Dan Sutch

SIRS Europe – A Carnoustie Company

Dan Sutch trained as a journalist before joining the Carnoustie group in 2011 as a research analyst. Dan now specialises in open source intelligence gathering, computer forensics and data analytics, having gained considerable experience in the use of various software tools, including Nuix, Autopsy and Discovery - a proprietary suite of tools for ‘deep web’ analysis.

When not managing analysis projects Dan acts as the group’s IT manager and is responsible for ensuring the smooth running of software and hardware within the business and delivering on information security and compliance objectives. Dan brings technical expertise, project and process management skills and an eye for detail to his back-office role with Carnoustie.

dont miss

Utilising Technology in Open Source Intelligence, Investigation and E-disclosure

Over and above statutory and commercial data sources, the internet provides a wealth of intelligence opportunities not limited to thorough analysis of social media and forums but also including a detailed drill down into website infrastructure and web traffic. Often this information is unavailable elsewhere and provides valuable colour and detail to the investigator. Despite its value, such information is gathered from entirely open sources so can be used freely in proceedings as necessary.

EVEN MORE SEMINARS

  • Howard Roberts: Speaking at the Legalex

    Howard Roberts
    HP

    The Forgotten Piece of Endpoint Security in your Office

  • James Ratcliffe: Speaking at the Legalex

    James Ratcliffe
    Tricostar

    Cyber Security Perimeters are No Longer Enough – It’s The Data ……

  • Osman Ismail: Speaking at the Legalex

    Osman Ismail
    DPS Software

    How to use your PMS to Comply with GDPR

  • Christopher Tweedie: Speaking at the Legalex

    Christopher Tweedie
    LEAP Legal Software

    Cloud Technology: The Rise of the Digital Lawyer

  • Andrew Hollister: Speaking at the Legalex

    Andrew Hollister
    LogRhythm

    Threats are evolving. A new approach to cyber security is required