The 10 Most Influential People in Cyber Security, 2023

Page 1

The Use of Arficial Intelligence in Cybersecurity

Securing Weak Points

The Importance of Security Awareness Training for Employees

AI for Security
Carolina Pizarro
Crusader of Cybersecurity
in
Cyber Security Influential Carolina Pizarro , Director of Cyber Security NTT DATA Chile
The
The 1 Most People
2023

C o n n e c t i n g D w T e c h n o l o g y

EDITOR’S NOTE

Trailblazers of the Dynamic Cybersecurity Niche

Cybersecurity has risen to the top of many business leaders'

priority lists. Despite significant investments in that area, large corporations have struggled with it for decades. Still, many executives have realized in recent years that cyberattacks are simply a matter of "when," not "if.”

Large-scale transformative initiatives are beginning to catch up in many organizations and industries where cybersecurity maturity has been low for decades. Cybersecurity is now a must in the face of global and virulent threats that can simply bring your business down. Period.

Business leaders want assurances from people they can trust that their operations will be adequately protected regarding prevention, detection, reaction, and recovery. Leaders in cybersecurity cannot be technology outsiders any longer. They have to be—and be seen as—experienced and trusted business leaders.

This entails understanding the company's day-to-day operations, its dynamics and challenges, and where the real pain points for other business leaders are. To return to the fundamentals of leadership, you are a leader when others follow you, and most people will follow you if there is something in it for them.

Listening to all stakeholders' expectations about cybersecurity, considering their constraints and priorities, and incorporating

The 1

Most People in 2023 Cyber Security Influential

those into the transformation roadmap is the best recipe for gaining endorsement and acceptance for cybersecurity transformative objectives. Such acceptance, together with – and possibly as a result of – the trust of business leaders, will serve as the foundation for successfully implementing the transformative cybersecurity roadmap.

However, the cybersecurity leaders in the niche are precisely defining these elements. They are enhancing the core aspects of surmounting the challenges and ensuring secure operations of the game-changers in this dynamic business arena.

These are the traits that make these starlets stand out of the crowd. The latest edition of CIOLook— The 10 Most Influential People in Cyber Security, 2023 —sheds the spotlight on the starlets of the prominent leaders who—with their technical skillset and leadership attributes—are enabling augmentations in the world of cybersecurity.

Ab h i s h e k Jo s h i
COVER STORY 08 Carolina Pizarro The Crusader of Cybersecurity
22 Ganinee Jain Driving Novelties In the Cyber security Niche Article Cloud Computing Into the Science Cyber Forensics Hacks You Need to Know Cybersecurity - The Rise of Ransomware Gliding Up The Technology Trends Introduced by Cyber Forensic Disruptors 16 18 32 28 Boon or Bane Industry Insights

CONTENT

Senior Editor Alan Swann

Executive Editors Abhishek Joshi

FOLLOW US ON www.facebook.com/ciolook

www.twitter.com/ciolook

DESIGN

Visualizer Dave Bates

Art & Design Director Revati B.

Associate Designer Ankita P.

SALES

Vice President Operations Sihanee M., Rouniyar A.

Senior Sales Manager Prathamesh Tate

Sales Executives Rohit, John

TECHNICAL

Technical Head Prachi Mokashi

CONTACT US ON

WE ARE ALSO AVAILABLE ON Email info@ciolook.com For Subscription www.ciolook.com

Copyright © 2022 CIOLOOK, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from CIOLOOK. Reprint rights remain solely with CIOLOOK.

SME-SMO

Research Analyst Eric Smith

SEO Executive Sagar Lahigade

sales@ciolook.com

Technical Consultant Victor Collins January, 2023

Featured Person

Company Name

ByteChek, Inc bytechek.com

Apollon Security apollon-security.com

Booz Allen Hamilton Inc bah.com

NTT DATA Chile nttdata.com

EZEN Computer Services, INC.

Kroll, LLC kroll.com

Cypfer cypfer.com

Jaeger-Unitek Sealing Solutions Inc. jaeger-unitek.com

MegaplanIT Holdings LLC megaplanit.com

Brief

AJ has earned 6 AWS certifications including the AWS Solutions Architect-Professional and AWS Security-Specialty. Prior to ByteChek, AJ spent over a decade in the cybersecurity industry both in the US Army and as a consultant.

