Anthony Di Bello, Strategic Partnerships Manager with Guidance Software will discuss the benefits and technical implementation of an automated incident response workflow leveraging EnCase and FireEye technology. You will see how the two technologies work together to deliver an industry-first approach to detect, respond to and remediate today’s cyber-attacks. The integrated solution is designed to:
· Dramatically reduces time-to-discovery and time-to-response
· Enables security analysts to clearly prioritize their response based on threat severity
· Delivers the next evolutionary step of the security stack with data-driven, automated actions
· Reduces the risks and high costs associated with cyber-attacks through an end-to-end approach from detection to recovery
BYOD is the most radical shift in client computing for business since the rise of PCs. Allowing personally owned devices in corporate environments poses many security challenges. A user can very easily bring a compromised mobile device into the office causing a security incident. During this session Presidio will cover some of the current BYOD threats and trends as well as discuss strategies for building a layered security architecture to help detect and prevent security incidents and allow organizations to securely support BYOD adoption.
Do you suspect you have a security incident? Time is of the essence. Your initial approach can determine how much damage the cyber security incident does—or does not do—to your organization.
What if you could reduce the time it takes to investigate and remediate a security incident from days to minutes? Join us for this webcast to learn how you can improve your incident response by:
•Locating every instance of a suspicious file across your endpoints and servers
•Knowing if the malware executed, when, and what it did
•Stopping an attack and preventing it from happening again
•Analyzing files that arrive on your endpoints and servers to quickly determine their risk
Nobody wants to fall sick, and yet we all do. By the same token, nobody expects their systems to be breached, and yet it happens. When that happens, companies need a blend of Digital Forensics and Incident Response expertise to deal with the incident. However, the distinction between these two related but different services and their roles in responding to a breach are often not clear to the victims of the breach. In this session, Vivek Chudgar, Director of FireEye Labs (APAC), will explain the key differences between Digital Forensics and Incident Response and demystify the role each service plays in effectively responding to a breach.
Colby Clark will present a rapid incident response methodology used by the FishNet Security Incident Management team utilizing a combination of best-of-breed solutions to rapidly facilitate all phases of an IR investigation of evolving threats. The methodology begins with identification from network indicators with NetWitness, triage and containment using FireEye and FireAmp, and in-depth forensic investigations on system artifacts (memory, volatile data, and file system) using EnCase Enterprise.
Is your business safe from malware and targeted attacks? Sophisticated attacks now leverage social engineering techniques and malware to compromise those individuals already on the inside of your enterprise, and then target your data. This session covers the basics of how this continues to happen, despite more money than ever being spent on perimeter and endpoint defenses. We’ll present an eight step incident response model to help prevent, detect and respond to these attacks.
Today's accepted wisdom is that there are only two types of organizations, those that have been breached and know it and those that have been breached and don't. With this new vision comes the realization that building perimeter defenses is no longer enough, but that remediation, situational awareness and fast response time are what separate well secured organizations from the rest.
Join this panel as they discuss the transition to an incident response world and the important operational and philosophical battles that will define it - from the federal and commercial perspectives to using forensics for risk analysis and IT investment and the attribution debate.
Tom Field, Vice President, Editorial, Information Security Media Group (moderator)
Bill Hau, VP of FireEye Labs,
Pete Allor, Steering Committee member of FIRST
Vernon Habersetzer, IR Team Lead, Walmart
A sound incident response strategy requires planning, diligence and practice. Without it, organizations rely on a strategy of luck to prepare and react to security threats and breaches. In this webinar, learn the current threats, sound solutions for dealing with those threats and appropriate frameworks for a comprehensive incident response plan.
This webinar will review the methodology lifecycle of a breach at an organization and highlight best-practices and efficiencies that can help your organization learn from breaches and continually strengthen your security posture.