Hi [[ session.user.profile.firstName ]]

After the Attack—Surviving and Thriving Post-Breach

More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

• Understand responsibilities and ramifications of ever-tightening data privacy rules
• Minimize damages and mitigate risk exposure with rapid response strategies
• Identify various breach threats and common network vulnerabilities
• Analyze key learnings from prominent breach events
• See how technology can help you investigate, automate and document key processes
Recorded Mar 21 2019 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
Presentation preview: After the Attack—Surviving and Thriving Post-Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • This Time Its Personal: CISOs and Other Corporate Leaders Face Criminal and Civi Recorded: Jun 19 2019 72 mins
    AccessData
    Information security professionals need to become more aware of the personal risks that they face, the legal landscape for incident response and security generally, and how to best protect themselves, their jobs and their careers. Aravind Swaminathan, partner at Orrick, will draw on his experience representing and advising information security professionals in connection with large data security events, and offer practical advice on how to keep you and your career protected.
  • AccessData User Summit Highlight Reel Recorded: Jun 19 2019 2 mins
    AccessData
    Customers talk about why they love attending ADUS and what new attendees can look forward to.
  • Connect the Cloud to the Ground with QView Recorded: Jun 6 2019 31 mins
    Scott Lefton, Principal Technical Engineer
    When you need the fastest viewer on the market today, QView features near-native document viewers, Quin-C allows documents in Excel®, PowerPoint® and other formats to appear almost exactly as they would in their native applications. Leverage full document markup and spreadsheet deep-dive capabilities or sync with Quin-C’s streamlined QView and convert common documents into JavaScript™ rendered versions for lightning-fast review. And just released is QView’s ability to work in an offline mode so you can download the data to your machine and review locally, then synch again to the database when you’re back online.
  • Law Enforcement Forensic Investigations Recorded: May 31 2019 1 min
    AccessData
    The increase in mobile data creates challenges for law enforcement when handling forensic investigations. AccessData solutions enable mobile data analysis alongside computer data, helping law enforcement complete investigations faster.
  • Quin-C for law firms Recorded: May 29 2019 30 mins
    John Massengale, Sr. Technical Engineer
    For Summation customers looking to upgrade to AccessData’s new legal review tool or any firm who wants groundbreaking investigation technology tailored to the legal market, Quin-C is a must-see. This pioneering technology helps legal teams surface new, meaningful connections across data in a highly customizable, widget-based HTML5 interface. Quin-C for legal delivers comprehensive data processing, review and analysis, for results that are transparent and legally defensible. Quin-C speeds the linear review of vast document sets with the fastest near-native web viewer available. Developed in close collaboration with the user community, Quin-C offers robust cross-case database search and multi-case analysis; document clustering and predictive coding; advanced visualizations; tactical, targeted processing capabilities; and easy integration with more than 155 data parsers.
  • Legal Investigations and E-Discovery Recorded: May 29 2019 1 min
    AccessData
    Ever-changing technologies, new regulations, cyber threats and more create ongoing challenges for legal professionals simply trying to better serve their clients. Our solutions can help ensure investigations are managed in a secure, defensible manner, while reducing overall e-discovery costs.
  • Managing Public Sector Investigations Recorded: May 28 2019 1 min
    AccessData
    As agencies continue to grapple with increased backlog from growing, more complex caseloads, it’s even more critical that teams can collaborate effectively and zero in on relevant evidence faster. Learn how AccessData can help.
  • Managing Investigations and Global Data Privacy Rights Recorded: May 24 2019 1 min
    AccessData
    Global organizations need tools that create the appropriate balance between collecting relevant evidence for investigations and maintaining privacy rights. Learn how AccessData’s solutions help ensure you’re protecting data integrity and privacy throughout an investigation.
  • AccessData Cloud Solutions for Service Providers Recorded: May 24 2019 1 min
    AccessData
    Learn how leveraging the cloud can help service providers get a secure, flexible solution for managing the diverse needs of their clients.
  • Data Processing for Service Providers Recorded: May 23 2019 32 mins
    Scott Lefton, Principal Technical Engineer and John Massengale, Sr. Technical Engineer
    For service providers looking for the fastest processing speed and user friendly ECA within a tool that can be loaded into a variety of different final review platforms, including a direct export into Relativity, Quin-C for legal has you covered. With a configuration built specifically for your needs, Quin-C can help you surface new, meaningful connections across data in a highly customizable, widget-based interface. Quin-C for legal delivers comprehensive data processing, review and analysis, for results that are transparent and legally defensible. It’s also available in the cloud!
  • What's New in Quin-C? Enhanced Automation Tools for Legal Teams Recorded: Apr 2 2019 34 mins
    Scott Lefton, Principal Technical Engineer and Oronde Ward, Dir. of Legal Services and Training
    The recent release of Quin-C features built-in automation tools that enable legal teams to work faster throughout the legal investigation workflow. Tabbed production, custom slip sheets, expanded Bates searching, Cloud accessibility and a customer billing widget are just a few of the features in this recent release.
  • AccessData Managed Cloud Services—a Q&A with Eide Bailly Recorded: Mar 28 2019 60 mins
    Marc Cressall, Vice President of Business Development and Trent Leavitt, Manager Digital Forensics & eDiscovery
    Join this 60-minute Q&A with Trent Leavitt of Eide Bailly and learn more about their recent deployment of AD Lab in the Cloud. Marc Cressall will moderate as Trent describes how the cloud has provided them with speed, collaboration, scalability, cost savings and security.
  • After the Attack—Surviving and Thriving Post-Breach Recorded: Mar 21 2019 51 mins
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • What you need to know about forensics in the cloud Recorded: Feb 27 2019 31 mins
    Marc Cressall, VP Business Development at AccessData and Keith Lockhart, Vice President of Strategic Programs at AccessData
    More and more organizations have made the decision to migrate to the cloud. Speed, security, collaboration, scalability and reliability are some of the many benefits of adopting a cloud strategy. In fact, some larger organizations and government agencies have a cloud first policy owing to the aforementioned benefits. However, given the current assumption of “when, not if” a cyber event will affect your organization, it’s necessary to have a plan in place for collecting evidential data from the cloud and analyzing it in a forensically sound manner.