Alexandros is a refreshing and entrepreneurial individual with a focus to achieve tangible results where Cyber Security is not only a cost center or blocker to the business, but rather a business enabler.

Brad Medairy is a technology executive who leads Booz Allen's National Cyber account.

Carolina has more than two decades of managerial experience in IT, Services, and Financial companies, both in Chile and Europe. She has a strong orientation towards meeting objectives, a great ability to detect business opportunities, teamwork, and proactivity.

Ganinee leverages her experience and expertise to serve as a Cybersecurity Consultant, developing overall information security strategies & roadmaps.

Jason has led the practice through transformative growth into a highly diversified, global organization that today provides clients with seamless, end-to-end cyber risk management services.

Jordan, brings over 25 years' experience in various leadership roles and as a strategic adviser to executives around the world.

Kevin is known for his high-performance and is an executive leader dedicated to driving organizational excellence and successful business growth.

Michael is an Information Security & Compliance Professional with solid proficiency in areas of compliance, governance, auditing, project management, and risk mitigation.

Triada Networks, LLC triadanet.com

For years, he served as an IT support and director for various industries including manufacturing and investment advisory.

Michael Vitolo CEO Raffi Jamgotchian CEO Brad Medairy Executive Vice President Jason Smolanoff President Alexandros Manakos CEO AJ Yawn CEO Carolina Pizarro Director of Cyber Security Ganinee Jain, Advisor Cyber & Informaon Security, Privacy and Medical Device Security Jordan Kendall CEO Kevin Casey CEO
C O VER S T OR Y
Carolina Pizarro , Director of Cyber Security NTT DATA Chile

Carolina Pizarro

The Crusader of Cybersecurity

As a cross goal at the organization and as a strategy for the business, cybersecurity should be seen as an investment and not as an expense.

The realization that businesses need to take cybersecurity seriously came in after overcoming the adversities of cyber-attacks. Individuals in different industries became aware of the seriousness of the security threat that is being posed, and not just as a technological risk but as a business risk and reputational risk. Since then, these people have become torchbearers in spreading awareness about the subject in the company, sector, and the world.

One of the professionals at the vanguard of the movement is Carolina Pizarro, Director of Cybersecurity at NTT DATA Chile . Carolina began in the Marketing and Communications sector, but a cyberattack led her to shift her focus. She became a cybersecurity communicator at a national level and led campaigns to propagate knowledge and interest in the topic for the Chilean Government. For her exceptional work in the area, she has been awarded the Top Women in Cybersecurity Award - Latin America in 2021 and 2020; and the Women Leaders Award in Chilean Cybersecurity in 2020 and 2019.

Carolina has more than two decades of managerial experience in IT, Services, and Financial companies, both in Chile and Europe. She has a strong orientation towards meeting objectives, a great ability to detect business opportunities, teamwork, and proactivity. Her specialties lie in the Management and Development of Business Strategies, Marketing and Communications, Corporate Image Changes and Brand Positioning, Business Development, Digital Transformation, and User Experience.

In an exclusive interview with CIOLook , Carolina Pizarro shares her journey into cybersecurity, the impact of her work in the sector, and the changes she is bringing about at her organization in her role.

Below are the highlights of the interview:

Brief our audience about your journey as a leader until your current position at NTT DATA. What challenges have you had to overcome to reach where you are today?

I did not start in cybersecurity but in the commercial, communications, and marketing world, mainly linked to technology companies. While I was there, I had the possibility to advise the Ministry of Interior of Chile in the creation of the cybersecurity area. There, my role

was to build a strategy of knowledge regarding this subject at a national level, both in people and in companies.

It was just in that period that there was a cyber-attack against a banking institution in the country and the issue of cybersecurity became a national priority. A presidential advisor was appointed who began to develop different actions and started drafting a legislation focused on cybersecurity. My role at that time became more relevant since I had to create awareness of the issue at a country level. In addition, I had to come up with ideas on how we were going to incorporate experiences from other countries that were more advanced than us in this matter.

It was at that time also that I had the challenge of creating the first national cybersecurity campaign for citizens called #ConcienciaDigital. After my time with the Chilean Government, I was hired by a consulting company as a director of cybersecurity, having the objective of creating strategies for organizations. I started to position the area of cybersecurity not only as an IT issue but as a cross-issue in the companies.

