The Road to CEIC 2012 – Automating Incident Response

Jessica Bair The “Road to CEIC 2012” is a series of blog posts on all things CEIC (@CEIC_Conf), before, during and after, from an insider’s point of view.

FBI Director Robert Mueller recently stated, "There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again." The fact is, your network security will be breached…it is a reality of the world in which we operate and do business. Each week brings new threats, and reports of compromised networks and lost data. No organization is immune.

On 24 April 2012, Darrell Arms of Accuvant and I presented a Webinar entitled Incident Response: Six Best Practices for Managing Cyber Breaches. We shared best practices for putting an incident response plan in place and how to preserve volatile data as evidence, as near time to the incident as possible. Your ability to quickly identify the breach, stop the exfiltration of data and classified material, and remediate the threat can impact your organization’s risk, cost, and exposure.

Implementing the technology for such a response plan is the focus of the Cyber Response lab entitled EnCase Cybersecurity: Automating Incident Response. This lab demonstrates how to employ automated incident response, using a Security Information and Event Management (SIEM) tool as a triggering system. This is a special engagement, as you will see how EnCase® Cybersecurity can automate response to a number of threats from the Guidance Software, Inc. developers who actually create the software: Ambreesh Bhagtani, manager of enterprise application development, and Jason Fredrickson, senior director of enterprise application development.

Ambreesh and Jason will also discuss the relevance of forensics when it comes to incident response, as it has become critical to prioritize, respond to and contain the volume of threats to your organization. They will also show you how the EnCase Cybersecurity reporting features can provide data visibility across your network, with the ability to remediate the threat from the reporting interface.

As the developer of the hands-on EnCase Cybersecurity course, I am particularly looking forward to spending this time with these gentlemen…as I know some of their tips and tricks will be incorporated into the curriculum!

Jessica Bair
Senior Director, Curriculum Development
@jessicambair

CEIC 2012 – Cyber Response Lab

Tuesday
8:00 AM - 9:15 AM
EnCase Cybersecurity: Automating Incident Response
Ambreesh Bhagtani, Guidance Software, Inc Jason Fredrickson, Guidance Software, Inc
Skill Level: All

No comments :

Post a Comment