{"id":62289,"date":"2022-05-06T10:39:25","date_gmt":"2022-05-06T08:39:25","guid":{"rendered":"https:\/\/eiposgrados.com\/?post_type=evento&#038;p=62289"},"modified":"2022-05-10T10:05:58","modified_gmt":"2022-05-10T08:05:58","slug":"technological-expertise-presenting-digital-evidence-as-proof","status":"publish","type":"evento","link":"https:\/\/eiposgrados.com\/eng\/events\/technological-expertise-presenting-digital-evidence-as-proof\/","title":{"rendered":"Technological Expertise, presenting digital evidence as proof"},"content":{"rendered":"<h2 class=\"gb-headline gb-headline-2af66e92 gb-headline-text\"><strong>Webinar Description<\/strong>:<\/h2>\n\n\n\n<p>Every time we find more assumptions of <strong>cyber bullying<\/strong>, information leaks, espionage, identity \u201ctheft\u201d, attacks on computer systems\u2026<\/p>\n\n\n\n<p>To <strong>report <\/strong>These situations, it is necessary to be able to demonstrate them and, for this, the star test is the <strong>expert evidence <\/strong>computing or technology. The preparation of a computerized expert report, which serves as evidence in a trial, requires <strong>qualified professionals<\/strong> and specifically trained in computer forensics, since, on the one hand, there is digital evidence that is volatile, which means that incorrect handling of it could make it disappear and, on the other hand, bad practice in the collection procedure and Analysis of the evidence could result in an invalidation of the test.<\/p>\n\n\n\n<p>Not all cases go to trial. Sometimes, the expert reports are so conclusive that the opposing party accepts in advance \u201ctheir defeat\u201d and an agreement is reached; other times, the client requests the expert report not to report, but to ensure that their devices or systems are not compromised...<\/p>","protected":false},"excerpt":{"rendered":"<p>Free webinar War in cyberspace, the fifth domain. We tell you everything!<\/p>","protected":false},"featured_media":62391,"template":"","area_evento":[1079,1080,1168],"class_list":["post-62289","evento","type-evento","status-publish","has-post-thumbnail","hentry","area_evento-ciberseguridad-y-programacion-python","area_evento-diseno-y-desarrollo-web","area_evento-fullstack"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/62289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/evento"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/62289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/62391"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=62289"}],"wp:term":[{"taxonomy":"area_evento","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/area_evento?post=62289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}