During my time in the consulting company, I won the awards as a leader in cybersecurity, in Chile and Latin America, for three consecutive years. In 2022, when I took the challenge of leading the Cybersecurity area in NTT DATA Chile, with the objective of continuing to create eminence in the national market and positioning services and solutions with a differentiating value in service excellence. Something that is highly relevant in the industry and for our clients.

Before implementing processes and acquiring new technologies, we must create a culture of cybersecurity in people.

Tell us something more about NTT DATA and its mission and vision.

At NTT DATA, we are committed to building a unique and open community of people led by shared values. We have been growing as a large network of collective talent capable of multiplying our capabilities and knowledge, responding with agility to the changing needs of our customers, and intelligently anticipating the future.

Enlighten us on how you have impacted the Cyber Security industry through your expertise in the market.

One of my main achievements has been to be in charge of the first cybersecurity campaign in Chile, which allowed me to provide a vision of digital security from children to senior citizens so that they have digital awareness. I have also played a role in positioning and empowering women in the world of cybersecurity. I have mentored many women who have transitioned from other areas to cybersecurity, creating a collaborative ecosystem in this industry.

Describe in detail the values and the work culture that drives NTT DATA.

At NTT DATA, we accompany our clients in their digital development through a wide range of strategic consulting and advisory services, cutting-edge technologies, applications, infrastructure, IT service modernization, and BPOs. We bring our broad experience in all sectors of economic activity and a

great knowledge of the geographies where we are present.

Additionally, we want to continue building a unique environment of collaboration, creativity, closeness, and generosity that allows us to continue evolving together as a community and as a society and thriving in a dayby-day full of new and better possibilities.

What methodologies do you implement that contribute to new growth opportunities?

For the cybersecurity sector, it is very important to know the client and their needs, as well as accompany them in this transformation process. Your investment will be a failed process without a strategic partner who can advise you throughout the transformational process and has the necessary knowledge and experience to implement cybersecurity measures. Today, before implementing processes and acquiring new technologies, we must create a culture of cybersecurity in people. In this education process, we accompany organizations to extract cybersecurity from the IT area and take it to the next level. As a cross goal at the organization and as a strategy for the business, cybersecurity should be seen as an investment and not as an expense.

What change would you like to bring to the Cyber Security industry if given a chance?

The most important thing is to move forward with updated laws that keep pace with cyber-attacks, but above all, to protect people and organizations. The

At NTT DATA, we are focused on educating boards and senior executives on cybersecurity, not only from a specialist’s point of view but also from a business point of view.”

creation of laws takes quite long periods of time. When one is finally drafted, it is already outdated. What we need in Chile is an institutional framework that is transversal to the government in office. From this point, we will be able to create a collaborative ecosystem, both public and private, that will help us to stay ahead of increasingly sophisticated and advanced cyberattacks.

What, according to you, could be the next significant change in the Cyber Security industry? How is NTT DATA preparing to be a part of that change?

An important issue that is already beginning to be implemented is that cybersecurity is no longer an IT issue. Still, it is beginning to be part of the strategic areas of the organization. Because we realize that if a vulnerability happens to us, it is not only monetarily damaging, but also the company’s reputation becomes at stake. This is the real responsibility of the people who represent the organization against the handling of data and confidential customer information.

Now that the importance of cybersecurity on boards is being established, the next step is to understand the exact nature of the role that the board and senior executives should play. At NTT DATA, we are focused on educating about the importance of this topic, not only from a specialist’s point of view but also from a business point of view.

Where do you envision yourself to be in the long run, and what are your future goals for NTT DATA?

My role will be to position the company as a leader in cybersecurity in Chile and Latin America, with a business rather than IT perspective. The idea is to look at emerging technologies associated with cybersecurity. Although companies have increased investments in cybersecurity, they continue to implement obsolete methodologies and technologies to detect attacks by cybercriminals. It is clear that my role and that of our team is to proactively accompany this process of digitization and adoption of new technologies to become a permanent advisor to our clients.

What would be your advice to budding leaders who aspire to venture into the Cyber Security industry?

