Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage
    Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage
    Kurt Aubuchon, Computer Forensics Consultant & Educator; Scott Lefton, Sales Engineer, AccessData Recorded: Nov 9 2018 60 mins
    A series of emails sent in March 2016 to senior political officials would set into motion one of the most notorious cyber security attacks in history, intent on influencing the upcoming US presidential elections. Fancy Bear, a household name among cybersecurity professionals for its long history of cyber-espionage and disinformation campaigns, was behind the attack—a hack unlike anything ever seen before. But how did Fancy Bear manage to infiltrate the computer systems of a major political party? During this webinar, guest presenter Kurt Aubuchon will provide an in-depth, technical analysis of events leading up to and during the attack, and the lessons that can be learned by information security practitioners. Attendees will earn 1 CPE credit.
  • Data Encryption and Forensics in the Cloud
    Data Encryption and Forensics in the Cloud
    Garry McCracken, Vice President, Technology Partnerships, WinMagic; Tod Ewasko, Director of Product Management, AccessData Recorded: Oct 26 2018 32 mins
    Encryption has long been used to help secure corporate data at the endpoint, to protect company information from unauthorized access by would-be bad actors. As more and more corporations are moving data and solutions to the cloud as a way of reducing costs, there are often questions about how encryption and digital forensics might work in a virtual environment. During this webinar, we’ll discuss the role of encryption in forensics, and how it can be adopted in cloud-based solutions, as well to ensure data security as your data moves. no matter where your data resides.
  • Internal Investigations in Today’s Connected World
    Internal Investigations in Today’s Connected World
    Len Robinson, Ahold Delhaize; Paul Becker, Rockwell Automation: and Keith Lockhart, AccessData Recorded: Oct 23 2018 60 mins
    Whether for employee theft, harassment, data security or other events, corporations are conducting internal investigations on almost a daily basis to investigate claims and identify potential issues. These investigations can prove challenging when crucial evidence in a case is often located across disparate devices and platforms, and numerous stakeholder across the organization need to be involved. Investigative teams need to be prepared in advance for when the need to investigate should arise, to ensure it is handled quickly, efficiently and cost effectively without disruption to business operations.

    During this webinar we will discuss recommended best practices for ensuring a successful internal investigation, covering everything from who should be involved to how you prepare when the investigation moves to potential litigation.
  • The Dark Web and Your Data
    The Dark Web and Your Data
    Rob Comella, Sr. Forensics Instructor, AccessData Recorded: Oct 12 2018 31 mins
    If your organization has had a data breach or hacking incident, there’s a good chance your stolen data could end up on the dark web. Anything from social security numbers to passports and medical records can be purchased on the dark web for the right price. How much do you know about this secretive version of the internet? Organizations need to understand the dark web and the illicit activity that it supports, in order to help track cyber criminals and prevent threats on your data. Join us for a discussion covering everything you need to know about the dark web, and how digital forensics tools can be used to shed light on dark web activity.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks?
    BYOD: Do benefits of personal devices at work outweigh drawbacks?
    AccessData and Corporate Counsel Business Journal Recorded: Sep 28 2018 63 mins
    This webinar will identify BYOD trends, concerns and its impact on eDiscovery.
  • Drone Forensics
    Drone Forensics
    Rob Attoe, CEO, Spyder Forensics Recorded: Sep 28 2018 63 mins
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach
    EDRM and AccessData Recorded: Sep 25 2018 57 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise
    Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • You've been breached: now what?
    You've been breached: now what?
    Keith Lockhart, VP Strategic Programs, Access Data Recorded: Sep 14 2018 30 mins
    Do you know where to begin if your organization is impacted by a breach? Learn about best practices for post-breach analysis and response.
  • Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues
    Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues
    Panelists: Matt Kelly, CEO of Radical Compliance; Catherine Castaldo, Global Chief Privacy Officer, Nuance Communications; Zo Recorded: Aug 29 2018 55 mins
    Emerging privacy issues are coming your way—are you prepared for all the change? Europe’s General Data Protection Regulation will impose significant new duties of risk assessment, data protection, breach response, and much more on companies around the world. Join us for a webinar focused on the potential impact of GDPR coming into force next spring, and how to prepare. Panelists discuss how these obligations will affect companies’ information risk management efforts, and how prepared your business needs to be for these compliance burdens coming soon.

Embed in website or blog