A frequent presenter, Sarah has spoken at industry conferences including Shmoocon, Enfuse (formerly known as CEIC), DEF CON, BSides New Orleans, BSides Las Vegas, and the SANS DFIR Summit. She has a bachelor's degree in information technology from the Rochester Institute of Technology and a master's in information assurance from Capitol College.
Beyond her deep interest in digital forensics and anything Mac, Sarah loves cooking, reading tech books, traveling anywhere, and "making things work". "Apple devices will continue to grow in popularity, and digital forensic investigators and analysts must start paying more attention to them," Sarah explains. "Windows analysis is the base education in the field of digital forensics, and any additional skills you can acquire set you apart from the crowd, whether it is Mac, mobile, memory, or malware analysis."
Sarah has worked with federal law enforcement agencies on a variety of high-profile investigations in such areas as computer intrusions, criminal cases, counter-intelligence, counter-narcotics, and counter-terrorism. Her research and analytical interests include Mac forensics, mobile device forensics, digital profiling, and malware reverse engineering.
ADDITIONAL CONTRIBUTIONS BY SARAH EDWARDS:
Improve Network Security with Application Intelligence, October 2019
Launching APOLLO - Creating a Simple Tool for Advanced Forensic Analysis, October 2019
What’s New with FOR518 - Mac and iOS Forensic Analysis & Incident Response, May 2018
iOS Location Forensics, May 2016
Forensic Lunch 8/14/20 - Sarah Edwards and Jared Barnhart
MDOYVR19 - Sarah Edwards - Launching Apollo
DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and You
- APOLLO - Apple Pattern of Life Lazy Output'er (APOLLO) extracts and correlates data from numerous databases, then organizes it to show a detailed event log of application usage, device status, and many other pattern-of-life artifacts from Apple devices.
- MacMRU - Mac MRU parser