Showing posts with label CEIC. Show all posts
Showing posts with label CEIC. Show all posts
CEIC 2015 Highlights: Thwarting Malware, FRCP Rules Changes, Corporate Cyberbullying, Collaborating for the Win
CEIC® 2015 began with a one-day CISO/CLO Summit that gathered security and legal chiefs to collaborate on emerging best practices in defending the enterprise, as well as an energetic CEIC welcome keynote from our president and CEO Patrick Dennis and Roger Angarita, our head of product development. Patrick talked about how the legal, security, and forensic investigation communities are blending together, both to collaborate and even to expand their own professional areas of responsibility. Our data is converging—and so are our professions—which is good news, since as we collaborate, we are turning the tide in the defense of our organizations, our citizens, and our economies.
- Posted by: Siemens
- No comments
- Categories: CEIC , Cyber Legal , Cyber Threats , Cybercrime , FRCP , Malware Analysis
Security and IR Labs at CEIC Focus on Advanced Malware and Attack Analysis
CEIC 2015 is just a few weeks away and we’re excited to meet with you face-to-face on the show floor and in the conference sessions earmarked for cybersecurity and incident response professionals. If your cybersecurity journey seems to grow more complicated with each passing CEIC event, this is the year you won’t want to miss.
Incident response as a discipline is still largely misunderstood and under-implemented, mainly because enterprises struggle to understand the changing security landscape and the need to be prepared for the inevitable cyber attack. To help you better understand these changes, we've developed new sessions and labs for CEIC 2015 to help you take incident response to the next level.
Incident response as a discipline is still largely misunderstood and under-implemented, mainly because enterprises struggle to understand the changing security landscape and the need to be prepared for the inevitable cyber attack. To help you better understand these changes, we've developed new sessions and labs for CEIC 2015 to help you take incident response to the next level.
Why Financial, Retail, and Healthcare Professionals Should Reserve a Seat at a CEIC 2015 Roundtable
By now, you may have heard about our new CEIC industry roundtable sessions for professionals in retail, finance, and healthcare. These focused, media-free sessions provide a forum for security and e-discovery specialists to discuss current trends and challenges that affect their work on a daily basis. First you've heard of our roundtables? Take a look at our previous post.
So why should you spend valuable CEIC time on a roundtable? Here are the three most compelling reasons.
New to CEIC 2015: Financial, Retail, and Healthcare Roundtable Sessions
It’s not too late to sign up for the first-ever roundtable discussions to be held at CEIC 2015 for industry-specific professionals in the financial, retail, and healthcare industry. As part of the new Topics in Management track, the roundtable sessions will provide a forum to discuss pressing cybersecurity and e-discovery challenges that affect today’s organizations and present emerging best practices for addressing them.
New Track at CEIC 2015 Targets Critical Executive-level Legal and Security Issues
The explosion of threats in digital forensics and security is pressuring executives to anticipate, assess, and respond with greater assurance and insight than ever before. Because of this, CEIC® 2015 has developed a new “Topics in Management” conference track for business leaders responsible for legal, security, and risk and compliance initiatives.
The new track expands upon the success of the annual CISO/CLO Summit and is packed with an all-star roster of speakers and topics. We’re eager to share some of the highlights of the management track with you in this blog, but encourage you to review the complete CEIC 2015 conference agenda with session descriptions and speaker bios for all 12 tracks.
The new track expands upon the success of the annual CISO/CLO Summit and is packed with an all-star roster of speakers and topics. We’re eager to share some of the highlights of the management track with you in this blog, but encourage you to review the complete CEIC 2015 conference agenda with session descriptions and speaker bios for all 12 tracks.
CEIC 2014: The Car of the Future May be a Forensic Gold Mine
Move over KITT,
it looks like you have some competition.
Automotive
leaders like Chrysler, Ford, BMW and General Motors are investing in technology
that incorporates text-to-voice solutions, enabling drivers to check email and
text messages as they drive. With Ford SYNC, drivers can make hands-free phone
calls, control their music and more with voice commands.
