Showing posts with label CEIC. Show all posts
Showing posts with label CEIC. Show all posts

CEIC 2015 Highlights: Thwarting Malware, FRCP Rules Changes, Corporate Cyberbullying, Collaborating for the Win

CEIC® 2015 began with a one-day CISO/CLO Summit that gathered security and legal chiefs to collaborate on emerging best practices in defending the enterprise, as well as an energetic CEIC welcome keynote from our president and CEO Patrick Dennis and Roger Angarita, our head of product development. Patrick talked about how the legal, security, and forensic investigation communities are blending together, both to collaborate and even to expand their own professional areas of responsibility. Our data is converging—and so are our professions—which is good news, since as we collaborate, we are turning the tide in the defense of our organizations, our citizens, and our economies.

Security and IR Labs at CEIC Focus on Advanced Malware and Attack Analysis

CEIC 2015 is just a few weeks away and we’re excited to meet with you face-to-face on the show floor and in the conference sessions earmarked for cybersecurity and incident response professionals. If your cybersecurity journey seems to grow more complicated with each passing CEIC event, this is the year you won’t want to miss.

Incident response as a discipline is still largely misunderstood and under-implemented, mainly because enterprises struggle to understand the changing security landscape and the need to be prepared for the inevitable cyber attack. To help you better understand these changes, we've developed new sessions and labs for CEIC 2015 to help you take incident response to the next level.

Why Financial, Retail, and Healthcare Professionals Should Reserve a Seat at a CEIC 2015 Roundtable

By now, you may have heard about our new CEIC industry roundtable sessions for professionals in retail, finance, and healthcare. These focused, media-free sessions provide a forum for security and e-discovery specialists to discuss current trends and challenges that affect their work on a daily basis. First you've heard of our roundtables? Take a look at our previous post.

So why should you spend valuable CEIC time on a roundtable? Here are the three most compelling reasons.

New to CEIC 2015: Financial, Retail, and Healthcare Roundtable Sessions

It’s not too late to sign up for the first-ever roundtable discussions to be held at CEIC 2015 for industry-specific professionals in the financial, retail, and healthcare industry. As part of the new Topics in Management track, the roundtable sessions will provide a forum to discuss pressing cybersecurity and e-discovery challenges that affect today’s organizations and present emerging best practices for addressing them.

New Track at CEIC 2015 Targets Critical Executive-level Legal and Security Issues

The explosion of threats in digital forensics and security is pressuring executives to anticipate, assess, and respond with greater assurance and insight than ever before.  Because of this, CEIC® 2015 has developed a new “Topics in Management” conference track for business leaders responsible for legal, security, and risk and compliance initiatives.

The new track expands upon the success of the annual CISO/CLO Summit and is packed with an all-star roster of speakers and topics. We’re eager to share some of the highlights of the management track with you in this blog, but encourage you to review the complete CEIC 2015 conference agenda with session descriptions and speaker bios for all 12 tracks.

CEIC 2014: The Car of the Future May be a Forensic Gold Mine

Move over KITT, it looks like you have some competition.

Automotive leaders like Chrysler, Ford, BMW and General Motors are investing in technology that incorporates text-to-voice solutions, enabling drivers to check email and text messages as they drive. With Ford SYNC, drivers can make hands-free phone calls, control their music and more with voice commands.

In his session on vehicle forensics at CEIC 2014, Berla Corporation CEO Ben LeMere discussed new and emerging technologies that are being adopted by automobile companies. These companies are now developing vehicles that create an experience to entertain and inform drivers and passengers while also facilitating voice and data communications on the road.

