Demystifying Digital Forensics and
Автор: Forensic Fusion Official
Загружено: 2025-12-14
Просмотров: 58
Event: Veritas Vanguard 1.0 - Cyber Forensics Module
Theme: The Digital Frontier: From SCADA IoT to State Laboratories
Today, we are stepping into the digital realm—a domain where evidence is invisible to the naked eye but leaves a permanent footprint if you know where to look. To guide us through this complex landscape, we have two exceptional experts who represent the two pillars of our industry: Corporate Security Operations and Government Forensic Laboratories.
• Introduction to the Speakers:
First, I would like to introduce Mr. Tushar Babbar, a specialist who sits at the cutting edge of Digital Forensics and SCADA IoT.
Mr. Tushar is currently working as a SOC Analyst (L1) at AlterEgo Technology, where he actively hunts for threats using advanced tools like CrowdStrike Falcon. His role involves investigating security incidents, analyzing malware, and performing real-time threat responses—giving him a frontline perspective on modern cyberattacks. His foundation is deeply rooted in government service as well. He has served as a Digital Forensics Intern at the Directorate of Forensic Science, Gandhinagar, where he conducted critical IPDR and CDR analysis to track cybercriminal activities. Furthermore, his expertise extends to niche fields like Drone Technology and IoT Forensics, where he has successfully extracted data from smart devices and drones. With certifications as an ISO 27001:2022 Lead Auditor and in Incident Response, he brings a rigorous auditing mindset to investigation.
Next, we are honored to have a seasoned expert from the government sector, Ms. Yasmin Gurung. Ms. Yasmin is currently serving as a Forensic Expert at the State Forensic Science Laboratory, Sikkim. Her experience is vast and spans multiple prestigious institutions. She has previously worked as a Forensic Analyst at the Central Forensic Science Laboratory (CFSL), Assam, and the Regional Forensic Science Laboratory, Gangtok. What makes Ms. Yasmin unique is her versatility. While she is a Certified Ethical Hacker (CEH) and holds a specialization in Cyber/Digital Forensics from MAKAUT, she also possesses operational experience in Toxicology and Biology divisions. In her current role, she handles the acquisition and analysis of evidence from mobile phones, cloud sources, and storage devices, strictly adhering to ISO/IEC 27037:2012 standards. She is proficient with industry-standard tools like EnCase, FTK, and Cellebrite, and specializes in recovering deleted and encrypted data that criminals try to hide. From network forensics with Wireshark to courtroom testimony, she has done it all. Let us give a warm virtual applause to Ms. Yasmin Gurung!
A massive thank you to Mr. Tushar Babbar for demystifying the world of SOC operations and IoT. Your insights into how real-time threat hunting works gave our interns a glimpse into the corporate defense mechanisms that keep data safe. The way you explained the analysis of 'Ram Dumps' and drone data was particularly fascinating.
And to Ms. Yasmin Gurung, thank you for taking us inside the walls of a State Forensic Laboratory. Your detailed explanation of the 'Chain of Custody' and the rigorous standards required for digital evidence admissibility was a masterclass in professional integrity. Your experience across CFSL and State labs provided the perfect roadmap for those aspiring to join the government sector.
To our participants, today you saw the full spectrum—from stopping a hack in real-time to analyzing the device in a lab after the crime.
Please make sure to complete this week's task, which will involve a mock digital evidence report based on today's lecture. Thank you for your attention. We will see you all in the next session!
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: