Webinars

Cyber Unpacked: S2:02 // The insider threat playbook: A case study in sensitive data exfiltration

Insider threats, particularly those involving intellectual property theft, pose a substantial financial risk to organizations. In this case study, we’ll delve into how digital forensics tools like Magnet Axiom Cyber and Magnet Nexus helped uncover and investigate an insider threat that involved the exfiltration of sensitive data. By meticulously analyzing key artifacts such as RDP logs, shellbags, Windows event logs, and PowerShell activity, investigators were able to trace the suspect’s actions, reconstruct the sequence of events, and clearly prove that intellectual property had been stolen. This study highlights why using advanced forensic tools is so important for uncovering insider threats and protecting your organization’s valuable data.

Doug Metz
Senior Security Forensics Specialist, Magnet Forensics
Jeff Rutherford
Forensics Consultant, Magnet Forensics
DURATION
45 Min.
)

Register Now

Share

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top