Joel Brenner Keynote at CEIC 2014: The Changing Face of Espionage

For more than a decade, a series of high-profile security breaches have bought to light the vulnerability of the security systems upon which we rely. The best known include:

  • Titan Rain: Hackers were able to gain access to U.S. defense contractor computer networks and siphon off large amounts of information.
  • New York Times: Ten years after Titan Rain, Chinese hackers broke into the New York Times network and gained access to employees' computers and passwords.
  • Target: More than 40 million credit and debit cards and 70 million records, including names, addresses, email addresses and phone numbers of customers were stolen in the attack on the retail giant.
Cybersecurity expert Joel Brenner shared deeper insights into the state of security with CEIC 2014 attendees in his keynote speech. In spite of a series of high-profile, damaging attacks dating back to 2003, public and private organizations are still under siege, and there is no end in sight.

Survey Says: Organizations Most Concerned About Length of Time to Resolve Data Breaches

During our 13th Annual Computer and Enterprise Investigations Conference (CEIC) in May, we conducted a survey of more than 150 attendees from the security, law-enforcement, and e-discovery fields to get first-hand insights on shifting priorities in enterprise and government security teams. It was not a surprise that “length of time to resolve attacks” came in as the chief cybersecurity concern. In addition, 24 percent also said they were concerned about insider threats.

Data breaches and the amount of time it takes to detect and resolve them remain a critical security issue. It takes companies an average of three months to discover a malicious breach and more than four months to resolve it, according to the 2013 Cost of Data Breach Study by the Ponemon Institute.

Announcing our CEIC Caption Contest Winner

Guidance Software

Congratulations to Paul Webel from Vestige. His caption won our caption contest by a landslide! Thank you to all who participated. Your captions generated quite a few chuckles around Guidance Software.

Again, congratulations to Paul!

The Road to CEIC 2013: Orlando, We are Here to Stay!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

After our fabulous Tuesday, we all had an extra half hour of sleep this morning, the final day of CEIC. Breakfast was sponsored by H11 and Cellebrite; and at 7:40 AM, the Early Birds were already enjoying the sun and great weather outside.

The Road to CEIC 2013: Tuesdays at CEIC

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Tuesday @CEIC_Conf is a day we all look forward to enjoying. By Tuesday morning, essentially all of the lab and session rooms are running smoothly; everyone is familiar with the hotel layout and knows where they are going; you have connected with most of your friends, former colleagues, co-workers and partners you wanted to see at the conference; the excellent keynotes are in the annals of CEIC history, etc. In other words, all of the anxiety and issues around producing or attending such a large event have largely been experienced and worked through, and you can enjoy a full day of learning and networking.

The Road to CEIC 2013: Through the Years

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The first full day @CEIC_Conf 2013 began with breakfast at 7:00 AM, accessed by a trip down memory lane on the Blue Carpet with Guidance Software™ | EnCase® “Through the Years.” It reminded me of some of the historical displays I enjoy reading at airports while waiting for my flight, such as in the Hong Kong terminals, and it brought me a lot of nostalgia. It has been an honor to be part of this Winning Team for the past 12 years.

The Road to CEIC 2013: Good Guys Need to Work Together

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Day One of @CEIC_Conf started early. We had staff breakfast at 7:30 AM. Over breakfast, I was privileged to have a preview of David Shaver’s lab Following an Intrusion Through a Microsoft Operating System (Automated and Manual) – May 20th, 1:30 PM – 3:00 PM. Dave is a Special Agent for the SIGTARP and we served together in the US Army Criminal Investigation Command (CID). He is one of the foremost experts in digital investigations, and he will take you through an incident response with EnCase® and freeware tools.

CEIC Caption Contest

Guidance Software

Submit your caption for this cartoon! The caption with the most votes will win an Apple iPad! Winner will be announced June 10, 2013. Be original and have fun! Enter on our Facebook page.

Attendance at CEIC is not required to participate so join in!

