A New Era in Incident Response and Data AuditingThe Case for Cyberforensics
Speaker Sam MaccherolaVice President and General Manager, Public Sector for Guidance Software Inc.Contact Info:  sam.maccherola@GuidanceSoftware.com , (703) 657-7230
Bio20+ years of government management and program development experience within the information technology and systems integration industry,  At Guidance Software, manages strategic direction, as well as operational, sales, and business development for a growing global Government practice.Prior to Guidance Software:Vice President of Federal at ProSight Inc., responsible for overall strategic direction, as well as operations, sales and marketing components for the federal business unit. President of Tenix America and VP of Public Sector Sales for Tripwire, Inc.  Senior positions with Tumbleweed, Entrust Technologies, Inc., PLATINUM Technologies, and Legent Corp.Recognized as one of the 100 people in Government and Industry that made a positive difference in Government IT by a panel of Government and Industry leaders. Active participant in many associations that promote public-private sector information sharing and partnerships:  AFCEA, ACT/IAC and ITAA
Guidance Software, Inc.The World Leader in Digital InvestigationsEnterprise Ready, Market Proven SolutionsOver 150 customers of EnCase® eDiscoveryOver 650 customers of EnCase® Enterprise including:More than 100 of the Fortune 500 and over half of the Fortune 50Deployed on over 10 million desktops, laptops and serversThe Leading Court-Validated TechnologyUsed in thousands of cases worldwideAuthenticated in over 50 published court cases and EnCase technology             validated under Daubert/FryeCourts have taken “judicial notice” of the validity of EnCase softwareTop-ranked Software by Industry Analysts Gartner’s highest rating for eDiscovery SoftwareSocha-Gelbmann’s Top 5 (highest category) for eDiscovery softwareForrester calls it “The de-facto industry standard for remote desktop collection” Committed to Support your On-going SuccessWorld-Class Training and Certification Program Top-Ranked Professional Services Organization
Government Agencies of AllSizes Rely on EnCase® Solutions
Evolving ThreatsPerimeter defense is never enoughWith new technologies come new exploitsThreats can also be internal and/or inadvertentA determined hacker will find a way (high end)Hacking has become “Productized” (low end)
Key TrendsPer a recent Cisco Annual Security Report, statistics found included:
the overall number of disclosed vulnerabilities grew by 11.5%.
Vulnerabilities in virtualization technology nearly tripled - from 35 to 103 year-over-year
attacks are becoming increasingly blended, cross-vector and targeted.
Cisco says its researchers saw 90% growth in threats originating from legitimate domains,
This year, numerous legitimate websites were infected with IFrames, malicious code injected by botnets that redirects visitors to malware-downloading sites, the company says.2008 Intelligence Community Statistics55% Increase in Remote Access Cyber Intrusions
52% Increase in Insider Cyber Intrusions
22% Increase in Credit Card FraudVerizon Data Breach ReportAnalysis of over 500 e-forensics audits:73%  resulted from external sources
18%  by insiders
39%  implicated business partnersBlackhats:  Threat ActorsNation States
108 countries with dedicated cyber-attack organizations
Dragon Bytes: Chinese Information War Theory & Practice
Terrorists
Growing sophistication
Hamas and Al Qaeda
Ibrahim Samudra and Irhabi 007
Organized Crime
Cybercrime is big business aka RBN
FBI:  #1 criminal priority is cybercrimeTrends in Attacks Against .GOVSQL Injection and Cross-site Scripting
Island Hopping-Unisys/DHS
Remote User Compromise-VPN Attacks-Client Side Attacks
PKI Compromise--Private Key Theft
Zero-Day Attacks
Automated Attack Tools
Digital Insider AttacksData is the Lifeblood of GovernmentVulnerabilities & AssessmentsClassifiedInformationPII & Medical RecordsGovernment DataSensitive Projects & SchematicsEpicenter of RiskTroop MovementsBudgetary/ ProcurementDefense Contracts
Let the Blood Loss Begin…25 July 2010U.S. National Security Advisor on Wikileaks Report on AfghanistanSays disclosure of classified information threatens U.S. national security
On a Normal Day, an AgencyGets Hit by upwards of 2.4M AttacksHow effective is your security? 99.9%?99%  	12,000 - 24,000 attacks99.9%	1200 - 2400 attacks through each day99.99%	120 - 240 attacks         Multiple technologies must be layered to get near 99.9% effective         It is impossible to achieve impenetrabilityEven if you pulled the plug, they can take the hard drive…
Traditional Security is for Traditional Threats“Traditional security solutions are obsolete…the signature approach and other traditional methods of security are not keeping pace with the number of threats being created by online criminals.”“The days of traditional URL filtering are dead, we care about where users go and they all use the top 500 websites. We care about enforcing capable policy security and the content on pages is dynamic.”“It often takes up to 24- to 72-hours from the time a threat is identified, analyzed, and its signature is developed to the time it is finally delivered to the endpoint. While consumers and enterprises are playing the waiting game; their endpoints are exposed and vulnerable.”“The degree of difficulty for identifying malware targeting data is outpacing the innovation of traditional security vendors.”
The CISO Knows this more than anyone“…there needs to be a continuing and stronger emphasis on protection and management of data, distinct from focusing too heavily on threats and attacks.”— Recommendations from the 			2010 State of Cybersecurity from the			Federal CISO’s Perspective — An (ISC)2 Report“Perimeter defenses are no longer effective, if they ever were. It’s harder to fight a war from the inside than maintaining the perimeter. It requires additional resources.”— John Wang, Security Architect,NASA
Over $40B Spent on FISMA since 2002 … not enoughMore checklists and standardsConsensus Audit Guideline; CVE/OVAL; DISA GOLD/STIG; NSA/NIST NIAP (CCEVS EAL); DIACAP; FIPS; FISMA;           ISO 17799; IEC 27002; GLBA; SOX; HIPAA; FDCC; SCAP;     NERC’s CIP 009-2; and so on…Compliance is not an insurance policy against the unknown threat.Heartland Payment SystemsBreach cost at $12.5M+
History Repeats ItselfHannibal using the Roman Roads to cross the Alps40% Increase in Major Intrusions (US-CERT)
The Challenge – The Starting LineYou Are Here
The Challenge – 1st HourYou Are Here

