Hi [[ session.user.profile.firstName ]]

Nuix Thought Leadership Webinars

  • Date
  • Rating
  • Views
  • The Black Report
    The Black Report Chris Pogue, Head of Services, Security and Partner Integration Recorded: May 23 2018 44 mins
    The second edition of The Nuix Black Report has been released including new insights and information on the source of the threat, the attackers and penetration testers themselves. Join Chris Pogue, Head of Services, Security and Partner Integration, discuss the true nexus between attacker methodology and defensive posture in this live webinar.

    You will gain a deeper understanding of the nexus between attacker methodology and defensive posture, including

    1. Which security programs and countermeasures will improve your security posture? They’re not the ones you think
    2. What’s the best spend for your security dollar and why?
    3. If hackers could speak to your organization’s leaders, what would they say?
  • GDPR - Let’s talk legal, the implications of GDPR and your data
    GDPR - Let’s talk legal, the implications of GDPR and your data Nick Pollard, Head of Region, Southern & Eastern Europe, Emerging Markets at Nuix and Gareth Atkinson, StartRiskLab Recorded: May 22 2018 37 mins
    Organisations are still worried that they may still be open to GDPR legal issues and legal interpretation. Join our speakers Nick Pollard, Nuix and Gareth Atkinson, StartRiskLab who will explore where you should be right now with your GDPR preparations.

    In this webinar, you will learn:

    1. How to cross-reference your preparations
    2. Understand the legal position on various GDPR schedules
  • Reducing Breach Costs with Early Detection and Rapid Response
    Reducing Breach Costs with Early Detection and Rapid Response Harlan Carvey Director of Intelligence Integration, at Nuix Recorded: Apr 25 2018 28 mins
    It takes minutes to get inside. Days to exfiltrate. Detection can take weeks, maybe months. The impact is huge: lost revenue, increased costs, and damage to your organization’s brand.

    You can’t completely stop breaches from happening, but you can remediate the direct and indirect costs they can have on your organization. By taking a proactive stance, you can properly plan and budget for the costs associated with a breach. Through early detection and rapid response, you can obviate the need to notify affected customers and reduce the costs associated with notification.

    This webinar will cover:
    • How a “data breach” is defined, legislated, and how they occur
    • Direct and indirect costs facing organizations that are breached
    • Differences between “left of breach” (proactive approach) and “right of breach” (reactive approach) by exploring real-world examples
    • How early detection and rapid response can drive down the cost of a breach.

    About the presenters:

    Harlan Carvey, Director of Intelligence Integration
    Harlan began his career in information security 28 years ago. After serving on active duty with the United States military, he transitioned to planning, coordinating, and executing vulnerability assessments. He then went on to digital forensics and incident response, which in turn led to targeted threat hunting and response.
  • Closing the Window on Fraud and Financial Crime
    Closing the Window on Fraud and Financial Crime Keith Lowry, SVP & Peter Evans, Sr. Information Security Consultant, Nuix Recorded: Mar 14 2018 42 mins
    Everyone’s been compromised. Financial services companies should just assume that’s the case. Yet, many companies still don’t have effective programs or inter-departmental policies and procedures in place. They measure the time it takes to identify a breach in months, sometimes years, and fraudulent transactions often go uncaught.

    However, there is hope. We will examine three distinct cases of financial fraud and, using investigations, eDiscovery, and cybersecurity tools in new ways, demonstrate how you can minimize your risk and limit the damage done to your organization.

    Attendees to this webinar will learn:

    • The differences, and similarities, between three distinct types of financial fraud using real-world examples
    • The business challenges that arise from not detecting or reacting to fraud and security incidents
    • How inter-departmental boundaries prohibit effective response
    • How to expand their use of traditional forensic, eDiscovery, and cybersecurity tools to shorten the time criminals have to operate.

    Presenters:

    Keith has more than 25 years of experience implementing, managing, and directing insider threat, counterintelligence, and intelligence collection programs. He is a former law enforcement officer and High-Technology Crime Unit detective with the City of San Jose California and a United States Navy Mobilized Reservist. He also served as Chief of Staff to the Deputy Under Secretary of Defense for Human intelligence, Counterintelligence and Security at the Pentagon.

    Peter is a Senior Information Security Consultant at Nuix. He has more than ten years’ experience in federal law enforcement and another ten years’ experience as an Information technologies and radio frequency engineer. While working in law enforcement, Peter was detailed to the Electronic Crimes Task Force and was the lead forensic investigator on many computer crimes, network intrusions, and wireless exploitation cases.
  • Corporate Espionage
    Corporate Espionage David Smith, CISO, Nuix and Nick Pollard, Nuix Recorded: Feb 15 2018 43 mins
    For as long as there has been commerce, there has been espionage. Although the medium for the theft of data may be as prosaic as a USB device, the impact of the loss of sensitive information can be financially devastating for the victim. In contrast, the intrinsic value of the information stolen may be completely disproportionate to the reputational damage caused if the outside world perceives that the organisation concerned failed to take adequate steps to prevent such leaks.