It is a fact that our industry needs more specialists, and

that is why it is important that universities recognize this need and lay the foundations to promote specializations in cybersecurity. By 2023 there will be a lack of 3.5 million professionals in this area worldwide, and in Chile, for example, the presence of women in this field only reaches 25%.

Organizations can take advantage of a much larger opportunity for cybersecurity workers if they align job requirements and plan to build cybersecurity skills internally by providing training, education, and certification support for employees who want to develop new skills.

Also, allow recent graduates or people transitioning from other careers, those with an interest and skills for cybersecurity, to learn and grow within the organization. So, retraining in the face of a shortage of professionals can be a key element. It is also critical to encourage boards of directors to have at least one member who specializes in cybersecurity and transmits the importance of cybersecurity to the entire organization.

1 Year 12 Issues $250 6 Months 6 Issues $130 3 Months 3 Issues $70 1 Month 1 Issue $25 CHOOSE OUR SUBSCRIPTION Stay in the known. Subscribe to CIOLOOK Get CIOLOOK Magazine in print, and digital on www.ciolook.com

Cloud Computing

Boon or Bane

Cloud computing is changing the way we live in the modern world. It has become an inextricable part of our lives, whether we like it or not. Cloud Computing is now being used by companies and businesses of all kinds. However, nothing is flawless, including Cloud Computing. While it is really advantageous, there are some hazards and considerations to be aware of. As a result, in this article, we'll go over the benefits and drawbacks of cloud computing in-depth.

Benefits Cost savings

Low costs are frequently mentioned as one of the most tempting characteristics of cloud-based services, and this is true in many circumstances. Businesses who invest in Software as a Service (SaaS) can expect to save money because their conventional pay-as-you-go methods ensure that they don't pay for features they don't use, resulting in reduced costs and higher returns.

Things can get a little more sophisticated in terms of infrastructure, depending on your specific business needs. Platform as a Service (PaaS) or Infrastructure as a Service (IaaS) is frequently more cost-effective for larger organizations with more complex needs because it eliminates the need for pricey Software and the costs of licensing and installation.

On the other hand, for a small-medium-sized business, this may be more expensive than the expenditures of a more modest local server setup.

Data Management

Data loss is one of the most serious worries for any company, and with a data breach costing an average of $4 million, it's easy to see why.

If you save all of your vital data locally, you may find yourself in serious difficulty if you lose it due to device failure, human error, or a cyber attack. All data is centralized on a cloud-based server, making it accessible from any device with an internet connection.

This is why cloud computing is so popular for data storage, even if it's just as a backup solution to keep your data safe offsite. If you maintain your backups offshore and are not connected to your network, the malware won't be able to access them in the event of a ransomware attack.

Data Backup and Restoration with High Speeds

With cloud computing, you may instantly deploy your service with fewer clicks. With this speedier deployment, you can receive the resources you need for your system in less time. Once data is saved, it is a lot easier to back it up and restore it, which is a time-consuming task.

Limitations Vulnerability to Attacks

Storing data in the Cloud may present severe issues in terms of information theft, as every company's data is stored online. Even the most secure enterprises have experienced a security breach, and it's a danger that exists in the Cloud as well. Despite the fact that modern security measures are placed on the Cloud, storing confidential data on the Cloud might be problematic, and hence attack vulnerability must be addressed.

Limited Flexibility and Control

Most businesses have little control over their data because cloud service providers own, administer, and monitor the whole cloud infrastructure. The service providers' end-user license agreements (EULAs) and management policies may differ. The most prevalent scenario is that it gives the customer minimal control and restricts their access to the applications, tools, and data loaded on the server. Key administrative services may be unavailable to the consumer. Worst-case scenario: they place restrictions on what consumers can do with their deployment.

Reliability

Of course, one disadvantage of cloud computing is that

| January 2023 | 16 www.ciolook.com

it is completely dependent on the internet, so you won't be able to access applications or services if your internet goes down. This isn't a significant issue, and since we utilize the internet so regularly in our daily work, it wouldn't be any more of a hassle.

Using a cloud service provider for your business operations, on the other hand, might be quite disruptive if something goes wrong.

EndNote

While cloud computing security remains a major concern, the truth is that the Cloud is safer than your on-premise system. Humans will always be the main security weakness in the Cloud. However, this can be adequately addressed by providing extensive cyber security training to employees and consistently monitoring and controlling your Cloud system.

