Skip to main content
// RESOURCES

What we share with the field.

Investigations, tradecraft, case work, training, and events — collected in one place. Everything below is produced by the same DataExpert practitioners who run our client engagements, and most of it is written for peers in the investigator, analyst, and security-leader community rather than for marketing audiences.

// BLOG

Blog.

Working notes from the lab — case write-ups (sanitised for publication), tradecraft pieces for forensics and OSINT analysts, tooling reviews, and what we are seeing across the EU threat landscape. Updated regularly; pulls directly from the platform blog index.

// FIELD NOTES

Latest from the blog.

Field notes, tooling reviews, and tradecraft pieces written by the operators who run our investigations. Topics range from mobile-forensics technique to cryptocurrency-laundering typologies — sanitised for publication and aimed at peers, not marketing audiences.

// FIELD NOTES

Posts coming soon.

Field notes drop here as casework wraps and we get clearance to publish. In the meantime, the resources hub points at the rest of what we publish.

// PAPERS

Papers.

Longer-form work — methodology papers, capability deep-dives, and original research. We publish papers when there is something substantive to add to the practitioner conversation, rather than on a fixed cadence. Subscribe via the contact form to be notified when the next one is published.

Papers coming soon. The first set covers cryptocurrency-tracing methodology and EU multi-jurisdictional evidence handling. Drop us a note via the contact form if you want early access when they are released.

// INFOGRAPHICS

Infographics.

Single-page visual summaries — investigation timelines, vendor-landscape maps, regulatory-coverage diagrams. Designed to be useful in internal training, board briefings, and on-call documentation. We will publish the first set here as it is finalised by the design team.

Infographics coming soon. Get in touch if there is a topic you would find useful — we are taking requests.

// CASE STUDIES

Case studies.

Anonymised and consented case work from across our practice. Each case study walks through the investigation question, the operational approach we took, and the outcome — written so other practitioners can learn from the approach and prospective clients can see what working with us looks like in practice.

  • Law enforcement

    Supporting Dutch National Police with EnCase deployment and case-level assistance

    DataExpert supplies and supports the OpenText EnCase Forensic platform used by Dutch National Police investigators, including technical assistance during high-priority cases. Our practitioners have provided training, on-demand expert support, and tooling guidance to investigators handling complex computer-forensics matters. The engagement reflects our long-running role as a trusted technical partner to Dutch law enforcement.

    [VERIFY: scope of public reference permitted by Politie]

  • Financial services

    "Report as a Service" compliance reporting for Chaabi Bank

    DataExpert delivers an ongoing "Report as a Service" engagement for Chaabi Bank, helping the bank meet its recurring compliance-reporting obligations without scaling an internal team of forensic accountants. The model — recurring delivery of a regulated reporting output by a specialist external team — is increasingly common among mid-size financial institutions facing rising supervisory expectations.

    [VERIFY: scope of public reference permitted by Chaabi Bank]

  • Public sector — environmental protection

    IBM analytics deployment for DCMR Milieudienst Rijnmond

    DataExpert works with DCMR Milieudienst Rijnmond — the joint environmental-protection agency for the Rotterdam-Rijnmond region — on IBM-software-based analytics that surface anomalies in industrial-emission and incident data. The engagement combines tooling expertise with the analytical tradecraft that environmental-protection investigators rely on day to day, and it reflects DataExpert's broader public-sector practice beyond pure cybersecurity.

    [VERIFY: scope of public reference permitted by DCMR]

// VIDEO

Video.

Recorded talks, webinars, and short tooling walk-throughs from our practitioners and Academy instructors. Hosted on the DataExpert YouTube channel — subscribe there for new releases as they are published.

New videos coming soon.

Visit YouTube channel

[FILL IN: real YouTube URL]

// NEWS

News.

Company news and announcements — partnership milestones, hiring news, public-speaking appearances, and the occasional commentary on a major incident or regulatory development. We post news on LinkedIn first; consider following us there for fastest updates.

Follow on LinkedIn for the latest from DataExpert.

Visit LinkedIn
// EVENTS

Where you'll find us.

We share what we are learning in the field — at industry conferences, investigator workshops, and our own Academy sessions. If you are attending one of the events below, get in touch in advance and we will set aside time for a private briefing or a walk-through of the work we are doing in your sector.

// TRAINING

Training.

The DataExpert Academy delivers certified training across the disciplines our clients ask us about most. Courses are taught by the same operators who run our investigations — so what is in the curriculum is grounded in current casework rather than reference material.

  • Digital forensics fundamentals

    Mobile, computer, and cloud forensics tradecraft for investigators new to the discipline. Covers acquisition, preservation, analysis, and reporting at a standard suitable for court submission.

  • Advanced mobile forensics

    Cellebrite-aligned curriculum for practitioners handling current-generation iOS and Android devices. Includes physical-acquisition technique, third-party-app analysis, and cloud-account follow-on.

  • OSINT for investigators

    Open-source intelligence tradecraft for police, financial-crime, and corporate-investigation analysts. Covers planning, collection, attribution, and operational-security discipline.

  • Cryptocurrency investigations

    Chainalysis- and TRM Labs-aligned curriculum for AML analysts, financial-crime investigators, and law-enforcement practitioners. Includes cross-chain tracing and mixer-pattern analysis.

  • Incident response leadership

    For SOC leads and CIOs who need to run a major incident effectively. Covers technical response, regulator engagement, executive briefing, and post-incident review.

  • Custom curriculum

    Tailored training programmes for organisations with specific tooling, regulatory, or sector needs. We will scope a curriculum and certification path with you.

// CONTACT

Want us to publish something on a topic you would find useful?

We take requests from peers. Tell us what would help.

or call +31 (0)318 543173