± Forensic Focus Partners

± Your Account



Site Members:

New Today: 0 Overall: 33166
New Yesterday: 0 Visitors: 234

± Follow Forensic Focus

Forensic Focus Facebook Page Forensic Focus on Twitter Forensic Focus LinkedIn Group Forensic Focus YouTube Channel

RSS feeds: News Forums Articles

± Latest Articles

± Latest Webinars

Interviews

Interviews

2008


2008

David Sullivan, Appointments-UK

Thursday February 16, 2012 (23:38:44)   (1326 Reads)
David Sullivan
Can you tell us something about your background? How did Appointments-UK come into being?

I’ve enjoyed over twelve years in recruitment, starting out in the city [London] specialising in IT within Investment Banking.

The area that really interested me was Information Security, and after a successful period in this sector, I further refined my focus into computer forensics. Then, in 2003, I decided to take the plunge and set up Appointments-UK.

My reasons were simple and remain the underlying vision for my company today: when contacting a recruiter you want them to demonstrate good market knowledge and a genuine understanding of the companies, personalities, trends, conditions and pressures that impact your sector. At Appointments-UK all our people offer this.   more ...

2008

Stefan Fleischmann, CEO X-Ways Software Technology AG

Thursday February 16, 2012 (23:33:28)   (2949 Reads)
Stefan Fleischmann
Stefan, can you tell us something about your background? Why did you decide to concentrate on the forensic aspects of WinHex and develop X-Ways Forensics?

Originally I started programming WinHex because I needed a hex editor and disk editor myself and at that time there was none for Windows 3.1. I used it for example to get Windows to read MIDI files that my synthesizer saved on floppy disks. Later I released WinHex as shareware, and people started using it for a variety of purposes (there are countless things you can do with a hex editor in very specific situations). I continued developing WinHex in my spare time while studying information systems. Eventually people in computer forensics used it when their main forensics package would not work, such as for manual data recovery if the file system was too heavily corrupted or because the amount of pictures present on a disk rendered their software too slow, or for specific tasks like extracting slack space, etc.   more ...

2007


2007

John Patzakis, Vice Chairman and Chief Legal Officer, Guidance Software

Thursday February 16, 2012 (23:24:04)   (1835 Reads)
John Patzakis
Can you tell us something about your background before joining Guidance Software? Why did you decide to focus on technology law?

After law school I practiced commercial litigation for about 8 years before joining Guidance Software in 1999. During my pre-1999 litigation days, when we conducted paper-based discovery or oversaw internal investigations for a client, I always wondered about the information on the workstations and email servers. Why wasn't there a good process to recover that data? Where was the law that governed all the various issues concerning computer-based evidence? It was a relatively uncharted area of the law that presented an exciting challenge. So when the opportunity to work with Guidance arose, it was an easy decision.


Broadly speaking, how knowledgeable is the legal profession with regard to computer forensics?

I think this is a very important question because we've seen a dramatic shift in the past two to three years.   more ...

2007

Harlan Carvey

Thursday February 16, 2012 (23:18:29)   (1848 Reads)
How did you get started in computer forensics, was there something in particular which appealed to you about investigating computer misuse?

When I first got started in computer security, I quickly noticed the number of people who were Linux or Unix gurus. The next thing I noticed was that there was an inability (or lack of desire) to transition to the Windows world. What I find most appealing about investigating computer misuse is that a great deal of it occurs on Windows systems, which is the platform that I've focused on, almost since the beginning.

Computer crimes require a good deal of technical knowledge in order for the examiner to thoroughly investigate them. However, this is not all that is required. The examiner must also have the ability to communicate his findings to the client, who may not be as technically proficient. And there is more to the picture than simply locating an artifact or two during an examination. The investigator must be able to correlate multiple artifacts, as the information can move from convicting to exonerating the individual.   more ...



Build a Mobile Site
View Site in Mobile | Classic
Share by: