Hi [[ session.user.profile.firstName ]]

Reducing Breach Costs with Early Detection and Rapid Response

It takes minutes to get inside. Days to exfiltrate. Detection can take weeks, maybe months. The impact is huge: lost revenue, increased costs, and damage to your organization’s brand.

You can’t completely stop breaches from happening, but you can remediate the direct and indirect costs they can have on your organization. By taking a proactive stance, you can properly plan and budget for the costs associated with a breach. Through early detection and rapid response, you can obviate the need to notify affected customers and reduce the costs associated with notification.

This webinar will cover:
• How a “data breach” is defined, legislated, and how they occur
• Direct and indirect costs facing organizations that are breached
• Differences between “left of breach” (proactive approach) and “right of breach” (reactive approach) by exploring real-world examples
• How early detection and rapid response can drive down the cost of a breach.

About the presenters:

Harlan Carvey, Director of Intelligence Integration
Harlan began his career in information security 28 years ago. After serving on active duty with the United States military, he transitioned to planning, coordinating, and executing vulnerability assessments. He then went on to digital forensics and incident response, which in turn led to targeted threat hunting and response.
Recorded Apr 25 2018 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Harlan Carvey Director of Intelligence Integration, at Nuix
Presentation preview: Reducing Breach Costs with Early Detection and Rapid Response

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Nuix Orchestration because staring at a progress bar is never fun Dec 4 2018 2:00 pm UTC 60 mins
    Alex Chatzistamatis and Glen Painter
    Staring at a progress bar is nobody’s idea of a good time: Investigation, discovery and information governance tasks often involve complex workflows that you must complete consistently and repeatably. Traditional approaches—such as detailed process manuals, custom scripts, third-party applications, or just staring at the progress bar—all have hidden costs in time, money, inconsistency, and potential for errors.

    Nuix Orchestration is a web-based multi-user graphical tool that allows you to map out complex data processes across multiple activities and machines and let them run with minimal user input. It gives you the “easy button” to optimize resource utilization, manage changing priorities, and maintain consistent workflows.

    Alex Chatzistamatis and Glen Painter will demonstrate how Nuix Orchestration can:
    Help you achieve greater efficiencies, manage resource utilization, optimize processes, and shift priorities from a collaborative web-based platform.
    Streamline many repetitive tasks such as processing, search and tag, exclusions, OCR, production sets and legal exports into easy-to-use workflows.
    Maximize throughput by queuing tasks across multiple servers overnight, eliminating the need to wait around for one process to complete so you can feed the results into the next.
    Minimize errors and rework, creating detailed templates and workflows with consistent settings applied to each activity, greatly reducing the opportunity for human error and the need for costly rework.
  • Consistent, Repeatable, Powerful Nuix 7.6 enhances eDiscovery and investigations Nov 28 2018 11:30 am UTC 45 mins
    Dr Nick Sharples
    Our latest release is designed to give eDiscovery professionals, legal operations, lawyers, investigators, information governance professionals, and law enforcement additional freedom and functionality to automate and simplify their workflows.

    Users will find it easier to add, organize, and share information within and across cases, incorporate social media into investigations, and load and process files with additional data inputs, bulk load capabilities, and workflow templates.
  • Privacy Framework – The Information Governance and Cybersecurity Intersection Nov 27 2018 6:00 pm UTC 60 mins
    Brian Tuemmler | Nuix Solutions Manager - Information Governance
    Organizations are faced with growing and increasingly complex privacy regulations but looking at the market you only see myopic and mono-disciplinary solutions.

    In this webinar, we will demonstrate how you can align a proactive information governance approach with a robust and focused cybersecurity solution.

