{"id":8952,"date":"2025-11-24T09:56:06","date_gmt":"2025-11-24T15:56:06","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=8952"},"modified":"2026-04-28T08:15:44","modified_gmt":"2026-04-28T14:15:44","slug":"warren-kruse","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/warren-kruse\/","title":{"rendered":"Warren Kruse, Managing Director"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-8952\" data-postid=\"8952\" class=\"themify_builder_content themify_builder_content-8952 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_6m5c054 tb_first tf_w\">\n                        <div class=\"row_inner col_align_middle gutter-none tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_2gx2990 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_vzuw077 image-top circle  tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg\" class=\"wp-post-image wp-image-9108\" title=\"Warren Kruse, Managing Director\" alt=\"Warren Kruse, Managing Director\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg 800w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-300x300.jpeg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-150x150.jpeg 150w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-768x768.jpeg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-12x12.jpeg 12w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-2 tb_syep770 last\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_zmtm700  inline-fancy-heading\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_inline_b\">\n                    Warren Kruse            <\/span>\n\n    \n    <span class=\"sub-head tf_inline_b tf_rel\">\n                    iDS Managing Director            <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-css_id=\"v85v900\" data-lazy=\"1\" class=\"module_row themify_builder_row fullwidth_row_container tb_v85v900 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_odqs070 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_kmcw447\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_icgc447 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_lj98040\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Warren Kruse has spent more than thirty years in the places where truth hides: in hard drives, in network logs, and in the faint digital traces most people never see. As Managing Director at iDiscovery Solutions (iDS), he brings the instincts of a former New Jersey police officer and the precision of a seasoned forensic expert to every matter he leads.<\/p>\n<p>His career has carried him through government agencies, global corporations, and cross-border investigations where the stakes were measured in billions, not budgets. He has unraveled intellectual property theft, exposed fraud, and guided organizations through the pressure of regulatory scrutiny. When the U.S. Securities and Exchange Commission needed a computer forensic expert, they called Warren. He testified. And he delivered.<\/p>\n<p>Warren is not only versed in the field. He has shaped it. He co-authored Computer Forensics: Incident Response Essentials, a foundational text for modern investigators. His work on the Comtraid intellectual property and trade secrets case earned HTCIA\u2019s Case of the Year award. Later, the organization honored him with its Lifetime Achievement Award, a recognition reserved for those who elevate an entire profession.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_ehwq447 last\">\n                    <!-- module video -->\n<div  class=\"module module-video tb_0yvq847 video-top\" data-lazy=\"1\">\n                    <div class=\"video-wrap-outer\">\n            <div class=\"video-wrap tf_rel tf_overflow\">\n                                    <noscript><iframe data-no-script src=\"https:\/\/www.youtube.com\/embed\/HJR-HdpXX5A?pip=1&#038;playsinline=1\" allow=\"accelerometer;encrypted-media;gyroscope;picture-in-picture;fullscreen\" class=\"tf_abs tf_w tf_h\"><\/iframe><\/noscript>\n                                <\/div>\n            <!-- \/video-wrap -->\n        <\/div>\n        <!-- \/video-wrap-outer -->\n            <\/div>\n<!-- module text -->\n<div  class=\"module module-text tb_64ni249\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><strong><a class=\"ptb_link_button\" href=\"tel:(202)%20249-7833\" target=\"_blank\" rel=\"noopener noreferrer\">(202) 249-7833 <\/a>\u00a0 <span style=\"color: #ee5d20;\">|<\/span>\u00a0 <a class=\"ptb_link_button\" href=\"mailto:WKruse@idsinc.com\" target=\"_blank\" rel=\"noopener noreferrer\">WKruse@idsinc.com <\/a>\u00a0<span style=\"color: #ee5d20;\">|\u00a0<\/span><\/strong><a class=\"ptb_extra_icon_link\" href=\"https:\/\/www.linkedin.com\/in\/warrenkruse\/\"><span class=\"ptb_extra_icon_label\"><strong>LinkedIn<\/strong><\/span><\/a><span class=\"ptb_extra_icon_label\"><strong>\u00a0 <span style=\"color: #ee5d20;\">|\u00a0<\/span> <a href=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/iDS-DH-CV-WarrenKruse-2025.pdf\" target=\"_blank\" rel=\"noopener\">CV<\/a><\/strong><\/span><\/p>    <\/div>\n<\/div>\n<!