I've used everything from Hardware Write-blockers to Hardware Security Modules, Forensics software to IAM. Take a look at my experience below, and if you're interested in contacting me, check out the Contact section. Thanks for your consideration!