Webinar

Navigating a Breach & Activating
a Proven Incident Response Plan

Presenters:
Ed Amoroso, Former CSO AT&T & CEO, TAG Cyber
Ed McAndrew, Former U.S. District Attorney & Partner, Ballard Spahr LLP
Gary Weiss, SVP & GM - Security, Analytics & Discovery, OpenText

Watch Now
Enfuse 2018 | May 21- 24
Learn More

Types

Topics

Products

Languages

Webinar

How to Conduct Efficient Examinations with EnCase ...

EnCase Forensic (8.06) features an all-new EnCase indexing engine as well as multiple other key enhancements focused on improving processing speeds. With enhanced processing speeds, creating an index of an evidence file has never been easier. Whether...
Video
Webinar

Pinpoint and Remediate Unknown Threats_ SANS Revie...

SANS Instructor Jake Williams (@malwarejake) reviews EnCase Endpoint Security 6, its features, and how it performed under simulated attacks and investigations.
Video
Webinar

Navigating a Breach & Activating a Proven Incident...

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You ca...
Video
Webinar

Fighting Child Exploitation with Digital Forensics

Digital forensic cases involving children as potential victims are a reality that is always present in today’s society. Whether it is law enforcement investigating or corporate investigators discovering these matters, examiners must be prepared and r...
Video
Demo

EnCase Endpoint Investigator: Enhanced Agent

In this demo, our Solutions Consultant, James Kritselis, walks through how the EnCase Enhanced Agent can empower you to find the evidence you need across your network during an internal investigation.
Video
Webinar

Data Breaches & 5 Key Elements of an Effective Inc...

With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expect and plan for their organization to be breached. ...
Video