Capsicum's Sandy Goldstein was quoted in the Legal Executive Institute's article chronicling the 2016 Defending Corporations and Individuals in Government Investigations conference.
Capsicum is expanding both its Philadelphia and New York teams. We are currently seeking qualified candidates for the following positions: Senior Technology and Security Consultant - New York, NY / Senior Forensic Technologist - New York, NY / Junior Forensic Technologist - New York, NY / Technology Consultant- Philadelphia, PA /
An SOC must also enlist the expertise of a team of response personnel who will move quickly to address vulnerabilities, attacks and breaches once they have been identified. Your response team should include seasoned IT and cybersecurity professionals who can identify intruders and limit damages in the case of a cyberattack. As security breaches continue to pose a threat with far reaching costs, outsourcing the most sensitive investigation and recovery tasks should fall to professionals who specialize in cybersecurity and understand your system. Capsicum Group’s incident response consultants will collect data on the incident and perform forensic analysis to identify the affected and infected areas. We will also support your legal team or law enforcement by producing evidence, expert reports and affidavits, as well as testifying in court.
Capsicum’s Leeza Garber authored an article in The Legal Intelligencer entitled “Evolving Process of Preserving and Using Cellphone Evidence”.
In late August of this year, a New York judge ordered a party in a heated custody battle to turn over her private Facebook posts as potential evidence. Arguing that the social media posts could prove that only one parent was the actual caregiver, the judge is now considering whether the evidence is necessary as a means of illustrating that the mother travels frequently and is unavailable. The final determination regarding the Facebook posts will be made later this month.
Law firm practice groups entitled “Privacy and Cybersecurity,” “Cybersecurity Task Force,” “Global Privacy,” and “Data Privacy and Cybersecurity” are cropping up every day, across the globe – and with good reason. Cyberlaw is the new legal frontier, as hackers, malware, cyberattacks and data breaches dominate the latest news headlines. Many law firms are working alongside cybersecurity consultants, like Capsicum Group, to help clients understand that proactive prevention is always preferable to a reactive cure.
As Halloween approaches we’d like to emphasize the often scary reality of cyber-attacks. There are three important things every business person needs to understand:
1. A cyber-attack is likely going to happen to you.
2. It’s possible that a cyber-attack already has occurred, and you just haven’t realized it yet. (Home Depot only recently learned that malicious software, or “malware,” had been on its system for the past six months, skimming credit card data and JP Morgan has likely been under attack for upwards of a year.)
3. More internet-connected devices are likely to mean more attacks. On that cheerful note, let’s look at what you need to know in order to prepare yourself.
Capsicum is excited to welcome the newest member to our team, Senior Consultant, Kent Whitney. Kent’s focus at Capsicum is in the areas of cyber-security, vulnerability analysis, information security, computer forensics investigations and technology consulting. He performs investigations in response to network security breaches and provides expert reports and opinions on security incidents.
The following is based on true cases, but all the names and places and certain relevant details have been changed to preserve privacy. Dan Kearney was checking Facebook in the teachers’ lounge when he noticed a surprising friend request. Wow. Katie Ayers? Really? A rush of memories came back. It was 1989. He was a first-time teacher, barely older than the kids in his class. Katie asked him about poetry, and he bought her a few books. Flirting after class turned into him reading to her down by the lake… and a relationship that was completely inappropriate. She had sent him some perfumed letters and some sexy Polaroids of herself in a bikini, but no other evidence of that relationship existed anywhere. As a parent himself now, Dan thought to himself “it seemed pretty innocent at the time, but in hindsight…”
What do you do if you have a forensic data case involving 65 servers on four continents, 765 laptops, 308 tablets, and 5,100 smartphones -- all containing data that has to be put in one place and organized for review? At Capsicum, we turn to Lesley Dancel in our eDiscovery practice in Fort Lauderdale, Florida.
Social media -- the power of people talking to each other about your company, brand, and services -- takes word-of-mouth marketing to a new level. It’s like electricity. It’s a tremendous source of power if handled correctly. But it can deliver unexpected – even fatal – jolts if it is not used carefully.
