Online Training Summer Special: Get a 12.9" iPad Pro, Surface Pro, or $350 Off with OnDemand or vLive


To attend this webcast, login to your SANS Account or create your Account.

Phoning it in: Heather talks about smartphone forensics

  • Wednesday, April 26th, 2017 at 10:00 AM EDT (14:00:00 UTC)
  • Heather Mahalik
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

You can now attend the webcast using your mobile device!


Smartphone forensics is complicated. The most common thing you will hear when asked if data can be extracted is, "it depends". It depends on the state of the phone - is it locked, encrypted, etc. Additionally, it depends on your forensic tools and if they are capable of decoding the smartphone date. What if the tools fail you? Will you know how to hunt the data and uncover the artifacts that support your investigation? In this webcast, we will discuss common smartphone security trends, acquisition and analysis hurdles and methods for ensuring your forensic tools are presenting the data correctly.

Speaker Bio

Heather Mahalik

Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to Osama Bin Ladenís media. She has helped law enforcement, eDiscovery firms, and the federal government extract and manually decode artifacts used in solving investigations around the world. All told she has more than 14 years of experience in digital forensics, including eight years focused on mobile forensics Ė thereís hardly a device or platform she hasnít researched or examined or a commercial tool she hasnít used. These days Heather is the Director of Forensic Engineering at ManTech CARD.†Heather previously led the mobile device team for Basis Technology, where she focused on mobile device exploitation in support of the federal government. She also worked as a forensic examiner at Stroz Friedberg and the U.S. State Department Computer Investigations and Forensics Lab, where she handled a number of high-profile cases. She has also developed and implemented forensic training programs and standard operating procedures.†@HeatherMahalik

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.