Log in


MICHAEL GRAZIANO | Owner - Executive Digital Group, Cyber/Computer Forensics and Investigations

Michael Graziano is a retired Detective who worked at the Suffolk County Police Department. Michael Graziano worked with the Suffolk County Police Department for 25 years. Michael began his career as a Patrol Officer. Due to his extensive computer and programming skills, along with his ability to implement these skills to his police work, he was promoted to work in the department's C.O.P.E Unit and then the department's I.T. Section. During his work in these units, he was responsible for creating programs that tracked gang members, stolen items, and patrol checks. Michael had been awarded several department recognitions for his arrests resulting from his police investigations. Michael was promoted to Detective and assigned to the Computer Crime Unit. During his almost 12 years in the Computer Crimes Unit, Michael was responsible for forensic analysis of digital evidence, including computers, mobile devices, DVRs, and other digital media, in such investigations as homicide, narcotics, white color crimes, and child exploitation. Michael was responsible for starting up and heading forensics investigations in the Megan's Law task force. Michael had been awarded several recognitions for his hard work in child exploitation cases that resulted in protecting children from sexual exploitation. Michael finished his last year with the Suffolk County Police Department as a Detective in Criminal Intel, where he was responsible for forensic investigations involving homeland security and gang investigations. Michael is the co-owner, with his wife, of Executive Digital Group. Executive Digital Group offers services that include Digital Forensics, Cybersecurity along with I.T. Technology strategies and support. Michael Graziano and his wife have been married for 17 years and have three children. Besides spending time with his family, he enjoys martial arts, animal rescue, and working with special needs children.

Certified Information Systems Security Professional (CISSP®)
Encase Certified Forensic Examiner
A.C.E. (F.T.K. Certified Forensic Examiner)
G.I.A.C. Security Essentials (G.S.E.C.)
G.I.A.C. Certified Forensics Analyst (G.C.F.A.)
G.I.A.C. Web Application Penetration Tester (G.W.A.P.T.)
G.I.A.C. Reverse Engineering Malware (G.R.E.M.)
GIAC Penetration Tester
Cellebrite Certified Logical Operator
Cellebrite Certified Physical Analyst
Certified Blacklight Examiner
N.Y.S. Certified Instructor
N.Y.S. Notary
COVID-19 Contact Tracing

N.Y.S. Instructor:
Advanced Criminal Investigations –Computer Forensics and Online Investigations (S.C.P.D.
Basic Criminal Investigations - Computer Forensics and Online Investigations (S.C.P.D.
Computer Forensics and Digital Data (Suffolk County Assistant District Attorney's Office)

N.Y.S. Private Investigator License:
Licensed in N.Y.S. to transact business as a private investigator.

Specialized Training:
Mobile Device Repair and J.T.A.G. Forensics
John E. Reid and Associates, Inc – Interviewing and Interrogation
National White Collar Crimes (Data Recovery and Acquisition),
Internet Crimes Against Children Investigative Techniques
Cyber terrorism Defense Analysis Center (Cyber Security - Incident handling and response)
National Institute of Justice Technology Institute
Trained by Department of Homeland Security in Computer Network Investigations at the Federal
Law Enforcement Training Center
Basic Peer to Peer Investigations – ICAC Task Force
SANS Web App Penetration Testing and Ethical Hacking
EnCase Examination of NTFS and Artifacts
John E. Reid and Associates, Inc – Physical and Neglect: Child Abuse Injury Reconstruction
John E. Reid and Associates, Inc – Emerging Trends in Child Sexual Abuse Investigations
SANS Training Mobile Device Forensics
SANS Training Metasploit
SANS Network Forensics
SEC566: Implementing and Auditing the Critical Security Controls
SEC566 Implementing and Auditing the Critical Security Controls
FOR518 Mac and iOS Forensic Analysis and Incident Response
Statement Analysis – Sponsored by N.Y.S. Attorney General
Cellebrite – Cellphone forensics.
Blackbag Technologies – IOS and Mac Forensic
Microsoft – X.B.O.X. – investigations and forensic analysis
Counter Terrorist Financial Intelligence Training
Cryptocurrency Crime: Investigating & Mitigating the Risks
X-Ways Forensics

High School – Plainview Old Bethpage High School
Adelphi University - Bachelor of Science
S.U.N.Y. Farmingdale - Computer information systems


SPEAKING TOPIC 1: What is penetration testing and how can it help your clients

  • Internal Penetration Testing: Testing internal layers to assess internal threats and points of possible compromise.
  • External Penetration Testing: Testing digital perimeters and examining how they stand up to attack attempts.
  • Wireless Penetration Testing: Examining wireless connections and how they can expose internal network systems.
  • Security Policies: Review policies in place for the identification and response of possible threats. Review and testing.
  • Social Engineering: Real-world examples and testing.

SPEAKING TOPIC 2: How to market Penetration Testing and Digital Security

  • Things to consider in conducting a penetration test
  • Scalability of services for your clients
  • Types of Pen testing and the resources involved and time involved
  • Utilizing time, budget, and manpower.

Florida Association of Private Investigators, Inc. is a 501(c)3 non-profit organization. Copyright © 2021. All Rights Reserved

P.O. Box 21158
Fort Lauderdale, Florida 33335-1158
Phone: (954) 278-9459

Powered by Wild Apricot Membership Software