The Road to CEIC 2013: The Night Before CEIC – There’s an App for That!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The Rosen Shingle Creek hotel is an amazing facility. It is largest venue to host @CEIC_Conf to date, with conference space 210% larger than 2012. They literally rolled out the red carpet for Guidance Software and the attendees. Yesterday, Sean Doherty of Law Technology News wrote a great pre-conference article CEIC: The Destination for Digital Investigation. He said in summary, “At CEIC, I'm looking forward to picking up more skills in EnCase® Forensic 7, and learning about the new EnCase® Enterprise product — as well as enjoying a general update in the law and technology for e-discovery.”

The Best Tool in Your Kit

Josh Beckett As security professionals, we all have to deal with real events and incidents and false positives.  Furthermore, we all need to try to minimize the impact that false positives have on our workflow so that we can focus on the real stuff. I love to use real world examples that have a parable-like quality to them in order get interesting points about security across.

A friend recently told me of an issue with someone they knew where they were requested to show their drivers license and it happened to be expired. Now, there are obviously many situations where we know this will become a problem, but there is really only one situation where this particular bit of information is actually relevant.  What is a driver's license really? It is proof of your authorization to drive a particular class of motor vehicle. If expired, it is possible that you are no longer so authorized. That is the only use case where such information is completely relevant.

The Road to CEIC 2013: EnCase in Action!

Jessica Bair The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The final agenda for @CEIC_Conf #CEIC was just released. Some breaking news: Guidance Software will unveil and describe in-depth EnCase® Analytics, our new security intelligence product employing big data analytics. EnCase Analytics empowers customers to find and expose cyber-threats hiding behind complex relationships in the wealth of data that exists within the sum of all endpoints of an enterprise. Presentations and demonstrations about EnCase Analytics will be available throughout the conference. I have been looking forward to this big announcement for months, and I will be creating the EnCase OnDemand training for EnCase Analytics this summer.

The Road to CEIC 2013: Cyber-Threat Response: Mitigate, Reduce, Reduce!

Jessica Bair The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Last week, Darrell Arms and I presented a webinar and white paper on Incident Response: Six Best Practices for Managing Cyber Breaches. Executives are quickly understanding that it is virtually impossible to completely avoid a network breach. You need to be equipped to take immediate action when a breach occurs, as business operations must continue and network connectivity to the rest of the world is essential. As discussed in the blog post The Road to CEIC 2013: Cybersecurity 101, cybersecurity is a fast-growing field with many opportunities to contribute to a safer cyber world.

The Road to CEIC 2013: BYOD to CEIC!

Jessica Bair The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The Smartphone, Social Media and Cloud Investigations track provides solutions to manage the issues that come with a more mobile, connected and dispersed population and workforce. Bring Your Own Device (BYOD) offers employees and organizations countless business benefits, from increased efficiency to controlling costs on provisioning a mobile workforce. This comes with the inevitable question: How do we support all these devices in a secure environment, while allowing the workforce to be productive? This will be the focus of The Technical Challenges of Bring Your Own Device (BYOD) discussion with Rodney Smith, Guidance Software director of IT security, Michael Sparks of Intel, and Kia Hakimi of Best Buy. BYOD policy considerations, management of personal information on the devices, device discovery, over-the-air-configuration, self-service portals, cloud based repositories for BYOD data (e.g. and MobileIron), and managing data usage; these are all critically important to every organization, as we are all mobile. If BYOD is your pain point at work, you should also attend E-Discovery Case Law: Legal ramifications of BYOD.

The Road to CEIC 2013: Cybersecurity 101

Jessica Bair The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view. 

Are you an EnCase® Enterprise user who'd like to learn how to automate your network-enabled incident response? Or, perhaps an experienced EnCase® examiner looking for a career change or career enhancement? If a more complete approach to incident response is  on your task list, you should attend Cybersecurity 101 with Josh Beckett, product manager for EnCase® Cybersecurity, at the CEIC 2013 Cybersecurity and Compliance Lab.  This hands-on lab will demonstrate the basics of using EnCase Cybersecurity, as Josh walks through the major use cases of how the software will assist you in both incident response and compliance management roles; and how to implement it into your organization’s processes.