What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. 
In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  

In This Episode You Will Learn: 

The specific tools used during a digital forensics investigation 

What the typical threat landscape looks like for mobile devices 

Big trends and changes happening in the past few years 

 
Some Questions We Ask: 

How is mobile forensics particularly unique? 

​​What is typically looked for during an investigation?  

How is a mobile device used as part of an attack chain? 

Resources: 
mac4n6.com 
View Sarah Edwards on LinkedIn 
View Nic on LinkedIn 
View Natalia on LinkedIn 
View Microsoft Security Blog 

Related:   
Listen to: Afternoon Cyber Tea with Ann Johnson 
Listen to: Security Unlocked: CISO Series with Bret Arsenault 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. 

What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. 

In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  


In This Episode You Will Learn: 


The specific tools used during a digital forensics investigation 
What the typical threat landscape looks like for mobile devices 
Big trends and changes happening in the past few years 

 

Some Questions We Ask: 


How is mobile forensics particularly unique? 
​​What is typically looked for during an investigation?  
How is a mobile device used as part of an attack chain? 


Resources: 

mac4n6.com 

View Sarah Edwards on LinkedIn 

View Nic on LinkedIn 

View Natalia on LinkedIn 

View Microsoft Security Blog 


Related:   

Listen to: Afternoon Cyber Tea with Ann Johnson 

Listen to: Security Unlocked: CISO Series with Bret Arsenault 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts


Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.