In his
session on vehicle forensics at CEIC 2014, Berla
Corporation CEO Ben
LeMere discussed new and emerging technologies that are being adopted by automobile
companies. These companies are now developing vehicles that create an experience
to entertain and inform drivers and passengers while also facilitating voice
and data communications on the road.
Joel Brenner Keynote at CEIC 2014: The Changing Face of Espionage
For more than a decade, a series of high-profile security breaches have bought to light the vulnerability of the security systems upon which we rely. The best known include:
- Titan Rain: Hackers were able to gain access to U.S. defense contractor computer networks and siphon off large amounts of information.
- New York Times: Ten years after Titan Rain, Chinese hackers broke into the New York Times network and gained access to employees' computers and passwords.
- Target: More than 40 million credit and debit cards and 70 million records, including names, addresses, email addresses and phone numbers of customers were stolen in the attack on the retail giant.
Survey Says: Organizations Most Concerned About Length of Time to Resolve Data Breaches
During our 13th Annual Computer and Enterprise
Investigations Conference (CEIC) in May, we conducted a survey of more than 150
attendees from the security, law-enforcement, and e-discovery fields to get
first-hand insights on shifting priorities in enterprise and government
security teams. It was not a surprise that “length of time to resolve attacks”
came in as the chief cybersecurity concern. In addition, 24 percent also said they were concerned
about insider threats.
- Posted by: Siemens
- No comments
- Categories: BYOD , CEIC , Cybersecurity , Data Breach , Incident Response
Announcing our CEIC Caption Contest Winner
Congratulations to Paul Webel from Vestige. His caption won our caption contest by a landslide! Thank you to all who participated. Your captions generated quite a few chuckles around Guidance Software.
Again, congratulations to Paul!
The Road to CEIC 2013: Orlando, We are Here to Stay!
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
After our fabulous Tuesday, we all had an extra half hour of sleep this morning, the final day of CEIC. Breakfast was sponsored by H11 and Cellebrite; and at 7:40 AM, the Early Birds were already enjoying the sun and great weather outside.
The Road to CEIC 2013: Tuesdays at CEIC
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
Tuesday @CEIC_Conf is a day we all look forward to enjoying. By Tuesday morning, essentially all of the lab and session rooms are running smoothly; everyone is familiar with the hotel layout and knows where they are going; you have connected with most of your friends, former colleagues, co-workers and partners you wanted to see at the conference; the excellent keynotes are in the annals of CEIC history, etc. In other words, all of the anxiety and issues around producing or attending such a large event have largely been experienced and worked through, and you can enjoy a full day of learning and networking.
The Road to CEIC 2013: Through the Years
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
The first full day @CEIC_Conf 2013 began with breakfast at 7:00 AM, accessed by a trip down memory lane on the Blue Carpet with Guidance Software™ | EnCase® “Through the Years.” It reminded me of some of the historical displays I enjoy reading at airports while waiting for my flight, such as in the Hong Kong terminals, and it brought me a lot of nostalgia. It has been an honor to be part of this Winning Team for the past 12 years.
The Road to CEIC 2013: Good Guys Need to Work Together
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
Day One of @CEIC_Conf started early. We had staff breakfast at 7:30 AM. Over breakfast, I was privileged to have a preview of David Shaver’s lab Following an Intrusion Through a Microsoft Operating System (Automated and Manual) – May 20th, 1:30 PM – 3:00 PM. Dave is a Special Agent for the SIGTARP and we served together in the US Army Criminal Investigation Command (CID). He is one of the foremost experts in digital investigations, and he will take you through an incident response with EnCase® and freeware tools.
CEIC Caption Contest
Submit your caption for this cartoon! The caption with the most votes will win an Apple iPad! Winner will be announced June 10, 2013. Be original and have fun! Enter on our Facebook page.
Attendance at CEIC is not required to participate so join in!
The Road to CEIC 2013: The Night Before CEIC – There’s an App for That!
The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.
