Are you an EnCase® Enterprise user who'd like to learn how to automate your network-enabled incident response? Or, perhaps an experienced EnCase® examiner looking for a career change or career enhancement? If a more complete approach to incident response is on your task list, you should attend Cybersecurity 101 with Josh Beckett, product manager for EnCase® Cybersecurity, at the CEIC 2013 Cybersecurity and Compliance Lab. This hands-on lab will demonstrate the basics of using EnCase Cybersecurity, as Josh walks through the major use cases of how the software will assist you in both incident response and compliance management roles; and how to implement it into your organization’s processes.
Plenty of Job Openings for Skilled Cybersecurity Pros
As some industries still struggle to regain their post-recession standing, the demand for skilled and trained cybersecurity professionals continues to rise. For example, back in September 2011, the cybersecurity industry had 0% unemployment for qualified practitioners, a rate which continues today. Cybersecurity is becoming the number-one concern of corporate general counsels and directors, as businesses attempt to cope with attempts to steal their data or intellectual property and disrupt their operations. Earlier this year, the Pentagon announced that t wants to increase the size of their cyber defense force by five times, as it prepares for current and future threats. Each news cycle brings new reports of attacks on networks, including state-sponsored hacking allegations against China and the attack by North Korea on South Korean banks and media.
Last week, I taught the EnCase Cybersecurity course with a full class of students. It was an in-depth, hands-on training experience with this endpoint-focused solution to reduce the risk, cost and time involved in responding to incidents and securing your data. The students included customers who purchased EnCase Cybersecurity, technology partners, and a law-enforcement officer looking to leverage her EnCase skills in this expanding field in preparation for a civilian career.
Continuing Automation and Integration of EnCase Cybersecurity
On the last day of class, Josh joined us as a guest speaker. He shared the plans for the continued automation and integration of EnCase Cybersecurity with best-of-breed products. Josh and I also had the opportunity to speak about his upcoming lab sessions at CEIC. Shortly before, it was confirmed that I will be reprising my role in managing the CEIC Cybersecurity and Compliance Labs; so Josh and I had time to discuss some of the technical details for his lab configuration.
The Cybersecurity and Compliance Labs Track
Take a look at the topics being offered this year at the Cybersecurity and Compliance Labs:
- Living Dangerously - Malware Analysis
- Cybersecurity 101
- How to Configure and Use SQL with EnCase Products
- Facilitating a Soup to Nuts Incident Response Investigation w/EnCase
- Using EnCase to Identify Connections Between Seemingly Unrelated Data to Expose a Breach
- Elevating Remote Forensics to Incident Response
- Compliance Auditing with EnCase Cybersecurity
- Building an Integrated Response Capability w/EnCase Cybersecurity
- Network Forensic Investigations of Hacking Incidents
- When Macs get Hacked
I’ll be digging into these labs in the coming weeks. We’ll have 77 workstations in the lab room, and I’m uploading the EnCase Cybersecurity software to the base image as I type this posting. It’s going to be a great lab environment! Also, I purchased my airline tickets to Orlando on Monday. Seats are going fast. Register for CEIC today if you haven’t done so already, sign up for your desired sessions and labs, and make your travel arrangements soon. CEIC 2013 (@CEIC_Conf #CEIC2013) is next month!
Senior Director, Curriculum Development