More Related Content

PPTX
Cybersecurity Operations: Examining the State of the SOC
PDF
Data Safety And Security
PDF
Guide to high volume data sources for SIEM
PDF
Hunting for cyber threats targeting weapon systems
PDF
Impacts cloud remote_workforce
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
SANS 2013 Report: Digital Forensics and Incident Response Survey
Cybersecurity Operations: Examining the State of the SOC
Data Safety And Security
Guide to high volume data sources for SIEM
Hunting for cyber threats targeting weapon systems
Impacts cloud remote_workforce
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
SANS 2013 Report: Digital Forensics and Incident Response Survey

What's hot (20)

PDF
Insider threats
PDF
Cyber Threat Intelligence Integration Center -- ONDI
PDF
Shift Toward Dynamic Cyber Resilience
PDF
Cyber resilience itsm academy_april2015
PPSX
Computer hacking and security - Social Responsibility of IT Professional by M...
PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PDF
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
PDF
Trustwave 2012 Global Güvenlik Raporu
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security
PPTX
Cyber Threat Intelligence
PDF
Dell Technologies Cyber Security playbook
PDF
Policy Guide for Legislators
PDF
Getting ahead of compromise
PPTX
How to assess and manage cyber risk
PPTX
ISACA ISSA Presentation
PDF
IBM X-Force Threat Intelligence Quarterly Q4 2015
PDF
Cyber Security and the National Central Banks
Insider threats
Cyber Threat Intelligence Integration Center -- ONDI
Shift Toward Dynamic Cyber Resilience
Cyber resilience itsm academy_april2015
Computer hacking and security - Social Responsibility of IT Professional by M...
Cyber Threat Intelligence - It's not just about the feeds
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
Trustwave 2012 Global Güvenlik Raporu
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Strategic Leadership for Managing Evolving Cybersecurity Risks
Carbon Black: 32 Security Experts on Changing Endpoint Security
Cyber Threat Intelligence
Dell Technologies Cyber Security playbook
Policy Guide for Legislators
Getting ahead of compromise
How to assess and manage cyber risk
ISACA ISSA Presentation
IBM X-Force Threat Intelligence Quarterly Q4 2015
Cyber Security and the National Central Banks
Ad

