Forensics , Managed Detection & Response (MDR) , Network Detection & Response

MDR and the Role of Digital Forensics

John Irvine of eSentire on Enhancing Investigations, Response and Detection
John Irvine, vice president, digital forensics, eSentire

The threats have multiplied, tools have maxed out and the staff lacks capacity for real-time detection, investigation and response. Enter: MDR. John Irvine of eSentire discusses the power of MDR and the role of digital forensics.

See Also: Planning for 2025: Detection Engineering with the Elastic Global Threat Report

In this exclusive video interview with Information Security Media Group, Irvine, vice president of digital forensics at eSentire, discusses:

  • The role of an MDR provider;
  • The challenges both from external and internal threats;
  • How to think of digital forensics in the scope of an investigation.

Irvine is a multidisciplinary executive with skills in digital forensics, cyber profiling, intrusion investigations, program management and enterprise software product management. He has extensive cross-domain experience, having worked in federal law enforcement and intelligence as well as Fortune 500 companies and small businesses. Throughout his career, he has led multisite divisions of digital forensic examiners, incident responders, network intrusion specialists, forensic application developers and malicious code reverse engineers in support of our nation's most critical law enforcement and intelligence organizations and commercial enterprises.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.