-- \/module text --><div  class=\"module themify_builder_slider_wrap tf_clearfix module-slider tb_dsv7404  slider-default\" data-lazy=\"1\">\n        <div class=\"themify_builder_slider tf_carousel tf_swiper-container tf_rel tf_overflow\" data-lazy=\"1\"        data-visible=\"1\"\n        data-tab-visible=\"1\"\n        data-mob-visible=\"1\"\n        data-scroll=\"1\"\n                        data-pause_hover=\"1\"\n        data-speed=\"1\"\n        data-wrapvar=\"1\"\n        data-slider_nav=\"1\"\n        data-pager=\"1\"\n        data-effect=\"scroll\" \n        data-height=\"auto\"\n        data-css_url=\"https:\/\/idsinc.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/carousel,https:\/\/idsinc.com\/wp-content\/themes\/themify-ultra\/themify\/themify-builder\/css\/modules\/sliders\/slider\"\n                    >\n        <div class=\"tf_swiper-wrapper tf_lazy tf_rel tf_w tf_h tf_textc\">\n                 <div class=\"tf_swiper-slide\">            <div class=\"slide-inner-wrap\">\n                <div class=\"slide-content tb_text_wrap\">\n                    <p style=\"text-align: center;\"><span id=\"page247R_mcid24\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\">\u201c<\/span><\/span><strong><em>Don\u2019t plead your case, prove it. Data tells a story, and our job is to uncover the truth with clarity, integrity, and objectivity.<\/em><\/strong><span id=\"page247R_mcid28\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\">\u201d<\/span><\/span><span id=\"page247R_mcid29\" class=\"markedContent\"><br role=\"presentation\"><span dir=\"ltr\" role=\"presentation\"><br><\/span><\/span><strong>~ Warren Kruse<\/strong><\/p>                <\/div>\n            <\/div>\n        <\/div>            <\/div>\n    <\/div>\n<\/div>\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_a7ra549\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_svhc549 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_73xg000\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Whether he is leading a high-stakes engagement or speaking at conferences, Warren pushes investigations beyond surface-level searches. He champions advanced techniques such as concept analytics to reveal the patterns, connections, and meaning hidden inside data.<\/p>\n<p><span style=\"font-weight: bold; font-style: italic;\">He holds a Master of Science in Digital Investigation Management and a Bachelor of Science in Digital Forensics from Champlain College. He continues to contribute to the field as an active member of the American Academy of Forensic Sciences, HTCIA, ISC2, and The Sedona Conference.<\/span><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_3 tb_x8bt638\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_znpw638 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_zux1638\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h6><strong>Certifications<\/strong><\/h6>\n<div>\u2022 CISSP (Information Systems Security)<\/div>\n<div>\u2022 CFCE (Certified Forensic Computer Examiner)<\/div>\n<div>\u2022 DFCP (Digital Forensics Certification Board)<\/div>\n<div>\u2022 EnCE (EnCase Certified Examiner)<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_9rmz221\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_b74k759\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h6><strong>Achievements<\/strong><\/h6>\n<div>HTCIA President 2002 and 2020<\/div>\n<div>DFCB President\u00a0<\/div>\n<div>HTCIA Case of the Year for Theft of IP<\/div>\n<div>HTCIA Lifetime achievement<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col3-1 tb_ka3e627 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_t44y123\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h6><strong>Education<\/strong><\/h6>\n<p>MSc (Master of Science)\u00a0<br>B.S., Digital Forensics<\/p>\n<p>\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_brlq530 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_4jk8530 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_8l9s57\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3><span style=\"font-weight: bold;\">Areas of Focus<\/span><\/h3>\n<p>Cyber Investigations\u00a0<span style=\"color: #ee5d20;\"> \u00b7\u00a0<\/span> Digital &amp; Mobile Forensics\u00a0<span style=\"color: #ee5d20;\"> \u00b7\u00a0<\/span> eDiscovery Lifecycle (Identification to Hosting)\u00a0<span style=\"color: #ee5d20;\"> \u00b7\u00a0<\/span> IoT Data<span style=\"color: #ee5d20;\">\u00a0 \u00b7\u00a0<\/span> Intellectual Property Theft\u00a0 <span style=\"color: #ee5d20;\">\u00b7\u00a0<\/span> Cross-Border Data Issues\u00a0<span style=\"color: #ee5d20;\"> \u00b7\u00a0<\/span> Incident Response<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_drfx000 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_x1ji700 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_hhnm81\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_8ii181 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_cmxm81\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading tf_textl\">\n    <span class=\"main-head tf_block\">\n                    Computer Forensics: Incident Response Essentials            