Between 2009 and 2011, something really shocking happened: there was an almost 50% rise in blind spot car accidents. No similar statistics exist for regulatory blind spots. But if there were, the rise would probably be far more dramatic. Regulatory blind spots are bigger than ever, and they’re widening in unexpected ways. It’s easier than ever for a company to run into regulatory trouble, even when everyone involved sincerely believes they are following the rules of the road.
As the taxi from the train station pulled into Jack Hucknell’s driveway, his wife Larissa rolled over and looked at the clock. It was past midnight, again. This merger had better wrap up one way or the other soon, she thought to herself, or it will kill Jack.
Few marketing professionals really know the nitty-gritty about how the products or services they market are created. They know their company sells diamonds, but they’ve never been down in the mines. Kristen is an exception. From her first day at her first job, she has been an investigator’s investigator.
If you saw Brad Pitt in Moneyball, watched the last Presidential election, or even looked at your last 401K statement, you’ve seen Big Data in action. It’s transforming everything in business, including healthcare. But like any significant change, it’s important to recognize that it brings both opportunities and challenges.
Brian Rosenthal knew upon graduation that he wanted to apply directly to a forensics firm to start his career. His terrific problem solving skills, keen observation and ability to find solutions from unexpected sources made him a natural fit in the industry right from the start.
Tim Guerra of Defensicon Bank grinned as he watched the furious activity in his IT Conference Room. With the 2010 hack of Google, Adobe and 32 other companies and now the Chinese cyber-threat, Tim had decided to engage his IT Department in a scenario planning exercise. What was the most exotic, devilish, unprecedented hack that they could imagine hitting the company?
Bogdan Lupescu was a brilliant software engineer who recently emigrated from Romania. Alargent had been trying to hire him for more than a year. However, different cultures sometimes have different understandings about what’s theirs and what belongs to the company. In the culture the engineer came from, if you wrote the software, you were free to use it, whenever and wherever you went. For Bogdan, it was his idea and so it was his software – he didn’t understand that in the U.S., these rights belonged to his former employer.
The former head of IT had warned the CFO for years about the need to upgrade their out-of-date security. But her requests for funding grated on the CFO. She was forced out and replaced with a rising star that wasn’t ready for the job. The young head of IT got along great with the CFO -- in part because he knew better than to ask for expensive security upgrades.
As computer forensic investigators we are constantly faced with new and emerging technologies. Perhaps the most challenging issue today is data encryption. There are various levels of data encryption we encounter: an individual file can be locked with a password, a series of files can be placed in a password protected container file such as a .zip or .rar file and a desktop or laptop computer can be encrypted to require an initial password or key upon booting. As more companies realize the value of utilizing encryption tools to protect their digital data, it will become increasingly difficult for forensic investigators and law enforcement professionals to gather evidence from computers and other storage mediums.
The proliferation of Ponzi schemes, privacy thefts, hackings, intellectual property thefts and embezzlements, along with failures to implement the most basic security controls, compromise not only corporate governance, but also undermine profitability and reputation. It is therefore imperative for legal professionals to prepare for and stay ahead of these wide reaching malfeasances.
In 2000, Sandy Goldstein (BS ’81, MBA ’84) was in his sixth year as the chief information officer at Airgas, a large industrial distributor, when he decided to leave the high-level corporate life to head up a new small, technology consulting practice at a law firm. Two years later, he bought the practice from the firm and formed Capsicum Group LLC.
Social media is a key marketing tool because it allows companies to create marketing strategies that would previously have taken a tremendous amount of time and resources in a one-step process. That’s according to Sandy Goldstein (BBA ’81, MBA ’85), the president and founder of Capsicum Group LLC, who shared his insight with School of Business alumni and students earlier this month during Alumni Weekend festivities.
IT professionals are often faced with the necessity to recover data from physically damaged hard drives or storage devices, however; they often lack the training required to complete this task. This paper will cover details and symptoms concerning common hard drive mechanical failures. Additionally, this paper will discuss certain methods known to be effective in countering these hard drive failures. This paper assumes that you have applied the skills of your craft and checked the data and power cables or tried common methods of dealing with damaged partitions, boot records...etc.
"The simple act of searching does not guarantee that the item being sought will be found." While this statement runs a serious risk of being overly simplified, it also has a significant and often overlooked meaning to attorneys engaged in the discovery process of digital files.