One of the most talked about presentations at the CISO/CLO Summit was offered by Bryan Sartin of Verizon, who gave an in-depth review of the 2013 Data Breach Investigations Report (read more about the report on one of my earlier posts). And in the spirit of survey data, we asked Summit attendees to answer a few questions for us regarding their information security concerns and challenges.
Showing posts with label CEIC2013. Show all posts
Showing posts with label CEIC2013. Show all posts
Information Security Executives Share their Perspective at the 2013 CISO/CLO Summit
One of the most talked about presentations at the CISO/CLO Summit was offered by Bryan Sartin of Verizon, who gave an in-depth review of the 2013 Data Breach Investigations Report (read more about the report on one of my earlier posts). And in the spirit of survey data, we asked Summit attendees to answer a few questions for us regarding their information security concerns and challenges.
- Posted by: Ale Espinosa
- No comments
- Categories: CEIC2013 , CISO/CLO Summit , Cybersecurity , Data Breach , Incident Response , Information Security , Security
The Road to CEIC 2013: Orlando, We are Here to Stay!
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
After our fabulous Tuesday, we all had an extra half hour of sleep this morning, the final day of CEIC. Breakfast was sponsored by H11 and Cellebrite; and at 7:40 AM, the Early Birds were already enjoying the sun and great weather outside.
The Road to CEIC 2013: Tuesdays at CEIC
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
Tuesday @CEIC_Conf is a day we all look forward to enjoying. By Tuesday morning, essentially all of the lab and session rooms are running smoothly; everyone is familiar with the hotel layout and knows where they are going; you have connected with most of your friends, former colleagues, co-workers and partners you wanted to see at the conference; the excellent keynotes are in the annals of CEIC history, etc. In other words, all of the anxiety and issues around producing or attending such a large event have largely been experienced and worked through, and you can enjoy a full day of learning and networking.
The Road to CEIC 2013: Through the Years
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
The first full day @CEIC_Conf 2013 began with breakfast at 7:00 AM, accessed by a trip down memory lane on the Blue Carpet with Guidance Software™ | EnCase® “Through the Years.” It reminded me of some of the historical displays I enjoy reading at airports while waiting for my flight, such as in the Hong Kong terminals, and it brought me a lot of nostalgia. It has been an honor to be part of this Winning Team for the past 12 years.
The Road to CEIC 2013: The Night Before CEIC – There’s an App for That!
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
The Rosen Shingle Creek hotel is an amazing facility. It is largest venue to host @CEIC_Conf to date, with conference space 210% larger than 2012. They literally rolled out the red carpet for Guidance Software and the attendees. Yesterday, Sean Doherty of Law Technology News wrote a great pre-conference article CEIC: The Destination for Digital Investigation. He said in summary, “At CEIC, I'm looking forward to picking up more skills in EnCase® Forensic 7, and learning about the new EnCase® Enterprise product — as well as enjoying a general update in the law and technology for e-discovery.”
How Many Data Scientists Does It Take to Find the Bug?
Ideally, zero.
When thinking about corporate security teams, we often conjure up the image of a large group of people with state-of-the-art technology, monitoring end-users’ every action, 24x7 around the clock. The reality is, corporate security teams are often under-staffed and can barely keep up with just reacting to the threats that have already surfaced, let alone looking at all the endpoints in Big Data scale.
And as much as I live and dream Big Data, I cannot deny that without analytics, Big Data is just noise. Regardless of the sources and richness of the data, Big Data in itself does not provide big insights. That said, you would think almost every organization would embark on the journey to Big Data analytics to improve operations and enterprise security. The reality is, the desire to do Big Data analytics is often extinguished by these challenges:
- Posted by: SLW
- No comments
- Categories: Analytics , Big Data , CEIC2013 , Endpoint Analytics , Security Intelligence
The Best Tool in Your Kit
A friend recently told me of an issue with someone they knew where they were requested to show their drivers license and it happened to be expired. Now, there are obviously many situations where we know this will become a problem, but there is really only one situation where this particular bit of information is actually relevant. What is a driver's license really? It is proof of your authorization to drive a particular class of motor vehicle. If expired, it is possible that you are no longer so authorized. That is the only use case where such information is completely relevant.
- Posted by: Unknown
- No comments
- Categories: CEIC , CEIC2013 , Cybersecurity , Incident Response , Security , Threat Response