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_jsr2000\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_pu19710 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_vb1d111 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <a href=\"https:\/\/www.amazon.com\/Computer-Forensics-Incident-Response-Essentials\/dp\/0201707195\" rel=\"noopener\" target=\"_blank\">\n                   <img loading=\"lazy\" decoding=\"async\" width=\"1103\" height=\"1360\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg\" class=\"wp-post-image wp-image-8969\" title=\"Computer Forensics: Incident Response Essentials\" alt=\"Computer Forensics: Incident Response Essentials\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg 1103w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-243x300.jpg 243w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-830x1024.jpg 830w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-768x947.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-10x12.jpg 10w\" sizes=\"auto, (max-width: 1103px) 100vw, 1103px\" \/>        <\/a>\n    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_754u014 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_yjjp100\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h5><span style=\"font-weight: bold;\">Every computer crime leaves tracks\u2014you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene.<\/span><\/h5>\n<p>Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity.<\/p>\n<p>Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding.<\/p>\n<p>Written by two experts in digital investigation, <span class=\"a-text-bold a-text-italic\">Computer Forensics<\/span> provides extensive information on how to handle the computer as evidence. <span class=\"a-text-bold\">Kruse<\/span> and <span class=\"a-text-bold\">Heiser<\/span> walk the reader through the complete forensics process\u2014from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT\/2000 operating systems are thoroughly covered.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_riqc268\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_hbrl268 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_vvac268\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><span class=\"a-text-bold a-text-italic\">Computer Forensics<\/span> is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle tb_col_count_2 tb_h7fr268\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_0lac268 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_7w95268 image-top circle  tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg\" class=\"wp-post-image wp-image-9108\" title=\"Warren Kruse, Managing Director\" alt=\"Warren Kruse, Managing Director\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg 800w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-300x300.jpeg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-150x150.jpeg 150w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-768x768.jpeg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-12x12.jpeg 12w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_sydt268 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_vcae268\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h4><strong>Get your copy of <em>Computer Forensics: Incident Response Essentials<\/em> by Warren G. Kruse II, and Jay G. Heiser<\/strong><\/h4>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module buttons -->\n<div  class=\"module module-buttons tb_sd8t268 buttons-horizontal solid\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"https:\/\/idsinc.com\/en_gb\/5year-old-ceo\/\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                Get Your Copy Today                                        <em><svg  class=\"tf_fa tf-fas-book-open\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-fas-book-open\" xlink:href=\"#tf-fas-book-open\"><\/use><\/svg><\/em>                            <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_nzak268 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_0eff376\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h6>This book provides a detailed methodology for collecting, preserving, and effectively using evidence by addressing the three A&#8217;s of computer forensics:<\/h6>\n<ul class=\"a-unordered-list a-vertical\">\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Acquire<\/span> the evidence without altering or damaging the original data. <\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Authenticate<\/span> that your recorded evidence is the same as the original seized data. <\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Analyze<\/span> the data without modifying the recovered data.<\/span><\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_9u8i400 tf_w\">\n            <span  class=\"builder_row_cover tf_abs\" data-lazy=\"1\"><\/span>            <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_38zo202 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_middle gutter-none tb_col_count_2 tb_vhln170\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_4fam120 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_e1ig290\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Featured Publications            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_41ax001\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>iDS&#8217; team of experts is at the forefront of the ever-evolving industry that is eDiscovery and Data Analytics. In this digital world of evolving technology and AI innovation, it is more important than ever to learn from and stay connected with these experienced specialists.