FOR585: Smartphone Forensic Analysis In-Depth
Mattia Epifani
SANS London May 2023
In Person and Live Online
Consultant at Reality Net – System Solutions where she deals with computer programming and accounting.
Mattia Epifani
SANS London May 2023
In Person and Live Online
Mattia Epifani
RSA Conference 2023
San Francisco
Mattia Epifani
Security Summit 2023
Milano
Mattia Epifani
SANS Copenaghen January 2023
In Person
Mattia Epifani
SANS Frankfurt December 2022
In Person
Mattia Epifani
SANS Amsterdam November 2022
In Person and Live Online
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Consultant at Reality Net – System Solutions where she deals with digital forensics and IT security.
She obtained the Master Degree in Electronic Engineering on 2013 from University of Genoa.
She obtainded a Ph.D. in Science and Technology for Electronic and Telecommunications Engineering at the Department of Electrical, Electronic, Telecommunications Engineering and Naval Architecture (DITEN) of the University of Genova on 2017.
Mattia Epifani
SANS London May 2023
In Person and Live Online
Mattia Epifani
RSA Conference 2023
San Francisco
Mattia Epifani
Security Summit 2023
Milano
Mattia Epifani
SANS Copenaghen January 2023
In Person
Mattia Epifani
SANS Frankfurt December 2022
In Person
Mattia Epifani
SANS Amsterdam November 2022
In Person and Live Online
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Partner and founder at REALITY NET – System Solutions, where he works as a senior consultant in Digital Forensics, Forensic Readiness, Mobile Security and Incident Response
He obtained a University Degree in Computer Science in Genoa and a post-graduate course in Computer Forensics and Digital Investigations in Milan. He works as a digital forensics analyst for judges, prosecutors, lawyers and private companies, both as Court Witness Expert and Digital Forensics Expert.
He has obtained several certifications in Digital Forensics and Ethical Hacking:
Mattia Epifani
SANS London May 2023
In Person and Live Online
Mattia Epifani
RSA Conference 2023
San Francisco
Mattia Epifani
Security Summit 2023
Milano
Mattia Epifani
SANS Copenaghen January 2023
In Person
Mattia Epifani
SANS Frankfurt December 2022
In Person
Mattia Epifani
SANS Amsterdam November 2022
In Person and Live Online
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.