Network Forensics: The Final Frontier (Until the Next One)
- Philip Hagen
- Tuesday, February 24th, 7:15pm - 8:15pm
Traditionally, computer forensic investigations focused on data from static data. Recently, memory analysis has become an integral part of forensic analysis. Now, data from network devices and the wires themselves is becoming necessary to complete our understanding of an event. By knowing what existing data to ask for and what additional data to collect, we can provide a more comprehensive analysis of an event.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
|General Session - Welcome to SANS||Rob Lee||Monday, February 23rd, 8:15am - 8:45am||Special Events|
|DFIReception - Forensicators Unite!||—||Monday, February 23rd, 6:00pm - 7:00pm||Reception|
|Rapid Response and Data Collection -- Triaging for The Real World||Rob Lee||Monday, February 23rd, 7:15pm - 9:15pm||Keynote|
|Network Forensics: The Final Frontier (Until the Next One)||Philip Hagen||Tuesday, February 24th, 7:15pm - 8:15pm||SANS@Night|
|When Macs Get Hacked||Sarah Edwards||Tuesday, February 24th, 8:15pm - 9:15pm||SANS@Night|
|Women in Technology Meet and Greet||—||Wednesday, February 25th, 6:00pm - 7:00pm||Reception|
|Preparing for PowerShellmageddon â Investigating Windows Command Line Activity||Chad Tilbury||Wednesday, February 25th, 7:15pm - 8:15pm||SANS@Night|
|Power-up Your Malware Analysis with Forensics||Anuj Soni||Wednesday, February 25th, 8:15pm - 9:15pm||SANS@Night|