    Along the way, you will learn how you can use the Nuix tools for cleanup, organization, discovery, investigation, classification, and protection to solve for more than just data protection.
  • When Breach of Trust Leads to Termination Recorded: Nov 13 2018 33 mins
    Paul Hamrick | Nuix Head of Investigations
    Corporate crime costs the US economy $50bn a year – a risk your organization cannot afford to ignore.
    Digital data, bring your own devices, the use of social media in the workplace, and a mobile workforce, leaves your organization open to employee misconduct. In this webinar we’ll show you how to avoid the costs associated with external providers by detecting fraud using in-house resources.
  • Nuix Ringtail demonstration: removing doubt from your discovery process Recorded: Nov 12 2018 31 mins
    Christina Mather, Solutions Consultant, Nuix
    “Nuix, known for its strength in its processing engine, combined with the powerful review and automation capabilities of Ringtail promises to be a true end-to-end eDiscovery platform” - Mary Mack, Executive Director, The Association of Certified E-Discovery Specialists (ACEDS)

    We’ve entered a new age of eDiscovery: the world’s leading eDiscovery processing, review, analytics and predictive coding technologies are now combined to help you uncover better evidence faster and quickly integrate it into your strategy for litigation and regulatory cases.

    Combining the patented processing power of the Nuix Engine across more than 1,000 file types and data formats with Ringtail’s efficient review and automation capabilities creates an end-to-end eDiscovery platform without compromise.

    Join our industry experts for a Nuix Ringtail demonstration to learn how this completely scalable solution can limit your risk, save you time and reduce your overall eDiscovery costs.

    Key reasons to attend:
    •Learn what benefits Nuix Ringtail can offer you over competing review platforms
    •See how Ringtail’s intuitive user interface and intelligent automation capabilities allow reviewers to complete each task with fewer clicks
    •Find out how all reviewers can leverage advanced data visualisations that are included in the base license to find issues faster
    •Never miss a shred of evidence thanks to the industry standard in processing for eDiscovery and forensic investigations.

    Join us on Monday, 12 November, at 2pm (GMT) to see why.
  • Tackling Insider Threat, Advanced Persistent Threats, and Incident Response Recorded: Oct 30 2018 50 mins
    Hoke Smith | Director, Cybersecurity & Analytics
    Most enterprise security stacks are comprised of dozens of complex disconnected tools, yet the gaps between these tools remain and threats get through. An emerging class of endpoint products offers the potential to simplify enterprise security architecture and at the same time reduce the risk of both external and internal threats. This webinar will demonstrate how Nuix Adaptive Security drives security-tool convergence by helping organizations detect malicious insiders, find advanced threat actors who evade traditional defenses, and give security operators a faster, more efficient means to respond and remediate incidents with a single piece of software.
  • Optimizing Nuix for Maximum Performance Recorded: Jul 31 2018 62 mins
    David Robinson and Mike Lappin
    Are you a Nuix user who’s interested in learning ways to increase efficiency and create more value?

    This webinar will provide updates on the latest Nuix product releases as well as tips to optimize the software for various use cases. We will also highlight some of the latest features geared to enhance your existing Nuix investment, including:

    ●Answering subject access requests
    ●Mapping electronically stored information (ESI)
    ●Performing a quick scan review of unstructured data
    ●Remediating your data: Move, delete, or encrypt
    ●Assessing risk for potential data exfiltration or breaches by conducting a sensitive data risk scan
    ●Covering new product release updates

    The team will wrap up the webinar with a short Q&A session that will allow you to further engage and ask any remaining questions that you might have.

    Do not miss this opportunity to learn practical tips and tricks from Nuix and industry experts.
  • Scaling for the future: Evolving your intelligence-driven digital investigations Recorded: Jul 23 2018 49 mins
    Stuart Clarke, Global Head of Security & Intelligence
    Investigative teams are under increasing pressure to respond to challenges caused by greater volumes of data and a more diverse range of digital devices.

    Key facts are often spread across multiple evidence sources, making it difficult to understand the bigger picture and often requiring an investigator to manually correlate their findings and identify connections. This places an increasing burden on overstretched teams, who need to respond faster and with more accuracy.

    Join Stuart Clarke, Global Head Security & Intelligence at Nuix who will introduce collaborative and intelligence driven investigations that can augment human investigative skills and expose the hidden relationships across people, objects, locations and events.