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-2 tb_ipb2170 last\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_1 tb_qurz044\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col-full tb_htb0429 first\">\n                    <!-- module buttons -->\n<div  class=\"module module-buttons tb_gq6m615 buttons-horizontal solid  large squared buttons-fullwidth\" data-lazy=\"1\">\n        <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"https:\/\/www.msn.com\/en-us\/news\/other\/hunter-mcmahon-how-to-design-legal-tech-that-enhances-judgment-not-replaces-it\/ar-AA1NB4NK?disableErrorRedirect=true&#038;infiniteContentCount=0\" class=\"ui builder_button tf_in_flx tb_default_color\" target=\"_blank\" rel=\"noopener\">\n                                                Cracking Cases: Warren Kruse II on Mastering Custodial Interviews for Mobile Forensics \u2014 MSN                                         <\/a>\n                <\/div>\n                    <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Incident_Response_Guide\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                The Sedona Conference Drafting Team Member: Incident Response Guide                                        <\/a>\n                <\/div>\n                    <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Primer_on_Electronic_Discovery_Implications_of_Internet_of_Things\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                The Sedona Conference Drafting Team Member: IoT                                         <\/a>\n                <\/div>\n                    <div class=\"module-buttons-item tf_in_flx\">\n                        <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Primer_on_Electronic_Discovery_Implications_of_Internet_of_Things\" class=\"ui builder_button tf_in_flx tb_default_color\" >\n                                                The Sedona Conference Drafting Team Member: Mobile                                          <\/a>\n                <\/div>\n            <\/div>\n<!-- \/module buttons -->\n        <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n        <!-- module text -->\n<div  class=\"module module-text tb_u5db000\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3><span id=\"page247R_mcid20\"><\/span><span class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\">To learn more about Warren, contact him at <\/span><\/span><a class=\"ptb_link_button\" href=\"tel:(202)%20249-7833\" target=\"_blank\" rel=\"noopener noreferrer\">(202) 249-7833 <\/a>\u00a0, <a class=\"ptb_link_button\" href=\"mailto:WKruse@idsinc.com\" target=\"_blank\" rel=\"noopener noreferrer\">WKruse@idsinc.com, <\/a>or on his<a class=\"ptb_extra_icon_link\" href=\"https:\/\/www.linkedin.com\/in\/warrenkruse\/\">\u00a0<span class=\"ptb_extra_icon_label\">LinkedIn.<\/span><\/a><\/h3>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Warren Kruse has spent more than thirty years in the places where truth hides: in hard drives, in network logs, and in the faint digital traces most people never see. As Managing Director at iDiscovery Solutions (iDS), he brings the instincts of a former New Jersey police officer and the precision of a seasoned forensic [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9108,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-8952","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Warren Kruse, Managing Director - iDiscovery Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/warren-kruse\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Warren Kruse, Managing Director\" \/>\n<meta property=\"og:description\" content=\"Warren Kruse has spent more than thirty years in the places where truth hides: in hard drives, in network logs, and in the faint digital traces most people never see. As Managing Director at iDiscovery Solutions (iDS), he brings the instincts of a former New Jersey police officer and the precision of a seasoned forensic [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/warren-kruse\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T14:15:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/\",\"name\":\"Warren Kruse, Managing Director - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/warren-head.jpeg\",\"datePublished\":\"2025-11-24T15:56:06+00:00\",\"dateModified\":\"2026-04-28T14:15:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/warren-head.jpeg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/warren-head.jpeg\",\"width\":800,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/warren-kruse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Warren Kruse, Managing