The Rosen Shingle Creek hotel is an amazing facility. It is largest venue to host @CEIC_Conf to date, with conference space 210% larger than 2012. They literally rolled out the red carpet for Guidance Software and the attendees. Yesterday, Sean Doherty of Law Technology News wrote a great pre-conference article CEIC: The Destination for Digital Investigation. He said in summary, “At CEIC, I'm looking forward to picking up more skills in EnCase® Forensic 7, and learning about the new EnCase® Enterprise product — as well as enjoying a general update in the law and technology for e-discovery.”
The Best Tool in Your Kit
A friend recently told me of an issue with someone they knew where they were requested to show their drivers license and it happened to be expired. Now, there are obviously many situations where we know this will become a problem, but there is really only one situation where this particular bit of information is actually relevant. What is a driver's license really? It is proof of your authorization to drive a particular class of motor vehicle. If expired, it is possible that you are no longer so authorized. That is the only use case where such information is completely relevant.
- Posted by: Unknown
- No comments
- Categories: CEIC , CEIC2013 , Cybersecurity , Incident Response , Security , Threat Response
The Road to CEIC 2013: EnCase in Action!
The final agenda for @CEIC_Conf #CEIC was just released. Some breaking news: Guidance Software will unveil and describe in-depth EnCase® Analytics, our new security intelligence product employing big data analytics. EnCase Analytics empowers customers to find and expose cyber-threats hiding behind complex relationships in the wealth of data that exists within the sum of all endpoints of an enterprise. Presentations and demonstrations about EnCase Analytics will be available throughout the conference. I have been looking forward to this big announcement for months, and I will be creating the EnCase OnDemand training for EnCase Analytics this summer.
The Road to CEIC 2013: Cyber-Threat Response: Mitigate, Reduce, Reduce!
Last week, Darrell Arms and I presented a webinar and white paper on Incident Response: Six Best Practices for Managing Cyber Breaches. Executives are quickly understanding that it is virtually impossible to completely avoid a network breach. You need to be equipped to take immediate action when a breach occurs, as business operations must continue and network connectivity to the rest of the world is essential. As discussed in the blog post The Road to CEIC 2013: Cybersecurity 101, cybersecurity is a fast-growing field with many opportunities to contribute to a safer cyber world.
The Road to CEIC 2013: BYOD to CEIC!
The Smartphone, Social Media and Cloud Investigations track provides solutions to manage the issues that come with a more mobile, connected and dispersed population and workforce. Bring Your Own Device (BYOD) offers employees and organizations countless business benefits, from increased efficiency to controlling costs on provisioning a mobile workforce. This comes with the inevitable question: How do we support all these devices in a secure environment, while allowing the workforce to be productive? This will be the focus of The Technical Challenges of Bring Your Own Device (BYOD) discussion with Rodney Smith, Guidance Software director of IT security, Michael Sparks of Intel, and Kia Hakimi of Best Buy. BYOD policy considerations, management of personal information on the devices, device discovery, over-the-air-configuration, self-service portals, cloud based repositories for BYOD data (e.g. Box.com and MobileIron), and managing data usage; these are all critically important to every organization, as we are all mobile. If BYOD is your pain point at work, you should also attend E-Discovery Case Law: Legal ramifications of BYOD.
The Road to CEIC 2013: Cybersecurity 101
Are you an EnCase® Enterprise user who'd like to learn how to automate your network-enabled incident response? Or, perhaps an experienced EnCase® examiner looking for a career change or career enhancement? If a more complete approach to incident response is on your task list, you should attend Cybersecurity 101 with Josh Beckett, product manager for EnCase® Cybersecurity, at the CEIC 2013 Cybersecurity and Compliance Lab. This hands-on lab will demonstrate the basics of using EnCase Cybersecurity, as Josh walks through the major use cases of how the software will assist you in both incident response and compliance management roles; and how to implement it into your organization’s processes.
- Posted by: Siemens
- No comments
- Categories: CEIC , Cybersecurity , Incident Response , Malware , Security Tactics , Threat Response