On this episode of Advances in Care , host Erin Welsh and Dr. Craig Smith, Chair of the Department of Surgery and Surgeon-in-Chief at NewYork-Presbyterian and Columbia discuss the highlights of Dr. Smith’s 40+ year career as a cardiac surgeon and how the culture of Columbia has been a catalyst for innovation in cardiac care. Dr. Smith describes the excitement of helping to pioneer the institution’s heart transplant program in the 1980s, when it was just one of only three hospitals in the country practicing heart transplantation. Dr. Smith also explains how a unique collaboration with Columbia’s cardiology team led to the first of several groundbreaking trials, called PARTNER (Placement of AoRTic TraNscatheteR Valve), which paved the way for a monumental treatment for aortic stenosis — the most common heart valve disease that is lethal if left untreated. During the trial, Dr. Smith worked closely with Dr. Martin B. Leon, Professor of Medicine at Columbia University Irving Medical Center and Chief Innovation Officer and the Director of the Cardiovascular Data Science Center for the Division of Cardiology. Their findings elevated TAVR, or transcatheter aortic valve replacement, to eventually become the gold-standard for aortic stenosis patients at all levels of illness severity and surgical risk. Today, an experienced team of specialists at Columbia treat TAVR patients with a combination of advancements including advanced replacement valve materials, three-dimensional and ECG imaging, and a personalized approach to cardiac care. Finally, Dr. Smith shares his thoughts on new frontiers of cardiac surgery, like the challenge of repairing the mitral and tricuspid valves, and the promising application of robotic surgery for complex, high-risk operations. He reflects on life after he retires from operating, and shares his observations of how NewYork-Presbyterian and Columbia have evolved in the decades since he began his residency. For more information visit nyp.org/Advances…
پادکست هایی که ارزش شنیدن دارند
حمایت شده
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 469 Network Blocked Activity
21:59
21:59
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
21:59Today’s episode is all about Windows event logs that record blocked network connections. Blocked network events are interesting because they might signal that an attacker’s secondary or tertiary toolset isn’t working as intended. That’s good news from a security standpoint...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 468 Data Brokers & Ransomware
28:24
28:24
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
28:24Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 467 CVSS in Action
28:31
28:31
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
28:31The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 466 Malware Triage for File Types
23:54
23:54
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
23:54Understanding the behavior and characteristics of common file types used in attacks, such as executables, scripts, and document files, is essential for effective analysis. In this episode, we will explore practical approaches to triage malware, focusing on key indicators and techniques for prioritizing investigations.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 465 Network Permit Events
23:43
23:43
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
23:43Windows permit events, often overlooked, offer valuable details about allowed network connections that can reveal patterns of malicious activity. In this episode, we will dive into how analyzing these events can enhance network triage, enabling security teams to detect, scope, and respond to threats more effectively.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 464 Risk Assessments for DFIR
22:30
22:30
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
22:30Security risk assessments can be a tool for guiding and prioritizing incident response investigations. By evaluating the potential impact and likelihood of various threats, these assessments provide a structured framework to identify and mitigate risks effectively. This episode will explore how integrating security risk assessments into incident re…
…
continue reading
This week, we’re focusing on the Windows Prefetch artifact—a cornerstone in Windows forensics, especially for user endpoint investigations. In this episode, I’ll break down the Prefetch artifact from an investigative perspective, covering how to effectively leverage its evidence in forensic analysis. I’ll also highlight any recent changes to the ar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 462 Malware Triage Part 1
29:32
29:32
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
29:32This week, we’re exploring malware triage techniques. Unlike full binary analysis, malware triage is often seen as an essential skill that every digital forensic and incident response professional should master. In this episode, I’ll walk you through the core elements of malware triage, helping you understand the various skills needed to meet indus…
…
continue reading
This week, we’re diving into how to triage for PSEXEC evidence. PSEXEC leaves traces on both the source and target systems, making it essential to identify artifacts on each to determine whether a system was used as an attacker’s tool or was the target of an attack. While PSEXEC has somewhat fallen out of favor due to increased use of PowerShell fo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 460 Executing Linux
17:55
17:55
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
17:55Understanding how to search for executables is a critical skill in computer forensics. There are major differences in how executables are handled between Windows and Linux systems, so techniques that work on Windows won’t always translate effectively to Linux. In this episode, I’ll break down some triage techniques to help you quickly identify susp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 459 listening ports
26:40
26:40
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
26:40Welcome to today’s episode! We’re diving into network triage, focusing specifically on listening ports. While we often look for active connections, identifying suspicious services listening on a port can be equally crucial in your investigation. It’s essential to gather this information for both current, real-time data and historical analysis, prov…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 458 Shellbags and PCA
18:11
18:11
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
18:11In this episode, we’ll dive into two essential forensic artifacts in Windows: shellbags and the Program Compatibility Assistant (PCA). Shell bags provide valuable evidence of file and folder access, offering insights into user activity and file navigation. We’ll also explore PCA, which can reveal important information about file execution history. …
…
continue reading
The Linux subsystem for Windows, create both opportunity and challenges for forensic analysts. It makes Windows an excellent platform for multi platform forensic analysis tasks, allowing it to take advantage of the many Linux tools available. The challenges are foreseeable, you have Linux artifacts, now commingled on a Windows platform, which makes…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 456 network triage primer
32:05
32:05
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
32:05In this episode, we’ll explore the fundamentals of network triage, focusing on the key aspects of network traffic that are central to many investigations. Additionally, we’ll discuss some of the essential tools you can use to analyze and manage network data effectively.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 455 Security Control Circumvention
33:29
33:29
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
33:29Today, we’re going to explore how to handle a critical security event: Unauthorized Modification of Information. This type of event occurs when a user alters information in a system—whether it’s an application, database, website, server, or configuration files—without prior authorization. These modifications can range from impersonation and unautho…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 454 MFA Bypass Attacks
15:30
15:30
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
15:30This week I talk about the attack methods being used to bypass MFA. We'll learn about real-world cases where MFA was circumvented, and discover best practices to strengthen defenses against these types of attacks...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DFSP # 453 Windows Startup Locations
18:19
18:19
پخش در آینده
پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
18:19In today’s episode, we’ll focus on startup folders, which are perhaps the easiest to triage among all persistence mechanisms. But before diving in, let’s recap the journey so far to underscore the importance of a comprehensive approach rather than a one-off tactic. Each triage area we've covered plays a crucial role in identifying and stopping atta…
…
continue reading