    Join Marc Cressall, VP Business Development and Keith Lockhart, VP Strategic Programs in a 30-minute webinar to learn about:

    • Trends impacting forensics in the cloud
    • Benefits of the cloud
    • What AccessData offers in managed cloud solutions

    Next up—in March, Eide Bailly joins us to talk about how they are using the AccessData Cloud Solution to increase the efficiency of working a case and increase their overall profits. You won’t want to miss it!
  • After the incident: investigating and responding to a data breach Recorded: Jan 23 2019 56 mins
    EDRM and AccessData
    Back by popular demand, we're providing you another chance to view this popular webinar from Fall of 2018. Enjoy the replay!

    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Decoding the DNC Hack: A Technical Analysis of Cyber-Espionage Recorded: Nov 9 2018 60 mins
    Kurt Aubuchon, Computer Forensics Consultant & Educator; Scott Lefton, Sales Engineer, AccessData
    A series of emails sent in March 2016 to senior political officials would set into motion one of the most notorious cyber security attacks in history, intent on influencing the upcoming US presidential elections. Fancy Bear, a household name among cybersecurity professionals for its long history of cyber-espionage and disinformation campaigns, was behind the attack—a hack unlike anything ever seen before. But how did Fancy Bear manage to infiltrate the computer systems of a major political party? During this webinar, guest presenter Kurt Aubuchon will provide an in-depth, technical analysis of events leading up to and during the attack, and the lessons that can be learned by information security practitioners. Attendees will earn 1 CPE credit.
  • Data Encryption and Forensics in the Cloud Recorded: Oct 26 2018 32 mins
    Garry McCracken, Vice President, Technology Partnerships, WinMagic; Tod Ewasko, Director of Product Management, AccessData
    Encryption has long been used to help secure corporate data at the endpoint, to protect company information from unauthorized access by would-be bad actors. As more and more corporations are moving data and solutions to the cloud as a way of reducing costs, there are often questions about how encryption and digital forensics might work in a virtual environment. During this webinar, we’ll discuss the role of encryption in forensics, and how it can be adopted in cloud-based solutions, as well to ensure data security as your data moves. no matter where your data resides.
  • Internal Investigations in Today’s Connected World Recorded: Oct 23 2018 60 mins
    Len Robinson, Ahold Delhaize; Paul Becker, Rockwell Automation: and Keith Lockhart, AccessData
    Whether for employee theft, harassment, data security or other events, corporations are conducting internal investigations on almost a daily basis to investigate claims and identify potential issues. These investigations can prove challenging when crucial evidence in a case is often located across disparate devices and platforms, and numerous stakeholder across the organization need to be involved. Investigative teams need to be prepared in advance for when the need to investigate should arise, to ensure it is handled quickly, efficiently and cost effectively without disruption to business operations.

    During this webinar we will discuss recommended best practices for ensuring a successful internal investigation, covering everything from who should be involved to how you prepare when the investigation moves to potential litigation.
  • The Dark Web and Your Data Recorded: Oct 12 2018 31 mins
    Rob Comella, Sr. Forensics Instructor, AccessData
    If your organization has had a data breach or hacking incident, there’s a good chance your stolen data could end up on the dark web. Anything from social security numbers to passports and medical records can be purchased on the dark web for the right price. How much do you know about this secretive version of the internet? Organizations need to understand the dark web and the illicit activity that it supports, in order to help track cyber criminals and prevent threats on your data. Join us for a discussion covering everything you need to know about the dark web, and how digital forensics tools can be used to shed light on dark web activity.
  • BYOD: Do benefits of personal devices at work outweigh drawbacks? Recorded: Sep 28 2018 63 mins
    AccessData and Corporate Counsel Business Journal
    This webinar will identify BYOD trends, concerns and its impact on eDiscovery.
AccessData
Whether it’s for investigation, litigation or compliance, AccessData® offers industry-leading solutions that put the power of forensics in your hands. For over 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations
and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity. For more information, visit www.accessdata.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: After the Attack—Surviving and Thriving Post-Breach
  • Live at: Mar 21 2019 4:00 pm
  • Presented by: Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly
  • From:
Your email has been sent.
or close