Webinar Registration

Office 365 Forensics and Business Email Compromises
On Demand
Duration: 60 Minutes

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes.

Evidence Collection and Analysis
•Review of the Office 365/ Azure Admin Centers
•Collecting evidence from Office 365 (logs, rule/forwarding/ Sharepoint/Onedrive data)
•Extracting mailboxes with the Office 365 eDiscovery tool.
•Analyzing and interpreting the types of log data available in Office 365
•Steps to secure the Office 365 environment during an incident

Presented by: Adam Hart, Associate Principal-Forensic Services, Charles River Associates

NW3C Privacy Statement
Yes, I have read, understand, and agree with the NW3C privacy statement.

OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.
I agree that NW3C may share my Personally Identifiable Information, including, but not limited to, my email address, with third-party vendors in connection with this NW3C product in accordance with NW3C’s privacy statement.