Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Data Processing for Service Providers
    Data Processing for Service Providers
    Scott Lefton, Principal Technical Engineer and John Massengale, Sr. Technical Engineer Recorded: May 23 2019 32 mins
    For service providers looking for the fastest processing speed and user friendly ECA within a tool that can be loaded into a variety of different final review platforms, including a direct export into Relativity, Quin-C for legal has you covered. With a configuration built specifically for your needs, Quin-C can help you surface new, meaningful connections across data in a highly customizable, widget-based interface. Quin-C for legal delivers comprehensive data processing, review and analysis, for results that are transparent and legally defensible. It’s also available in the cloud!
  • What's New in Quin-C? Enhanced Automation Tools for Legal Teams
    What's New in Quin-C? Enhanced Automation Tools for Legal Teams
    Scott Lefton, Principal Technical Engineer and Oronde Ward, Dir. of Legal Services and Training Recorded: Apr 2 2019 34 mins
    The recent release of Quin-C features built-in automation tools that enable legal teams to work faster throughout the legal investigation workflow. Tabbed production, custom slip sheets, expanded Bates searching, Cloud accessibility and a customer billing widget are just a few of the features in this recent release.
  • AccessData Managed Cloud Services—a Q&A with Eide Bailly
    AccessData Managed Cloud Services—a Q&A with Eide Bailly
    Marc Cressall, Vice President of Business Development and Trent Leavitt, Manager Digital Forensics & eDiscovery Recorded: Mar 28 2019 60 mins
    Join this 60-minute Q&A with Trent Leavitt of Eide Bailly and learn more about their recent deployment of AD Lab in the Cloud. Marc Cressall will moderate as Trent describes how the cloud has provided them with speed, collaboration, scalability, cost savings and security.
  • After the Attack—Surviving and Thriving Post-Breach
    After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Recorded: Mar 21 2019 51 mins
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • What you need to know about forensics in the cloud
    What you need to know about forensics in the cloud
    Marc Cressall, VP Business Development at AccessData and Keith Lockhart, Vice President of Strategic Programs at AccessData Recorded: Feb 27 2019 31 mins
    More and more organizations have made the decision to migrate to the cloud. Speed, security, collaboration, scalability and reliability are some of the many benefits of adopting a cloud strategy. In fact, some larger organizations and government agencies have a cloud first policy owing to the aforementioned benefits. However, given the current assumption of “when, not if” a cyber event will affect your organization, it’s necessary to have a plan in place for collecting evidential data from the cloud and analyzing it in a forensically sound manner.

    Join Marc Cressall, VP Business Development and Keith Lockhart, VP Strategic Programs in a 30-minute webinar to learn about:

    • Trends impacting forensics in the cloud
    • Benefits of the cloud
    • What AccessData offers in managed cloud solutions

    Next up—in March, Eide Bailly joins us to talk about how they are using the AccessData Cloud Solution to increase the efficiency of working a case and increase their overall profits. You won’t want to miss it!
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach
    EDRM and AccessData Recorded: Jan 23 2019 56 mins
    Back by popular demand, we're providing you another chance to view this popular webinar from Fall of 2018. Enjoy the replay!

    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage
    Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage
    Kurt Aubuchon, Computer Forensics Consultant & Educator; Scott Lefton, Sales Engineer, AccessData Recorded: Nov 9 2018 60 mins
    A series of emails sent in March 2016 to senior political officials would set into motion one of the most notorious cyber security attacks in history, intent on influencing the upcoming US presidential elections. Fancy Bear, a household name among cybersecurity professionals for its long history of cyber-espionage and disinformation campaigns, was behind the attack—a hack unlike anything ever seen before. But how did Fancy Bear manage to infiltrate the computer systems of a major political party? During this webinar, guest presenter Kurt Aubuchon will provide an in-depth, technical analysis of events leading up to and during the attack, and the lessons that can be learned by information security practitioners. Attendees will earn 1 CPE credit.
  • Data Encryption and Forensics in the Cloud
    Data Encryption and Forensics in the Cloud
    Garry McCracken, Vice President, Technology Partnerships, WinMagic; Tod Ewasko, Director of Product Management, AccessData Recorded: Oct 26 2018 32 mins
    Encryption has long been used to help secure corporate data at the endpoint, to protect company information from unauthorized access by would-be bad actors. As more and more corporations are moving data and solutions to the cloud as a way of reducing costs, there are often questions about how encryption and digital forensics might work in a virtual environment. During this webinar, we’ll discuss the role of encryption in forensics, and how it can be adopted in cloud-based solutions, as well to ensure data security as your data moves. no matter where your data resides.
  • Internal Investigations in Today’s Connected World
    Internal Investigations in Today’s Connected World
    Len Robinson, Ahold Delhaize; Paul Becker, Rockwell Automation: and Keith Lockhart, AccessData Recorded: Oct 23 2018 60 mins
    Whether for employee theft, harassment, data security or other events, corporations are conducting internal investigations on almost a daily basis to investigate claims and identify potential issues. These investigations can prove challenging when crucial evidence in a case is often located across disparate devices and platforms, and numerous stakeholder across the organization need to be involved. Investigative teams need to be prepared in advance for when the need to investigate should arise, to ensure it is handled quickly, efficiently and cost effectively without disruption to business operations.

    During this webinar we will discuss recommended best practices for ensuring a successful internal investigation, covering everything from who should be involved to how you prepare when the investigation moves to potential litigation.
  • The Dark Web and Your Data
    The Dark Web and Your Data
    Rob Comella, Sr. Forensics Instructor, AccessData Recorded: Oct 12 2018 31 mins
    If your organization has had a data breach or hacking incident, there’s a good chance your stolen data could end up on the dark web. Anything from social security numbers to passports and medical records can be purchased on the dark web for the right price. How much do you know about this secretive version of the internet? Organizations need to understand the dark web and the illicit activity that it supports, in order to help track cyber criminals and prevent threats on your data. Join us for a discussion covering everything you need to know about the dark web, and how digital forensics tools can be used to shed light on dark web activity.

Embed in website or blog