    Espionage takes many forms and can range from a simple swipe of client data by a departing employee through to a sophisticated data grab of business critical documents.
  • Theory to Practice: Insider Threat Lessons from Waymo vs. Uber
    Theory to Practice: Insider Threat Lessons from Waymo vs. Uber Stephen Stewart & Keith Lowry Recorded: Jan 25 2018 51 mins
    Well-placed insiders, covert meetings, secret world-changing technology, and huge sums of money changing hands—sounds like the latest spy novel, right? But it’s not; this is a true story, where data is the main character in the Waymo vs Uber case.

    Data is an organization's most valuable asset. Just ask your most determined adversary, keen on stealing your intellectual property for financial gain. Do you have the right strategy in place to protect your critical value assets?

    If that plan doesn’t include a system and process that gives you 360-degree visibility into users’ behavior, and links those behaviors with network data, emails, texts, digital, social media, and mobile forensic artifacts, you aren’t as protected as you think. The Waymo vs Uber case offers us a valuable, real-world situation to learn from and guide our own practices.

    Join our CTO, Stephen Stewart, and SVP and former naval intelligence officer Keith Lowry, to learn how organizations are combining traditional investigations, eDiscovery, and cybersecurity tactics to defend their organizations from insider threats.

    We'll cover:

    The latest twists and turns of the Waymo vs Uber case
    How you can apply counterintelligence techniques to combat industrial espionage
    How organizations can gain a 360-degree investigative view of their environment, and be ready for their next digital threat.
  • Left and Right of Breach
    Left and Right of Breach Stuart Clarke & Nick Pollard Recorded: Oct 4 2017 58 mins
    Historically the initial focus of cybersecurity is to detect adversary activity after it has happened (right of breach). At this point the perimeter has already been breached and the attackers are in a position to exfiltrate data. While this is effective from an investigative perspective, we are not best equipped for the modern threats facing our organisations. In this webinar we will discuss the need to make a paradigm shift to get ahead of a breach (left of breach) and towards a state of prevention.

    KEY TAKEAWAYS
    1. Understand the impact of being right of breach.
    2. Explore how endpoint technology and behavioral analysis can move us towards being left of breach.
    3. Learn how being left of breach can enable better visibility more effective use of intelligence
  • Hyperscale Your Investigations and Intelligence Capabilities
    Hyperscale Your Investigations and Intelligence Capabilities Paul Slater & Mark McCluskie Recorded: Sep 14 2017 61 mins
    How do you future-proof your investigative lab capabilities to handle the expanding complexity and volumes of digital evidence involved in cases today?

    During this session you will hear some ideas and concepts to help tackle this ever growing problem and how intelligent, defensible workflows enable investigators to work together at a national level, giving them one view over multiple jurisdictions and multi-terabyte case files.

    Learn how to:
    1. Automatically identify and link key artifacts and intelligence items such as named entities and digitally fingerprinted material across multiple evidence sources and historical cases
    2. Set up collaborative investigations involving hundreds of investigators, officers and analysts, who can all work together on cases no matter where they are located
    3. Prioritize and distribute key data to users of differing skill levels to maximize skill sets and resources.
  • Train as You Fight: The Value of Threat Simulations vs. Pen Testing
    Train as You Fight: The Value of Threat Simulations vs. Pen Testing Ryan Linn, Director of Advanced Tactics and Countermeasures Recorded: Apr 12 2016 59 mins
    Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.

    Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
    This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.

    We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
  • Lessons Not Learned: Cybersecurity's Habitual Mistakes
    Lessons Not Learned: Cybersecurity's Habitual Mistakes Grayson Lenik, Nuix; Dan Haagman, NotSoSecure; Gregory J. Bautista, Wilson Elser LLP; Scott Sarafian, US Secret Service Recorded: Mar 23 2016 59 mins
    Since data breaches have increasingly become more commonplace, it seems reasonable that the lessons learned from each incident would find their way into the defensive strategies of non-impacted organizations the world over. The truth is, while a large portion of this information is publically available, organizations are still suffering from the same poor IT hygiene that has plagued the industry for years. Why is that the case?

    Join Moderator Chris Pogue, SVP, Nuix Cyber Threat Analysis Team, and a panel of security experts from Nuix, Kroll, Wilson Elser, and the United States Secret Service as they discuss their observations from the thousands of breaches they have collectively investigated or litigated, and try to identify the elusive answer to the seemingly simple question, “Why are we not learning our lesson?”.

Embed in website or blog