Director\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Warren Kruse, Managing Director - iDiscovery Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/warren-kruse\/","og_locale":"en_GB","og_type":"article","og_title":"Warren Kruse, Managing Director","og_description":"Warren Kruse has spent more than thirty years in the places where truth hides: in hard drives, in network logs, and in the faint digital traces most people never see. As Managing Director at iDiscovery Solutions (iDS), he brings the instincts of a former New Jersey police officer and the precision of a seasoned forensic [&hellip;]","og_url":"https:\/\/idsinc.com\/en_gb\/warren-kruse\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2026-04-28T14:15:44+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/warren-kruse\/","url":"https:\/\/idsinc.com\/warren-kruse\/","name":"Warren Kruse, Managing Director - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/warren-kruse\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/warren-kruse\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg","datePublished":"2025-11-24T15:56:06+00:00","dateModified":"2026-04-28T14:15:44+00:00","breadcrumb":{"@id":"https:\/\/idsinc.com\/warren-kruse\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/warren-kruse\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/warren-kruse\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/warren-kruse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Warren Kruse, Managing Director"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg\" title=\"Warren Kruse, Managing Director\" alt=\"Warren Kruse, Managing Director\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg 800w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-300x300.jpeg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-150x150.jpeg 150w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-768x768.jpeg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-12x12.jpeg 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\n<h1>Warren Kruse<br\/>iDS Managing Director<\/h1>\n<p>Warren Kruse has spent more than thirty years in the places where truth hides: in hard drives, in network logs, and in the faint digital traces most people never see. As Managing Director at iDiscovery Solutions (iDS), he brings the instincts of a former New Jersey police officer and the precision of a seasoned forensic expert to every matter he leads.<\/p> <p>His career has carried him through government agencies, global corporations, and cross-border investigations where the stakes were measured in billions, not budgets. He has unraveled intellectual property theft, exposed fraud, and guided organizations through the pressure of regulatory scrutiny. When the U.S. Securities and Exchange Commission needed a computer forensic expert, they called Warren. He testified. And he delivered.<\/p> <p>Warren is not only versed in the field. He has shaped it. He co-authored Computer Forensics: Incident Response Essentials, a foundational text for modern investigators. His work on the Comtraid intellectual property and trade secrets case earned HTCIA\u2019s Case of the Year award. Later, the organization honored him with its Lifetime Achievement Award, a recognition reserved for those who elevate an entire profession.<\/p>\n[embed]https:\/\/youtu.be\/HJR-HdpXX5A[\/embed]\n<p><strong><a href=\"tel:(202)%20249-7833\" target=\"_blank\" rel=\"noopener noreferrer\">(202) 249-7833 <\/a>\u00a0 |\u00a0 <a href=\"mailto:WKruse@idsinc.com\" target=\"_blank\" rel=\"noopener noreferrer\">WKruse@idsinc.com <\/a>\u00a0|\u00a0<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/warrenkruse\/\"><strong>LinkedIn<\/strong><\/a><strong>\u00a0 |\u00a0 <a href=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/iDS-DH-CV-WarrenKruse-2025.pdf\" target=\"_blank\" rel=\"noopener\">CV<\/a><\/strong><\/p>\n<p style=\"text-align: center;\">\u201c<strong><em>Don\u2019t plead your case, prove it. Data tells a story, and our job is to uncover the truth with clarity, integrity, and objectivity.<\/em><\/strong>\u201d<br role=\"presentation\"><br><strong>~ Warren Kruse<\/strong><\/p>\n<p>Whether he is leading a high-stakes engagement or speaking at conferences, Warren pushes investigations beyond surface-level searches. He champions advanced techniques such as concept analytics to reveal the patterns, connections, and meaning hidden inside data.<\/p> <p>He holds a Master of Science in Digital Investigation Management and a Bachelor of Science in Digital Forensics from Champlain College. He continues to contribute to the field as an active member of the American Academy of Forensic Sciences, HTCIA, ISC2, and The Sedona Conference.