Missed this at XChange? Join us for this XChange Rewind on Post Breach Investigations as Justin Tolman and John Wilson form HaystackID, revisit the highlights from the session on forensic review and investigative workflows.
They’ll walk through how organizations can piece together information from multiple sources to gain a clear understanding of what happened during an incident—and why. You’ll hear what was discussed at XChange about how thorough post-breach analysis not only supports immediate response, but also mitigates future risk, strengthens readiness, and can even help reduce regulatory penalties.
Key Takeaways:
Best practices for conducting forensic investigations after a breach.
How to integrate and analyze data from multiple systems for a complete, defensible view.
Steps to leverage findings for continuous improvement and stronger breach prevention.
Subject Matter Expert
Exterro
Chief Information Security Officer and President of Forensics, HaystackID
As Chief Information Security Officer and President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters
related to electronic discovery and computer forensics, including leading forensic investigations, cryptocurrency investigations, and ensuring proper preservation of evidence items and chain of custody. He regularly develops forensic workflows and processes
for clients ranging from major financial institutions to governmental departments, including Fortune 500 companies and Am Law 100 law firms.