    Key takeaways:

    • Learn how a single pane of glass can help expose hidden relationships in the data
    • Understand the importance of efficient workflows that can make best use of technology
    • Find out how the latest technology can augment your investigative teams to enable you to make timely and informed decisions

    The presenter: Stuart Clarke, Global Head of Security & Intelligence Solutions

    Stuart is an internationally respected information security expert who is responsible for the overall security and intelligence strategy and delivery at Nuix. During his time at the company, Stuart has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams. He led the development of Nuix Investigation & Response, an innovative investigative tool used to delve into the causes and scope of data breaches.
  • Your IT Department Purchased Office 365 - How Do You Transfer Data? Recorded: Jun 28 2018 54 mins
    Mo Ramsey and Alex Chatzistamatis
    Has your IT department recently purchased Office 365? Is your team thinking about adopting the new technology? Discover what data you should move to Office 365 and why it matters to you in this interactive, free webinar in Lighthouse’s Office 365 series.

    Mo Ramsey, General Manager of Global Advisory Services at Lighthouse, and Alex Chatzistamatis, Principal Solutions Consultant at Nuix will cover diverse ways for you to move data and remediate risk, as well as key considerations to take when making the move. They will also dive into how the Nuix Engine may be used during this cumbersome process, its many capabilities, and key benefits.

    The team will wrap up the webinar with a short Q&A session that will allow you to further engage and ask any remaining questions that you and your team may have. Do not miss this free opportunity to learn practical tips and tricks from industry experts.
  • GDPR is here – What’s next for organisations? Recorded: Jun 25 2018 51 mins
    Brian Tuemmler, Information Governance Program Architect & Jack McMillian, Technical Project Manager
    After months, and years, of talking about it, the 25th May 2018 has come and gone meaning the EU General Data Protection Regulation (GDPR) is now in force. But what does that mean for organisations around the world? They are now faced with having to adjust their business practices to ensure compliance to the legislation given to data subjects – yet in seems that no one is ready or many have underestimated the extent of the organisational changes that lies ahead. We have already seen many news websites be taken offline for European audiences under the GDPR rules and the big player of Facebook and Google already accused of breaching the framework. It is only a matter of time before EU data subjects begin to fully exercise their rights, such as Subject Access Requests (SAR). How could you cope with the pressure of responding to these requests?
    There Is a silver lining. In this webinar, we review some practical steps that your business can take to address GDPR concerns, specifically when dealing with data subject requests.

    Key takeaways:
    •Explore practical steps that businesses can take to address their GDPR data requirements.
    •Discuss the ability to act post-GDPR, where it is never too late to begin building your infrastructure
    •Outline ways to improve costs and man power to address business GDPR issues, such as responding and producing subject access requests.
  • The Black Report Recorded: May 23 2018 44 mins
    Chris Pogue, Head of Services, Security and Partner Integration
    The second edition of The Nuix Black Report has been released including new insights and information on the source of the threat, the attackers and penetration testers themselves. Join Chris Pogue, Head of Services, Security and Partner Integration, discuss the true nexus between attacker methodology and defensive posture in this live webinar.

    You will gain a deeper understanding of the nexus between attacker methodology and defensive posture, including

    1. Which security programs and countermeasures will improve your security posture? They’re not the ones you think
    2. What’s the best spend for your security dollar and why?
    3. If hackers could speak to your organization’s leaders, what would they say?
  • GDPR - Let’s talk legal, the implications of GDPR and your data Recorded: May 22 2018 37 mins
    Nick Pollard, Head of Region, Southern & Eastern Europe, Emerging Markets at Nuix and Gareth Atkinson, StartRiskLab
    Organisations are still worried that they may still be open to GDPR legal issues and legal interpretation. Join our speakers Nick Pollard, Nuix and Gareth Atkinson, StartRiskLab who will explore where you should be right now with your GDPR preparations.