<\/p>\n<h6><strong>Certifications<\/strong><\/h6> \u2022 CISSP (Information Systems Security) \u2022 CFCE (Certified Forensic Computer Examiner) \u2022 DFCP (Digital Forensics Certification Board) \u2022 EnCE (EnCase Certified Examiner)\n<h6><strong>Achievements<\/strong><\/h6> HTCIA President 2002 and 2020 DFCB President\u00a0 HTCIA Case of the Year for Theft of IP HTCIA Lifetime achievement\n<h6><strong>Education<\/strong><\/h6> <p>MSc (Master of Science)\u00a0<br>B.S., Digital Forensics<\/p> <p>\u00a0<\/p>\n<h3>Areas of Focus<\/h3> <p>Cyber Investigations\u00a0 \u00b7\u00a0 Digital &amp; Mobile Forensics\u00a0 \u00b7\u00a0 eDiscovery Lifecycle (Identification to Hosting)\u00a0 \u00b7\u00a0 IoT Data\u00a0 \u00b7\u00a0 Intellectual Property Theft\u00a0 \u00b7\u00a0 Cross-Border Data Issues\u00a0 \u00b7\u00a0 Incident Response<\/p>\n<h2>Computer Forensics: Incident Response Essentials<br\/><\/h2>\n<a href=\"https:\/\/www.amazon.com\/Computer-Forensics-Incident-Response-Essentials\/dp\/0201707195\" rel=\"noopener\" target=\"_blank\"> <img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg\" title=\"Computer Forensics: Incident Response Essentials\" alt=\"Computer Forensics: Incident Response Essentials\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics.jpg 1103w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-243x300.jpg 243w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-830x1024.jpg 830w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-768x947.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/11\/Computer-Forensics-10x12.jpg 10w\" sizes=\"(max-width: 1103px) 100vw, 1103px\" \/> <\/a>\n<h5>Every computer crime leaves tracks\u2014you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene.<\/h5> <p>Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity.<\/p> <p>Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding.<\/p> <p>Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process\u2014from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT\/2000 operating systems are thoroughly covered.<\/p>\n<p>Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.<\/p>\n<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg\" title=\"Warren Kruse, Managing Director\" alt=\"Warren Kruse, Managing Director\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head.jpeg 800w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-300x300.jpeg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-150x150.jpeg 150w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-768x768.jpeg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2025\/12\/warren-head-12x12.jpeg 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\n<h4><strong>Get your copy of <em>Computer Forensics: Incident Response Essentials<\/em> by Warren G. Kruse II, and Jay G. Heiser<\/strong><\/h4>\n<a href=\"https:\/\/idsinc.com\/5year-old-ceo\/\" > Get Your Copy Today <em><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" aria-hidden=\"true\"><use href=\"#tf-fas-book-open\" xlink:href=\"#tf-fas-book-open\"><\/use><\/svg><\/em> <\/a>\n<h6>This book provides a detailed methodology for collecting, preserving, and effectively using evidence by addressing the three A's of computer forensics:<\/h6> <ul> <li>Acquire the evidence without altering or damaging the original data. <\/li> <li>Authenticate that your recorded evidence is the same as the original seized data. <\/li> <li>Analyze the data without modifying the recovered data.<\/li> <\/ul>\n<h2>Featured Publications<br\/><\/h2>\n<p>iDS' team of experts is at the forefront of the ever-evolving industry that is eDiscovery and Data Analytics. In this digital world of evolving technology and AI innovation, it is more important than ever to learn from and stay connected with these experienced specialists.<\/p>\n<a href=\"https:\/\/www.msn.com\/en-us\/news\/other\/hunter-mcmahon-how-to-design-legal-tech-that-enhances-judgment-not-replaces-it\/ar-AA1NB4NK?disableErrorRedirect=true&#038;infiniteContentCount=0\" target=\"_blank\" rel=\"noopener\"> Cracking Cases: Warren Kruse II on Mastering Custodial Interviews for Mobile Forensics \u2014 MSN <\/a> <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Incident_Response_Guide\" > The Sedona Conference Drafting Team Member: Incident Response Guide <\/a> <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Primer_on_Electronic_Discovery_Implications_of_Internet_of_Things\" > The Sedona Conference Drafting Team Member: IoT <\/a> <a href=\"https:\/\/www.thesedonaconference.org\/publication\/Primer_on_Electronic_Discovery_Implications_of_Internet_of_Things\" > The Sedona Conference Drafting Team Member: Mobile <\/a>\n<h3>To learn more about Warren, contact him at <a href=\"tel:(202)%20249-7833\" target=\"_blank\" rel=\"noopener noreferrer\">(202) 249-7833 <\/a>\u00a0, <a href=\"mailto:WKruse@idsinc.com\" target=\"_blank\" rel=\"noopener noreferrer\">WKruse@idsinc.com, <\/a>or on his<a href=\"https:\/\/www.linkedin.com\/in\/warrenkruse\/\">\u00a0LinkedIn.<\/a><\/h3>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/8952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=8952"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/8952\/revisions"}],"predecessor-version":[{"id":9658,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/8952\/revisions\/9658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/9108"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=8952"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=8952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}