Hi [[ session.user.profile.firstName ]]

After the Attack—Surviving and Thriving Post-Breach

More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

• Understand responsibilities and ramifications of ever-tightening data privacy rules
• Minimize damages and mitigate risk exposure with rapid response strategies
• Identify various breach threats and common network vulnerabilities
• Analyze key learnings from prominent breach events
• See how technology can help you investigate, automate and document key processes
Recorded Mar 21 2019 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
Presentation preview: After the Attack—Surviving and Thriving Post-Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What's New in Quin-C? Enhanced Automation Tools for Legal Teams Apr 2 2019 3:00 pm UTC 30 mins
    Scott Lefton, Principal Technical Engineer and Keith Lockhart, VP Strategic Programs
    The recent release of Quin-C features built-in automation tools that enable legal teams to work faster throughout the legal investigation workflow. Tabbed production, custom slip sheets, expanded Bates searching, Cloud accessibility and a customer billing widget are just a few of the features in this recent release.
  • AccessData Managed Cloud Services—a Q&A with Eide Bailly Mar 28 2019 3:00 pm UTC 60 mins
    Marc Cressall, Vice President of Business Development and Trent Leavitt, Manager Digital Forensics & eDiscovery
    Join this 60-minute Q&A with Trent Leavitt of Eide Bailly and learn more about their recent deployment of AD Lab in the Cloud. Marc Cressall will moderate as Trent describes how the cloud has provided them with speed, collaboration, scalability, cost savings and security.
  • After the Attack—Surviving and Thriving Post-Breach Recorded: Mar 21 2019 51 mins
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • What you need to know about forensics in the cloud Recorded: Feb 27 2019 31 mins
    Marc Cressall, VP Business Development at AccessData and Keith Lockhart, Vice President of Strategic Programs at AccessData
    More and more organizations have made the decision to migrate to the cloud. Speed, security, collaboration, scalability and reliability are some of the many benefits of adopting a cloud strategy. In fact, some larger organizations and government agencies have a cloud first policy owing to the aforementioned benefits. However, given the current assumption of “when, not if” a cyber event will affect your organization, it’s necessary to have a plan in place for collecting evidential data from the cloud and analyzing it in a forensically sound manner.

    Join Marc Cressall, VP Business Development and Keith Lockhart, VP Strategic Programs in a 30-minute webinar to learn about:

    • Trends impacting forensics in the cloud
    • Benefits of the cloud
    • What AccessData offers in managed cloud solutions

    Next up—in March, Eide Bailly joins us to talk about how they are using the AccessData Cloud Solution to increase the efficiency of working a case and increase their overall profits. You won’t want to miss it!
  • After the incident: investigating and responding to a data breach Recorded: Jan 23 2019 56 mins
    EDRM and AccessData
    Back by popular demand, we're providing you another chance to view this popular webinar from Fall of 2018. Enjoy the replay!

    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage Recorded: Nov 9 2018 60 mins
    Kurt Aubuchon, Computer Forensics Consultant & Educator; Scott Lefton, Sales Engineer, AccessData
    A series of emails sent in March 2016 to senior political officials would set into motion one of the most notorious cyber security attacks in history, intent on influencing the upcoming US presidential elections. Fancy Bear, a household name among cybersecurity professionals for its long history of cyber-espionage and disinformation campaigns, was behind the attack—a hack unlike anything ever seen before. But how did Fancy Bear manage to infiltrate the computer systems of a major political party? During this webinar, guest presenter Kurt Aubuchon will provide an in-depth, technical analysis of events leading up to and during the attack, and the lessons that can be learned by information security practitioners. Attendees will earn 1 CPE credit.
  • Data Encryption and Forensics in the Cloud Recorded: Oct 26 2018 32 mins
    Garry McCracken, Vice President, Technology Partnerships, WinMagic; Tod Ewasko, Director of Product Management, AccessData
    Encryption has long been used to help secure corporate data at the endpoint, to protect company information from unauthorized access by would-be bad actors. As more and more corporations are moving data and solutions to the cloud as a way of reducing costs, there are often questions about how encryption and digital forensics might work in a virtual environment. During this webinar, we’ll discuss the role of encryption in forensics, and how it can be adopted in cloud-based solutions, as well to ensure data security as your data moves. no matter where your data resides.
  • Internal Investigations in Today’s Connected World Recorded: Oct 23 2018 60 mins
    Len Robinson, Ahold Delhaize; Paul Becker, Rockwell Automation: and Keith Lockhart, AccessData
    Whether for employee theft, harassment, data security or other events, corporations are conducting internal investigations on almost a daily basis to investigate claims and identify potential issues. These investigations can prove challenging when crucial evidence in a case is often located across disparate devices and platforms, and numerous stakeholder across the organization need to be involved. Investigative teams need to be prepared in advance for when the need to investigate should arise, to ensure it is handled quickly, efficiently and cost effectively without disruption to business operations.