    In this webinar, you will learn:

    1. How to cross-reference your preparations
    2. Understand the legal position on various GDPR schedules
  • Reducing Breach Costs with Early Detection and Rapid Response Recorded: Apr 25 2018 28 mins
    Harlan Carvey Director of Intelligence Integration, at Nuix
    It takes minutes to get inside. Days to exfiltrate. Detection can take weeks, maybe months. The impact is huge: lost revenue, increased costs, and damage to your organization’s brand.

    You can’t completely stop breaches from happening, but you can remediate the direct and indirect costs they can have on your organization. By taking a proactive stance, you can properly plan and budget for the costs associated with a breach. Through early detection and rapid response, you can obviate the need to notify affected customers and reduce the costs associated with notification.

    This webinar will cover:
    • How a “data breach” is defined, legislated, and how they occur
    • Direct and indirect costs facing organizations that are breached
    • Differences between “left of breach” (proactive approach) and “right of breach” (reactive approach) by exploring real-world examples
    • How early detection and rapid response can drive down the cost of a breach.

    About the presenters:

    Harlan Carvey, Director of Intelligence Integration
    Harlan began his career in information security 28 years ago. After serving on active duty with the United States military, he transitioned to planning, coordinating, and executing vulnerability assessments. He then went on to digital forensics and incident response, which in turn led to targeted threat hunting and response.
  • Closing the Window on Fraud and Financial Crime Recorded: Mar 14 2018 42 mins
    Keith Lowry, SVP & Peter Evans, Sr. Information Security Consultant, Nuix
    Everyone’s been compromised. Financial services companies should just assume that’s the case. Yet, many companies still don’t have effective programs or inter-departmental policies and procedures in place. They measure the time it takes to identify a breach in months, sometimes years, and fraudulent transactions often go uncaught.

    However, there is hope. We will examine three distinct cases of financial fraud and, using investigations, eDiscovery, and cybersecurity tools in new ways, demonstrate how you can minimize your risk and limit the damage done to your organization.

    Attendees to this webinar will learn:

    • The differences, and similarities, between three distinct types of financial fraud using real-world examples
    • The business challenges that arise from not detecting or reacting to fraud and security incidents
    • How inter-departmental boundaries prohibit effective response
    • How to expand their use of traditional forensic, eDiscovery, and cybersecurity tools to shorten the time criminals have to operate.

    Presenters:

    Keith has more than 25 years of experience implementing, managing, and directing insider threat, counterintelligence, and intelligence collection programs. He is a former law enforcement officer and High-Technology Crime Unit detective with the City of San Jose California and a United States Navy Mobilized Reservist. He also served as Chief of Staff to the Deputy Under Secretary of Defense for Human intelligence, Counterintelligence and Security at the Pentagon.

    Peter is a Senior Information Security Consultant at Nuix. He has more than ten years’ experience in federal law enforcement and another ten years’ experience as an Information technologies and radio frequency engineer. While working in law enforcement, Peter was detailed to the Electronic Crimes Task Force and was the lead forensic investigator on many computer crimes, network intrusions, and wireless exploitation cases.
  • Corporate Espionage Recorded: Feb 15 2018 43 mins
    David Smith, CISO, Nuix and Nick Pollard, Nuix
    For as long as there has been commerce, there has been espionage. Although the medium for the theft of data may be as prosaic as a USB device, the impact of the loss of sensitive information can be financially devastating for the victim. In contrast, the intrinsic value of the information stolen may be completely disproportionate to the reputational damage caused if the outside world perceives that the organisation concerned failed to take adequate steps to prevent such leaks.

    Espionage takes many forms and can range from a simple swipe of client data by a departing employee through to a sophisticated data grab of business critical documents.
  • Theory to Practice: Insider Threat Lessons from Waymo vs. Uber Recorded: Jan 25 2018 51 mins
    Stephen Stewart & Keith Lowry
    Well-placed insiders, covert meetings, secret world-changing technology, and huge sums of money changing hands—sounds like the latest spy novel, right? But it’s not; this is a true story, where data is the main character in the Waymo vs Uber case.

