Welcome!

News Feed Item

CEIC 2014 Spotlights Groundbreaking Security Research

Guidance Software, (NASDAQ:GUID), the World Leader in Digital Investigations™, announced that CEIC 2014 will spotlight security research by Verizon Enterprise Solutions and the SANS Institute providing unique insights into cyber threats to endpoints and their impact on organizations. CEIC brings together security, e-discovery and forensic investigation professionals for in-depth discussions on security with industry experts representing leading government agencies and corporations from around the world. The event will be held May 19 to 22, at Caesars Palace in Las Vegas.

  • The Verizon 2014 Data Breach Investigations Report (DBIR) revealed that although cybercriminals can bypass an organization’s security within days, it often takes months before hackers are detected. However, for the first time in the report’s history, internal discoveries outnumbered external fraud detection. In addition to employees, unrelated third-parties, like CSIRTs and threat researchers, are emerging as an invaluable resource on breaches. Guidance Software contributed to this year’s DBIR and invited Verizon to present highlights of the report.
  • In the first-ever SANS Endpoint Security Survey sponsored by Guidance Software, SANS surveyed 948 IT Security professionals in the United States to determine how they monitor, assess, protect and investigate their endpoints. The survey results demonstrated that more and more attacks are bypassing perimeter security, despite the fact that the respondents do not consider the attacks to be sophisticated. Nearly half of respondents are operating under the assumption they’ve been compromised; with another 5 percent saying they operate under the assumption that if they have not already been compromised, they eventually will be.

“As organizations increasingly operate under the assumption of risk, their posture is no longer ‘will I be breached,’ but ‘I have been breached, now what?’ Throughout CEIC, sessions will highlight the changing security landscape as well as emerging threats,” said Alex Andrianopoulos, vice president of marketing for Guidance Software. “Attendees will have an opportunity to learn from experts the most pressing issues surrounding data breaches and cyber threats, giving them greater insights into the threats they are facing, how to remediate them quickly and prevent them from re-occurring.”

Key sessions at CEIC include:

2014 Verizon DBIR Lessons Learned
Who: Suzanne Widup, senior analyst, Risk and Intelligence, Verizon Enterprise Solutions
When: Monday, 4:30-6:30 p.m.
Where: Pompeian I-II

Based on forensic evidence collected from more than 50 data contributors, including Guidance Software, as well as Verizon’s caseload, the 2014 Verizon Data Breach Investigations Report (DBIR) offers a rare and comprehensive view into the world of cybercrime. This presentation will discuss the evolution of results over the ten years of data and delve into the people, methods and motives that drive attackers today.

Visibility at the Endpoint: The SANS 2014 Survey Endpoint Intelligence
Who: Jake Williams, SANS instructor
When: Wednesday, 9:30-9:50 a.m.
Where: Expo Hall Theatre

A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute and sponsored by Guidance Software. More than 940 security professionals in a variety of industries were surveyed on their information security challenges and their degree of network endpoint visibility. This session will focus on highlights from the SANS survey.

To register to attend CEIC or to view the 2014 agenda, please visit: www.encase.com/ceic.

Follow the CEIC discussion on Twitter at: www.twitter.com/CEIC_Conf or by following @CEIC_Conf.

About Guidance Software, Inc.

Guidance Software is recognized worldwide as the industry leader in endpoint investigation solutions for security incident response and forensic analysis. Its EnCase® Enterprise platform, deployed on an estimated 20 million endpoints, is used by more than 65 percent of the Fortune 100 and more than 40 percent of the Fortune 500, and numerous government agencies, to conduct digital investigations of servers, laptops, desktops and mobile devices. Built on the EnCase Enterprise platform are market-leading cyber security and electronic discovery solutions, EnCase® Cybersecurity, EnCase® Analytics, and EnCase® eDiscovery. They empower organizations to conduct speedy and thorough security incident response, reveal previously hidden advanced persistent threats or malicious insider activity, perform sensitive data discovery for compliance purposes, and respond to litigation discovery requests. For more information about Guidance Software, visit www.encase.com.

EnCase®, EnScript®, FastBloc®, EnCE®, EnCEP®, Guidance Software™ and Tableau™ are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks and copyrights referenced in this press release are the property of their respective owners.

GUID-F

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Given the popularity of the containers, further investment in the telco/cable industry is needed to transition existing VM-based solutions to containerized cloud native deployments. The networking architecture of the solution isolates the network traffic into different network planes (e.g., management, control, and media). This naturally makes support for multiple interfaces in container orchestration engines an indispensable requirement.
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, will introduce two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a...
Any startup has to have a clear go –to-market strategy from the beginning. Similarly, any data science project has to have a go to production strategy from its first days, so it could go beyond proof-of-concept. Machine learning and artificial intelligence in production would result in hundreds of training pipelines and machine learning models that are continuously revised by teams of data scientists and seamlessly connected with web applications for tenants and users.
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...