When unavoidable dangers are detected, provided your organization analyses the risks and configures the platform effectively, so you have eyes on everything, you'll be able to locate and mitigate the risks immediately and dramatically lessen the impact on your business.

www.ciolook.com | November 2022 | 17
Boon or Bane
| January 2023 | 18 www.ciolook.com

Cyber Forensics Hacks You Need to Know

n the modern age of digital technologies, businesses I have undergone a phenomenal transformation in various dimensions of communication, operations, quality, customer service, finance and accounting, business analytics, data management and cyber security.

The rapid developments in IT technologies have also increased the vulnerability of data loss/theft/damage/mismanagement/virus/malware/spa m-ware attacks, affecting business organizations’ identity, sovereignty, and foundation. Cybercrimes may cause considerable losses to organizations destroying the extended periods of research-hard work and dedicated efforts in product innovations.

It becomes essential for organizations to organize and set up good IT security systems with strong and reliable firewalls to prevent possible cyber-attacks. Having a good IT security is a crucial aspect of every modern business enterprise. However, there are internal threats too. Possibilities of unauthorized access, data theft, data manipulation, human errors, system failure, etc., do exist. This is where cyber forensics comes into the picture.

Cyber forensics is a systematic process of identifying and extracting the data as proof or a link to the crime involving electronic devices. The process follows all the proper investigation rules to identify and catch the culprit by presenting the evidence to the court. Also known as computer forensics, its main aim is to maintain the thread of proof and documentation to determine who committed the crime digitally.

Cyber forensics can support businesses with:

Ÿ Recovering deleted files, chat logs, emails, etc.

Ÿ Retrieve deleted SMS, Phone calls.

Ÿ Can procure the recorded audio from phone conversations.

Ÿ Determining the exact user having used the specific system for a specified time.

Ÿ Identification of the user running a specific program.

Let us identify certain hacks in cyber forensics that everyone should know.

Forensic investigations are always challenging as you may gather all the information you can for the evidence and mitigation plan. Here are some of the computer forensic investigator tools you would need. Most of them are free!

The applications spread across internal human resources cases, an investigation into unauthorized access to a server, to learn a new skill; these suites and utilities will help to conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging, and mobile forensics. As such, they all provide the ability to bring back in-depth information about what’s “under the hood” of a system.

Ÿ CAINE: ( C omputer A ided In vestigate E nvironment) is a Linux application that offers a complete forensic interface that has almost 80+ tools to identify, analyse, investigate, and create an actionable report.

Into the Science
www.ciolook.com | November 2022 | 19

Ÿ Autospy : Autospy is a GUI-based open-source forensic platform that seamlessly analyses hard drives and smartphones. Thousands of users prefer Autospy globally to investigate the actual happenings in the computer.

Ÿ Network Miner : This dynamic network forensic tool works for MAC OS X, Linux, and Windows for detecting sessions, hostname, OS, and open ports through packet sniffing or by PCAP file. Network Miner provides extracted observations in an intuitive user interface.

Ÿ Crowd Response : This windows application gathers system information for incident response and security engagements. The results are displayed in XML, CSV, TSV or HTML with the help of CRConvert. It runs on 32 or 64-bit Windows XP and above.Crowd Strike has other excellent investigation tools, including Totrtilla, Heartbleed scanner, and Shellshock Scanner.

Ÿ Encrypted Disk Detector : It enables to check of encrypted physical drives, thereby supporting TrueCrypt, PGP, Bit locker, and Safe boot encrypted volumes.

Ÿ Wireshark: This tool is primarily a network capture and analyzer that helps to see what is happening in the network. The tool assists in investigating all network-related incidents easily.

Ÿ Magnet RAM Capture : Users can apply Magnet RAM in a systematic capture to capture the process of combing a computer’s physical memory and precisely analyze the micro-details in memory. It is compatible with the Windows operating system.

Ÿ NMAP : In its full form, Network Mapper is one of the most popular tools in auditing security and networks. NMAP is an open-source tool widely supported on operating systems including Windows, Linux, Solaris, MAC OS, HP-UX etc.

