Domenica Lee Crognale
Senior InstructorCyber Security Engineer at SANS Institute
Specialities
Digital Forensics and Incident Response
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsDigital Forensics and Incident Response
Domenica Lee Crognale is a Senior Instructor and co-author of FOR585: Smartphone Forensic Analysis In-Depth with SANS as well as a principal security engineer. She spent 15 years as a contractor to various federal government agencies providing support to both Law Enforcement and the Intelligence Community with digital forensic investigations and cybersecurity best practices. She has provided training to military special forces, the United States Coast Guard, FBI and others, and in her spare time, she tests various mobile forensics utilities and provides security assessments for mobile applications. She holds a Bachelor of Science in Business Administration from Old Dominion University and a Master of Science in Cybersecurity Management from Purdue University Global. She is also a proud faculty advisor for the SANS Technology Institute's Graduate program and enjoys helping students reach their academic goals in cybersecurity.
Very good instructors. [Domenica] incorporated great real-life scenarios with topics.
[Domenica] "Lee" is amazing instructor and demonstrates her knowledge with actual experience.
Domenica has great class management. Her material delivery is very good - concise and informative.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
Many of the aspects that make DFIR so exciting are also what makes this career field challenging: no two investigations or days in this field are ever the same. We strive to keep pace with changes in technology while attempting to get ahead of attackers who modify their methods to evade detection in this sea of interconnected digital devices.
The number of organizations banning applications due to surveillance and spyware concerns on employee devices continues to grow In 2020, the average smartphone user had 40 apps installed on their mobile phone (source). And Zimperium’s zLab Research team found last year (2022) that 23% of all Android samples and 24% of the iOS apps in the public record are malicious, meaning mobile apps represent a major attack surface.
It is no surprise that there is a shortage of cybersecurity professionals, and year upon year, these careers continue to be some of the most in-demand jobs in the corporate, healthcare, financial, education, and government sectors. While the term cybersecurity is broad in scope, there are many in-demand roles specifically in digital forensics and investigations. Digital forensics is a small subset of cybersecurity which is further broken up into many distinct disciplines, each often requiring their own set of specialized skillsets, aptitude, certifications, and on the job experience. This webcast aims to dissect some of these disciplines and get a feel from the experts why they chose their specific field and what it takes to thrive as a practitioner in niche forensic fields.Register for this webcast now and be among the first to receive the companion report by authors Domenica Crognale (SANS Certified Instructor) and Heather Mahalik (SANS Fellow).
This webcast takes a deep dive into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2023. This webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Dr. Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. You’ll get actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Register for this webcast now and be among the first to receive this whitepaper from SANS author and Director of Emerging Security Trends John Pescatore and SANS Certified Instructor Domenica Crognale.
Everyone has alerts and everyone has different forms of intelligence they use to try and detect, research, and respond to a threat within their environment. As a security practitioner, you know the process and time involved to “connect the dots” between the intelligence available and what is in your environment is often time consuming and requires a good deal of knowledge to correlate. These are all the realities of the world we currently live in as cybersecurity professionals…. but what if we could leverage a new approach to automate these efforts and also better protect your organization in ways that weren’t possible before?
Mobile devices are regularly used for personal and professional reasons, and people rarely put a company’s cybersecurity ahead of their personal needs. This dual-usage introduces organizations to a wide range of threats, many of which originate from mobile apps on personal devices. And if sideloaded apps continue to grow in popularity as expected, the number of mobile risks and threats will accelerate.
As the field of smartphone forensics evolves rapidly, the tools available often lag, particularly when it comes to processing data from third-party applications and AI-driven content.
The dust has begun to settle on another successful RSA® Conference where SANS continued its 15-year tradition of highlighting some of the year's most concerning emerging threats.This year’s Top New Attacks & Threats Report and virtual event will take a deeper dive into the emerging threats discussed during the annual SANS keynote at RSA® Conference and look at numerous other noteworthy attacker trends. SANS Certified Instructor and event chair, Lee Crognale will provide mitigation strategies and actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Topics will include:The Security Cost of Technical DebtVerifying Identity in the Age of AILLMs Hyper-Accelerate the Exploitation LifecycleThe Use of AI to Defeat Novel MalwareThe Organizational Risks associated with Generative AIDeveloping Detection Mechanisms for Detecting Deepfakes & Gaining Digital Trust.Register for this virtual event now, and you will automatically receive the companion white paper upon publication.GET THE FULL EXPERIENCE - Join the SANS interactive Slack workspace for this event and you can connect live with SANS authors and speakers, have a chance to win prizes, and network with fellow attendees.
The cybersecurity workforce has exploded in recent years, with more than 1 million available jobs posted in 2023 alone. Daunting is the fact that the demand for skilled employees more than doubles the currently available workforce.
We continue to see the effects of living in an interconnected, digital world, which results in a rise in the number of cyber-attacks with each new year. Malware/Ransomware, Email Compromise, Distributed Denial of Service attacks, and Data Breaches continue to plague some of the largest industries and small businesses alike, and the cost of these damages is on pace to exceed 10 trillion dollars by 2025. As managers, consultants, and examiners, we know there is no silver bullet to thwart all attacks, and we realize that we must continue to improve our tools and practices to keep attackers at bay. Weeding through the various tools and free solutions and then implementing best practices for your workplace is often just as challenging as defending your resources in this constantly evolving landscape. Join us for this year’s DFIR Summit Solutions Track 2025 as invited speakers and subject matter experts walk through lessons learned and best practices on uncovering threats, identifying attacker activity, confirming data loss and what was compromised, and discuss ways to better secure your organizational assets moving forward.
Review relevant educational resources made with contribution from this instructor.