    Data is an organization's most valuable asset. Just ask your most determined adversary, keen on stealing your intellectual property for financial gain. Do you have the right strategy in place to protect your critical value assets?

    If that plan doesn’t include a system and process that gives you 360-degree visibility into users’ behavior, and links those behaviors with network data, emails, texts, digital, social media, and mobile forensic artifacts, you aren’t as protected as you think. The Waymo vs Uber case offers us a valuable, real-world situation to learn from and guide our own practices.

    Join our CTO, Stephen Stewart, and SVP and former naval intelligence officer Keith Lowry, to learn how organizations are combining traditional investigations, eDiscovery, and cybersecurity tactics to defend their organizations from insider threats.

    We'll cover:

    The latest twists and turns of the Waymo vs Uber case
    How you can apply counterintelligence techniques to combat industrial espionage
    How organizations can gain a 360-degree investigative view of their environment, and be ready for their next digital threat.
  • Augmenting Human Intelligence Recorded: Jan 17 2018 53 mins
    Stuart Clarke and Nick Sharples
    Automation technology has been advancing at a rapid pace in recent years. Developments in the fields of artificial intelligence and machine learning have enabled organisations to handle, process and interrogate masses of data that would have been impossible not so long ago.

    In this webinar, we will review cases involving financial crime and explore the right mixture of machine and human resources when responding to cyber-related incidents.

    Key takeaways:
    - Explore how machine learning and artificial intelligence are vital for the future of cybersecurity and intelligence driven investigations
    - Understand how to make use of machine learning within Nuix to reduce noise and identify artefacts relevant to your investigation
    - Explore how Nuix Analytics & Intelligence uses traditional graph search to focus on important relationships that will deliver insights in complex cases
    - Understand the divide between the investigation of activity by a human investigator and the insights into that activity brought by automated analysis
  • Left and Right of Breach Recorded: Oct 4 2017 58 mins
    Stuart Clarke & Nick Pollard
    Historically the initial focus of cybersecurity is to detect adversary activity after it has happened (right of breach). At this point the perimeter has already been breached and the attackers are in a position to exfiltrate data. While this is effective from an investigative perspective, we are not best equipped for the modern threats facing our organisations. In this webinar we will discuss the need to make a paradigm shift to get ahead of a breach (left of breach) and towards a state of prevention.

    KEY TAKEAWAYS
    1. Understand the impact of being right of breach.
    2. Explore how endpoint technology and behavioral analysis can move us towards being left of breach.
    3. Learn how being left of breach can enable better visibility more effective use of intelligence
  • Hyperscale Your Investigations and Intelligence Capabilities Recorded: Sep 14 2017 61 mins
    Paul Slater & Mark McCluskie
    How do you future-proof your investigative lab capabilities to handle the expanding complexity and volumes of digital evidence involved in cases today?

    During this session you will hear some ideas and concepts to help tackle this ever growing problem and how intelligent, defensible workflows enable investigators to work together at a national level, giving them one view over multiple jurisdictions and multi-terabyte case files.

    Learn how to:
    1. Automatically identify and link key artifacts and intelligence items such as named entities and digitally fingerprinted material across multiple evidence sources and historical cases
    2. Set up collaborative investigations involving hundreds of investigators, officers and analysts, who can all work together on cases no matter where they are located
    3. Prioritize and distribute key data to users of differing skill levels to maximize skill sets and resources.
  • Train as You Fight: The Value of Threat Simulations vs. Pen Testing Recorded: Apr 12 2016 59 mins
    Ryan Linn, Director of Advanced Tactics and Countermeasures
    Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.

    Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
    This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.

    We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Nuix is a cybersecurity, risk and compliance software company
Nuix (www.nuix.com) understands the DNA of data at enormous scale. Our software pinpoints the critical information organisations need to anticipate, detect and act on cybersecurity, risk and compliance threats

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Reducing Breach Costs with Early Detection and Rapid Response
  • Live at: Apr 25 2018 4:00 pm
  • Presented by: Harlan Carvey Director of Intelligence Integration, at Nuix
  • From:
Your email has been sent.
or close