Ÿ FAW : Forensics Acquisition of Websites or FAW aims to acquire web pages for forensic investigation. It seamlessly integrates with Wireshark, captures HTML source codes of web pages, records distinct

types of images, and easily captures partial or entire pages.

Ÿ USB Write Blocker : The application helps the users view the USB drive content without leaving the fingerprint, changes to metadata, and timestamps. USB Write Blocker uses a Windows registry to write-block USB devices.

Tracking the Mystery Trail

“It is only the inadequacy of the criminal code that saves the hackers from very serious criminal prosecution.” – Ken Thompson, American Computer Designer.

The Law of Karma is always active, now through the cyber network too. Any cybercriminal or hacker, however smart he/she may be, always discreetly leaves a trail of evidence thread.

Therefore, organizations are gearing up for a more substantial and well-equipped fortification of cyber security systems and forensic frameworks. Every decent work of innovation needs to be preserved and guarded from the miscreants of plagiarism and intellectual property infringements. The advancements in cyber forensics have helped business organizations safeguard and reinforce cyber security provisions.

| January 2023 | 20 www.ciolook.com
| January 2023 | 22 www.ciolook.com
www.ciolook.com | November 2022 | 23
| January 2023 | 24 www.ciolook.com
www.ciolook.com | November 2022 | 25
| January 2023 | 26 www.ciolook.com
- The
ransomware
ransomware Cybersecurity | January 2023 | 28 www.ciolook.com
Rise of
The of

Industry Insights

The ransomware attacks are created to cripple

businesses by making their computers unstable until companies or users pay money to the hackers. The recent cyber-attack suffered by the US fuel transportation company due to the ransomware has alerted the nations to the dangerous consequences of cybercrime and how no companies are safe from such attacks. No organization can afford to be complacent in the matter of cyber security. Ransomware attacks have increased tremendously in times of pandemics. They are constantly on the rise, and the companies globally need to understand the destruction caused by this virus and how they can protect themselves from experiencing the dangerous consequences like the recently faced by the US fuel transportation company.

It is better to be thoroughly prepared against such attacks instead of being alert after the attacks. Ransomware encrypts victims’ files and locks them denying access to the users. The hackers then demand money to avail from the users or organizations to get access to these files. They threaten organizations or users with the loss of confidentiality of their information if they don’t offer them money and sometimes, they demand money even in the form of bitcoins. US fuel transportation company named Colonial Pipeline became a victim of ransomware after its computers were hacked and locked by the hacker group.

The crimes due to ransomware attacks have resulted in the loss of more than 30 million dollars in the year 2020 according to the FBI report. These ransomware attacks

www.ciolook.com | November 2022 | 29

are continuing to increase and are affecting the industries worldwide and attackers are demanding more and more money from companies to get rid of these attacks. The most affected industries due to ransomware attacks are manufacturing, electronics, health, research, education, etc. Governments and the healthcare industry are affected the worst due to this dangerous ransomware and it is a serious threat to the world. The increase in attacks of ransomware is much linked to remote working and employees working from outside their regular protected office networks.

Ransomware attacks are motivated by profit and the hackers will continue to enter the vulnerable computer systems and continue to cripple the systems until companies adopt some tough protective measures against these attacks. Lack of security or lack of preparation against these ransomware attacks is causing serious costs to many companies and having the platform to address the issue of ransomware is becoming an incredibly important concern. These attacks cause widespread economic loss, corruption of the confidential data, and system downtime and ultimately this affects the supply chains.

Being vigilant about patching and keeping software upto-date can help companies in ensuring that their computer systems are not vulnerable to the attacks caused by ransomware. Acquainting businesses with the cyber security and infrastructure security agency (CISA) guidelines will help companies in being protected against the threats caused by the hackers. Creating strong response plans according to the CISA guidelines and implementing cyber security alertness programs should be prioritized by businesses for digital protection.

| January 2023 | 30 www.ciolook.com
| January 2023 | 32 www.ciolook.com

Cybercrime has been committed. It is time to

inform and call the cyber investigators. As the lead cyber investigator arrives with her digital forensic team to investigate, we might feel that we are living in a hi-fi-sci movie witnessing a distant future.

