Go offline with the Player FM app!
Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations
Manage episode 468653275 series 3578563
Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity.
In this episode, we cover how to build an investigation plan that keeps you on track, ensures consistency, and leads to better results. We talk about evidence volatility, log retention, structuring reports that make sense to non-technical stakeholders, and how to ask the right questions from the start.
21 episodes
Manage episode 468653275 series 3578563
Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity.
In this episode, we cover how to build an investigation plan that keeps you on track, ensures consistency, and leads to better results. We talk about evidence volatility, log retention, structuring reports that make sense to non-technical stakeholders, and how to ask the right questions from the start.
21 episodes
All episodes
×
1 Episode 20:What Makes an Elite Incident Response Team: Mindset, Mastery, and Real-World DFIR Lessons 38:14

1 Episode 19: AI Data Poisoning: How Bad Actors Corrupt Machine Learning Systems for Under $60 26:20

1 Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps 43:16


1 Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations 30:43

1 Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool 23:20

1 Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson 1:08:33

1 Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation & Forensics in the cloud, with Jacob Wilson 54:55

1 Episode 12 - You're forced to decide: Cyber Generalist or Cyber Specialist? 17:47

1 Episode 11 - Velociraptor, Containerisation and Infrastructure Deployed as Code with Myles Agnew 52:46

1 Episode 10 - Detecting and Preventing Phishing Attacks 19:04

1 Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies 21:48

1 Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and… 19:57

1 Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures 17:07

1 Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo 26:11
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.