justification • Training Needs • Resource Allocation • Cost Saving Opportunities Examples: Lockheed, Fidelity, USPS, Kaiser Permanente
  • 14. BYOD • Stored Communications Act • Employee Owned/Company Paid • Company Owned
  • 15. EADV Electronic Devices and Social Media Misuse Major initiative for 2012
  • 16. ADA • EU says websurfing is an addiction • What does the US say? • REALLY????
  • 17. Thoughts Social Media is good Acceptable Use Policies are required Detailed Background Checks are better than FB pages Ongoing Training & Reminders are critical
  • 18. Thank You Rob Fitzgerald The Lorenzi Group 866-632-9880 x123 www.thelorenzigroup.com