As the lead cyber forensic expert might disrupt our reality with super-advanced technology trends, we might pinch ourselves that are we in a daydream or virtually induced hyper-cyber-reality. Oh! What is real and what is science fiction, we can no longer discern. Someone, anyone, please help us. Pour onto our bamboozled senses holy water of cyber wisdom.

‘Thus speaketh The CyberLord Smartphone5G in a bot voiceover sprinkling the rain of knowledge:

My lovely innocent, naïve disciples, as you are blessed with 21st-century digital gadgets keeping you actively awake online all the time, the personified technically specific gadgets of yours make these cyber forensic analysts’ jobs quite challenging.

However, many noble tech-savvy gentlepeople have developed several futuristic forensic technologies to help the cyber-investigators collect cyber-evidence and find out who did the crime, how they did it, how they could be caught, and how we can bring them to justice for their cybercrimes.

Let me pull you behind the screen into the cyber-crime scene and show you these fabulous cyber forensic examination methodologies they use to crack a cybercrime case wide open.

A Time of Phone Forensics

Extracting useful information and data from mobile devices, including feature phones, smartphones, tabs,

Gliding Up
www.ciolook.com | November 2022 | 33

and laptops, and then analyzing it to pinpoint and separate evidence comes under the purview of phone forensics.

Data and information like contacts, calendar history, text, messages, MMS, social media accounts, chats, images, audio-video, and multimedia files are extensively checked and cross-checked to find the relevant piece of incriminating evidence.

A Team of Memory Forensics

Novel viruses, worms, malware, trojan-ware, and ransomware are smartening to the extent that they keep hiding beneath their disguises on the infected devices. Their sole aim is to erase any trace of their presence on the memory disks (RAM, ROM, hard disks).

Their cleverness is such that they fool all the antivirus installed by masking themselves inside the RAM, which antivirus scanners usually ignore. As a result, these viruses could only be detected using volatile memory forensics–rather than traditional methods; an advanced digital forensic technology is used where an extensive memory scan is done by acquiring an image map of the memory.

A Web of Network Forensics

In the digital realm, we are ever-connected via a world wide web of networks and the Internet of Things. But as the digital network cannot discern good people like us from bad people like cybercriminals, a Network security firewall keeps these unscrupulous hackers, attackers, and criminals at bay. However, these spidery necromancers from the dark underbelly succeed once in a while in breaching our digital safety net.

This is when the network forensic experts enter to find out the illegal trespassing, detect the traces left by the network intruders, analyze the net, and collect data and information from it. In addition, digital communications like audio-video chats, emails, social media content and other encrypted messages are privy to the interception and deciphering by this niche network of forensics detectives.

A Base of Database Forensics

Data is outpouring into the online domain from everywhere. It is filling all the bases of physical and

cloud storage. These databases are utterly transparent if one knows the encrypted codewords or how to bypass these secret passwords.

While hackers decrypt or bypass them to commit a crime, a digital database forensic expert will scour and analyze that database’s inner layers and hidden contents to detect the identity or evidence about the criminal.

Some top-notch cutting-edge data extraction software are available to aid these data forensic examiners that offer premium-grade features, including multifarious analytical functionalities enabling filtering, keyword and passkey search, statistical patterns, virtual connection analyzers, SQL statement query etc., and Hierarchy Relationship Analyzing Tools.

A Flock of Cloud Forensics

Clouds were supposed to be the rainwater storers. In the digital aeon, however, they are database storers, now having 50% of the modern data according to the industry experts. So now, to investigate, detect, and collect evidence from the cloud and then admitting it in court is a herculean task performed by cloud forensic experts.

A Show of Video Forensics

Thanks to CCTVs, a criminal committing physical and digital crimes could be captured into a video, which could then be immensely useful to the Video Forensics analyzers and experts in forming a solid factual-based case of evidence. In addition, recorded video footage is a great place to answer the court questions about who, when, where, and at what time they committed the act.

A Blow to Criminals’ Foreign Sick

In the modern world, individual whereabouts can be located using geolocations of their smart mobile devices. Even the hardest criminals could not hide their trail or mislead entirely in the ever-evolving cyberforensics era.

Welcome to the digital world . Here, crime will indeed be detected, and criminal/s will indeed be caught and brought to justice using disruptive cyber forensics.

| January 2023 | 34 www.ciolook.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.