Skip to content
HOSTED BY DOUGLAS A. BRUSH

#080 – Heather Mahalik: Earn The Tool

Heather Mahalik is the Senior Director of Digital Intelligence at Cellebrite and a Senior Instructor, author and course lead for FOR585: Smartphone Forensic Analysis In-Depth. To say that digital forensics is central to Heather’s life is quite an understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to media associated…

Listen to Episode

#079 – Mari DeGrazia: Not Just One Technology

Mari DeGrazia is a Senior Vice President in the Cyber Risk practice of Kroll, a division of Duff & Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital forensics community. Mari joined Kroll from Verizon Enterprises where she served as Case Lead on various…

Listen to Episode

#078 – Nadean Tanner: Boil It Down

When my 7-year-old introduced me to his second-grade class, he put it best: “My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber.” – Nadean Tanner Nadean Tanner is the Senior Manager of Technical Education Programs at Puppet. She is responsible for all things product…

Listen to Episode

#077 – Frank Downs: Know When To Leave

Frank Downs is the director of cybersecurity practices at ISACA. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity…

Listen to Episode

#076 – Lesley Carhart: You’ve Got to Play the Game

Lesley Carhart is a Principal Threat Analyst at the Threat Operations Center at Dragos. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy…

Listen to Episode