Assisting a UK-based cyber security firm with forensic evidence acquisition in Australia

A UK-based cyber security firm, conducting cyber insurance investigations in Australia, faced challenges with obtaining forensic copies that met the NIST 800-86 international standard. They turned to Notion Digital Forensics for assistance, and we successfully acquired the required evidence, following strict data protection and encryption standards.

Objectives

  1. Acquire forensic evidence in compliance with NIST 800-86 international standards.

  2. Preserve and protect corporate data on laptops during the acquisition process.

  3. Provide a written statement detailing our acquisition process to comply with international expert codes and investigation codes of conduct.

Approach

Notion Digital Forensics partnered with the UK cyber security firm to handle the evidence acquisition process. We were mindful of the protections on laptops safeguarding corporate data and followed the NIST 800-86 guidelines to ensure proper procedures were in place. After gathering the evidence, we tested our ability to decrypt it and securely packaged it for transportation using the highest encryption standards.

Results

The UK cyber security firm was able to retrieve the forensic evidence online within hours, thanks to our efficient and secure processes. We provided them with a written statement outlining our acquisition process, in line with international expert codes and investigation codes of conduct. Our reliability and commitment to protecting the client’s data with the latest encryption standards made us the ideal choice for the task.

Notion Digital Forensics successfully assisted the UK cyber security firm in obtaining forensic copies that met international standards, while ensuring the protection of corporate data. Our adherence to NIST 800-86 guidelines, encryption best practices, and efficient processes made a difference in the client’s investigations, and established Notion as a trusted partner in the field of digital forensics.

Previous
Previous

Successful second opinion in corporate espionage case – uncovering a salesperson’s theft of customer information

Next
Next

Joint rapid ransomware response and recovery operation for an Australian business