    During this webinar we will discuss recommended best practices for ensuring a successful internal investigation, covering everything from who should be involved to how you prepare when the investigation moves to potential litigation.
  • The Dark Web and Your Data Recorded: Oct 12 2018 31 mins
    Rob Comella, Sr. Forensics Instructor, AccessData
    If your organization has had a data breach or hacking incident, there’s a good chance your stolen data could end up on the dark web. Anything from social security numbers to passports and medical records can be purchased on the dark web for the right price. How much do you know about this secretive version of the internet? Organizations need to understand the dark web and the illicit activity that it supports, in order to help track cyber criminals and prevent threats on your data. Join us for a discussion covering everything you need to know about the dark web, and how digital forensics tools can be used to shed light on dark web activity.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks? Recorded: Sep 28 2018 63 mins
    AccessData and Corporate Counsel Business Journal
    This webinar will identify BYOD trends, concerns and its impact on eDiscovery.
  • Drone Forensics Recorded: Sep 28 2018 63 mins
    Rob Attoe, CEO, Spyder Forensics
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAVs on a regular basis and creating a new branch of digital forensics. This webinar is designed to introduce the investigator into the world of Drone Forensics and gain insight into the types of evidence the examiner is likely to encounter. We will be reviewing how drones are used in criminal activities and explore the types of data that can be collected from the aircraft and associated controller applications. You'll receive 1 CPE credit for attending.
  • After the incident: investigating and responding to a data breach Recorded: Sep 25 2018 57 mins
    EDRM and AccessData
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Targeted Search on Live Remote Systems with AD Enterprise Recorded: Sep 21 2018 16 mins
    Steve Sunday, Senior Sales Engineer, AccessData
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • You've been breached: now what? Recorded: Sep 14 2018 30 mins
    Nick Drehel, VP of Training, Access Data
    Do you know where to begin if your organization is impacted by a breach? Learn about best practices for post-breach analysis and response.
  • Session 3: It’s No Secret: Europe’s GDPR and Other Emergent Privacy Issues Recorded: Aug 29 2018 55 mins
    Panelists: Matt Kelly, CEO of Radical Compliance; Catherine Castaldo, Global Chief Privacy Officer, Nuance Communications; Zo
    Emerging privacy issues are coming your way—are you prepared for all the change? Europe’s General Data Protection Regulation will impose significant new duties of risk assessment, data protection, breach response, and much more on companies around the world. Join us for a webinar focused on the potential impact of GDPR coming into force next spring, and how to prepare. Panelists discuss how these obligations will affect companies’ information risk management efforts, and how prepared your business needs to be for these compliance burdens coming soon.
  • Session 2 Managing Internal Investigations Swamped with Data Recorded: Aug 28 2018 58 mins
    Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Mark Antalik, Managing Director, BDO's Forensic Tec
    Digital forensics is critical to today’s internal investigations swamped in data. How prepared are you to manage the task? Hear panelists discuss strategies and techniques for internal investigations where data forensics is critical. They’ll answer questions such as how a company can police against insider threats, and how BYOD policy management can satisfy modern corporate life and modern information risk. They’ll also share pitfalls to avoid so companies won’t inadvertently jeopardize privacy or IP rights (their own or someone else’s) during investigations.
  • Session 1 Information Risk and Compliance in the Digital Age Recorded: Aug 28 2018 55 mins
    Panelists: Moderated by Matt Kelly, Editor and CEO of Radical Compliance; Debra Farber, Privacy Consultant and former Sr. Dir
    Is your IT team driving information risk strategy, or is it being driven by new technology used across your organization? How do you divide and conquer risk and data governance across disparate teams and tools? How do you define information risk? In this webinar, speakers will answer these questions and more as they explore the modern challenges of information risk, and the oversight systems necessary for the enterprise-wide management of it. They’ll share insights and best practices on how to strike the balance between instituting protective measures, responding to threats and providing assurances that risk is under control.
  • Collaborative Review: scaling, tasking, customizing data and customizing tools, Recorded: Aug 24 2018 32 mins
    Keith Lockhart, AccessData Vice President of Strategic Programs
    Learn how Quin-C delivers against the problem of multiple skill sets, reviewing data by scaling the tools used, accessible cases and data within those cases, as well as providing specific direction as to what work needs to be completed (including review). This model includes verbose logging and management visibility into user activities and direct task management.
  • Visualizing Data: call chains, timelines and geo-plotting Recorded: Aug 17 2018 27 mins
    Keith Lockhart, AccessData Vice President of Strategic Programs
    Use Quin-C's widget-based visualization tools to discover patterns and relationships between people, places and time. Force multiply those relationships by utilizing these techniques across multiple datasets/cases concurrently.
  • Ensuring Defensible Preservation and Collection Post FRE 902 Recorded: Apr 11 2018 63 mins
    Scott Lefton and Melissa Singleton, AccessData
    The December 2017 changes to Federal Rule of Evidence 902 (14) replaced in-person testimony to establish electronic evidence authenticity with a written certification. This means that a forensic investigator is now able to submit written notification that the evidence is authentic without having to be at trial to testify in person, assuming that the tools begin used to preserve and collect as part of e-discovery can validate a defensible approach.


    In this webinar we will explore how a forensically sound platform for managing e-discovery, can easily help investigative and legal teams ensure the defensibility of their preservation and collection, no matter where the data resides, to ensure compliance with Rule 902 (14), reduce risk of data spoliation and reduce overall cost. We’ll walk through some hypothetical investigation examples and demonstrate how using AD eDiscovery, the end-to-end forensically secure e-discovery platform from AccessData, provides the repeatable, defensible process needed to stand up in court.
AccessData
Whether it’s for investigation, litigation or compliance, AccessData® offers industry-leading solutions that put the power of forensics in your hands. For over 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations
and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity. For more information, visit www.accessdata.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: After the Attack—Surviving and Thriving Post-Breach
  • Live at: Mar 21 2019 4:00 pm
  • Presented by: Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
  • From:
Your email has been sent.
or close