Jason Jordaan
Principal InstructorPrincipal Forensic Analyst Principal Forensic Analyst at DFIRLABS
Specialities
Digital Forensics and Incident Response
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsDigital Forensics and Incident Response
Jason Jordaan is a digital forensics, incident response, and cybercrime investigation specialist. He has been acknowledged in as an expert witness in these fields in the High Court of South Africa. He began his digital forensics career in the early days of the development of the digital forensics discipline when he combined his love for computers and technology with his role as a police detective. He served as a detective with the South African Police Service Commercial Branch, before moving to the Special Investigating Unit, where he established their digital forensics laboratory. As the founder and Principal Forensic Analyst of DFIRLABS, Jason leads the practice, and continues to conduct high-level digital forensics engagements throughout the globe.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
This presentation will explore the differences between how digital forensics is used when applied towards a forensic science goal, or a forensic engineering goal, in incident response.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
Presentation 1 - The Five ICS Cybersecurity Critical Controls for APAC PractitionersPeter Jackson, Certified Instructor CandidatePresentation 2 - Establishing the Link Between Corruption and CybercrimeJason Jordaan, Principal Instructor
Investigation is often considered both an art and a science, and practitioners merge these disciplines in the search for the facts in their investigations. While the best tool in both art and science is the amazing capacity of the human brain, and this is especially apparent in the field of digital forensics and incident response, where we match ourselves against the creative ingenuity of committed and capable threat actors; we do need other tools to make our work possible. The digital forensics and incident response tools that we have available to ourselves enhance our abilities to examine and analyze the digital evidence that we need to be able to successful solve the cases and incidents that we are engaged with. These tools enable us, they improve efficiency and effectiveness, and they provide valuable capabilities in the fight against the threat actors we face. As the threats we face evolve, so to must the tools that we use. The SANS DFIR Summit Solutions Track highlight recent developments in the tools and solutions that are available to us. Join us as we explore some of the cutting-edge tools and solutions that we can utilize in our DFIR operations.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.
Modern organizations are often complex ecosystems of multiple systems. With increased usage of cloud-based Applications as a Service, more and more organizations are making use of third-party services to provide specific functionality to support their overall information systems architecture. In this SANS First Look webcast, we examine Vorlon, a platform that enables proactive security of your third-party application ecosystem; the ability to detect and respond to third-party application security incidents; and to ensure compliance with laws, regulations, and rules when it comes to third-party API risks.
This talk will explore how corruption related to cybercrime works, how organized crime groups identify targets, and talk about a case study that the presenter was involved in, where a cybercrime group used corruption to pull off a major hack of several government departments.
Cybercrime continues to evolve, and as forensic analysts and incident responders, we often are in a virtual arms race with the criminals. While the best tool in both art and science is the amazing capacity of the human brain, and this is especially apparent in the field of digital forensics and incident response, where we match ourselves against the creative ingenuity of committed and capable criminals; we do need other tools to make our work possible. We need to make sure that we constantly look at the capabilities that are out there that give us the best weaponry to defend our environments.
Through a discussion of three cases, one criminal, and two civil, the presenter will show how digital forensic evidence presented by either an unqualified or biased digital forensic practitioner almost destroyed the lives of the parties in court, and how a proper scientific approach to digital forensics assisted in the courts in achieving justice.
Many cybersecurity researchers and ethical hackers are becoming the target of criminal prosecutions and litigation, essentially for trying to do the right thing, and acting in an ethical manner. The reality is that cybersecurity researchers, practitioners and ethical hackers do run the risk of running afoul of both criminal and civil law. This talk will explore the various typs of laws and legal actions that could impact on them, and how to work within the framework of applicable laws, and essentially keep them safe from legal harm.
This talk will look at how attackers are actually making use of artificial intelligence to attack organizations through social engineering attacks, and what organizations can do to try and actually address these threats.
This talk will look at how attackers are actually making use of artificial intelligence to attack organizations through social engineering attacks, and what organizations can do to try and actually address these threats.
Review relevant educational resources made with contribution from this instructor.