Steve, you've been Susteen's president for a little more than two years. Tell us more about what led you to the company and what appealed to you about leading it.
The reason I joined the company is because we can
Jon, tell us about your role at TransPerfect Legal Solutions. What does a typical day look like?
I have the privilege of managing a talented team of eight forensic examiners in our New York forensic lab, in addition to contributing
Jad, tell us a bit about OUTRIDER and how it came about?
We talk to officials in law enforcement from a variety of different backgrounds and the one constant for us is trying to find ways to help them do
Steve, can you tell us a bit about yourself and how you got into e-discovery and digital forensics?
Sure. I actually was a banker back in the mid 1980s and there was a financial crash. And from that, there was
Jeff, you've worked at OpenText and (prior to its acquisition) Guidance Software for nearly nine years. What attracted you to work here initially?
Digital forensics was in its infancy back when I was working for Oxford Semiconductor in the early
Jason, can you tell us a bit about yourself and how you got into digital forensics?
Absolutely. I started in the digital forensic industry in 2005 and a friend of mine started a company called Tableau LLC back at the
Sarah, tell us a bit about yourself. How did you begin your career, and what is your current position?
My career started when I was working in a legal practice. From a young age, I have always been interested in
Martin, you've worked for MSAB for 15 years. What changes in mobile forensics stand out to you from that time?
The most important one during this 15-year period would be the introduction of actual smartphones, because they were the biggest
Robert, your career in digital forensics began in the industry's infancy. What first brought you to high tech crimes with the New Jersey State Police?
I worked undercover narcotics investigations and I worked in a narcotic trafficking interdiction unit in
Stefano, tell us about your multiple roles as Trainer, Software Developer and Technical Support at Amped. What does a typical workday look like for you?
My workday is quite unpredictable so this question is rather hard to answer! My day
Dr. Marziale, you've been with BlackBag for four years as a senior researcher. What does your day-to-day look like in this role?
Well, I work from home in the beautiful French Quarter in New Orleans, so my office has a
Jessica, Magnet AUTOMATE allows examiners to focus less on repeatable evidence processing and more on actual analysis and review of evidence. On November 6, Magnet Forensics released the new version of Magnet AUTOMATE, the key feature of which is the
Raphael, tell us about how you first got into digital forensics, and the evolution you've seen in the field since you founded ADF Solutions.
My background is in computer science. I discovered computers at a very young age and have
Sarah, congratulations on joining BlackBag! What made you decide to take the leap from government contract work to vendor work?
It was a tough decision, I’ve been lucky to work with some amazingly smart people on projects that have been
Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your
Christian, tell us a bit about yourself and how you got into digital forensics.
Right now, I’m 40 years old. I studied computer science and philosophy when I was younger, before completing a post-graduate course (PhD) in bioinformatics. This led
We Value Your Privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.