Episode 112: Evidence Acquisition and Chain of Custody

Once an incident is detected, preserving evidence becomes a top priority. In this episode, we walk through the evidence acquisition process—from initial identification to collection, storage, and transfer. You’ll learn what types of evidence are collected during security incidents, including disk images, memory dumps, log files, and email headers, and how to maintain forensic integrity throughout the process.
We also cover the chain of custody: a detailed record of how evidence is handled, who accessed it, and how it was secured. This is critical for maintaining legal admissibility and ensuring internal accountability. For the CySA+ exam, questions on chain of custody and evidence handling are common. In the field, mistakes here can derail entire investigations. This episode helps you avoid those mistakes and operate with forensic discipline. Brought to you by BareMetalCyber.com
Episode 112: Evidence Acquisition and Chain of Custody
Broadcast by