Conducting Efficient Insider Threat Investigations using KAPE

Online Event

September 24, 2020 | (Online Event)

Webcast

Events

Insider threat investigations involve collecting and analyzing tremendous amounts of data, which can require considerable time and effort. Knowing what forensic data is relevant to your case and where to uncover these artifacts can save a substantial amount of time during your collection and analysis. The Kroll Artifact Parser and Extractor (KAPE) has assisted investigators in solving insider threats faster than ever before due to its ability to process forensic artifacts within minutes.

Join our resident experts, Anthony Knutson and Aaron Read, as they discuss the ways they use KAPE during insider threat investigations, its efficiencies for their teams, and how it’s changing the landscape of forensic analysis.

Schedule: 1:00 p.m. (EDT)

Watch the on-demand Webinar Now.

Key Takeaways

  • Collect only forensic artifacts relevant to your case
  • Automate the collections for non-technical users
  • Learn how to tailor a forensically-sound tool to your needs to expedite investigations
  • Understand key areas to examine in an investigation to maximize your time

Speakers

  • Anthony Knutson, Senior Vice President, Cyber Risk 
  • Aaron Read, Senior Vice President, Cyber Risk
2020-09-24T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll-images/events/event.jpg /en/insights/events/2020/webcast-conducting-efficient-insider-threat-investigations-kape event {09213578-A7CA-4DD8-AE97-7476022C89D6} {E538E14D-C192-4A8E-8861-504D0EEBF99A} {E39587AD-8F0B-4FE2-865F-969BC5501096} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E}

Stay Ahead with Kroll

Kroll Artifact Parser And Extractor (KAPE)

Find, collect and process forensically useful artifacts in minutes.

CyberDetectER

Proactively monitor, detect and respond to threats virtually anywhere – on endpoints and throughout the surface, deep and dark web.

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

24x7 Incident Response

Enlist experienced responders to handle the entire security incident lifecycle.