<p>At one time, computer forensics consisted of pulling the plug, imaging everything in sight, and loading those images into a massive forensics program for “analysis.” As computer hackers became more resourceful, the complexity of computer forensics increased exponentially. Add to that the growing size of data storage devices, and it becomes infeasible to even consider imaging tens or hundreds of terabytes, let alone loading those images into some forensic software. So what’s the answer? How can incident responders hope to remain relevant in today’s operating environment? With Sniper Forensics! In addition to offering tips and tools, this talk will provide real world examples of how the landscape of modern forensics is being changed.</p>
<p> <strong> Chris Pogue </strong> is a senior security analyst for the Spiderlabs incident response and digital forensics team at Trustwave. He has over ten years of administrative and security experience including three years on the IBM ISS X-Force emergency response services team, five years with IBM’s ethical hacking team, and 13 years of active military service in the U.S. Army Signal Corps. Chris also has worked with local, state, and federal law enforcement agencies such as the New York Police Department, the Royal Canadian Mounted Police, the Federal Bureau of Investigation, and the United States Secret Service to help pursue the digital evidence left behind by criminals of all types. His efforts have lead to arrests and convictions in Oklahoma, New York, Florida, Albania, and Germany. </p>