Viewers also liked (20)

PDF
Resume example #6
PPTX
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
DOC
Pograma jornadas confluencia.v.f
PDF
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
PDF
Oracle Database Backup Service
PDF
Panda Security - Adaptive Defense 360
PDF
Co je nového v XenDesktop 7.6 a XenApp 7.6
PPTX
Security automation
PPSX
Contrail Demo
PDF
#RDVecom : Felix Averlant, Digital Performance Strategist, altima° North Amer...
PDF
Panda Security - Endpoint Protection
PPTX
Exploración herramientas multimedia
PPTX
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
PPSX
Virtualizace datových center
PDF
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
PPTX
SucessfulInsiderThreat
PPSX
XenDesktop and XenApp - 2015 summary & bit of future
PDF
G2 server - Cloud není vhodný pro každého
PDF
Oracle Database Backup Cloud Service
PDF
Oracle Database Appliance Workshop
Resume example #6
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
Pograma jornadas confluencia.v.f
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Oracle Database Backup Service
Panda Security - Adaptive Defense 360
Co je nového v XenDesktop 7.6 a XenApp 7.6
Security automation
Contrail Demo
#RDVecom : Felix Averlant, Digital Performance Strategist, altima° North Amer...
Panda Security - Endpoint Protection
Exploración herramientas multimedia
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Virtualizace datových center
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
SucessfulInsiderThreat
XenDesktop and XenApp - 2015 summary & bit of future
G2 server - Cloud není vhodný pro každého
Oracle Database Backup Cloud Service
Oracle Database Appliance Workshop
Ad

Similar to Cybersecurity - Sam Maccherola (20)

PPTX
Cybersecurity - Jim Butterworth
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
MT 117 Key Innovations in Cybersecurity
PPTX
Računalna forenzika i automatizirani odgovor na mrežne incidente
PPTX
Your cyber security webinar
PPTX
The Evolution of Cybercrime
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
Cyber Security and Healthcare
PPTX
Incident Response in the wake of Dear CEO
PDF
PPTX
encase enterprise
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
Cyber forensic readiness cybercon2012 adv j fick
PPTX
SAM05_Barber PW (7-9-15)
Cybersecurity - Jim Butterworth
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Breach Reality, The IR Imperative, And What You Can Do About It
MT 117 Key Innovations in Cybersecurity
Računalna forenzika i automatizirani odgovor na mrežne incidente
Your cyber security webinar
The Evolution of Cybercrime
Cybersecurity Frameworks and You: The Perfect Match
Cyber Security and Healthcare
Incident Response in the wake of Dear CEO
encase enterprise
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
CRI "Lessons From The Front Lines" March 26th Dublin
Cyber forensic readiness cybercon2012 adv j fick
SAM05_Barber PW (7-9-15)

More from TechBiz Forense Digital (20)

PDF
Casos de sucesso
PDF
Cases forense[2]
PDF
Cnasi sp apresentação marcelo souza
PDF
10 atributos que o seu firewall precisa ter
PDF
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
PDF
Insa cyber intelligence_2011-1
PDF
Apresentação SegInfo
PDF
Online fraud report_0611[1]
PDF
Ata srp 015 2010 v1 - marinha - netwitness
PPT
Road Show - Arcsight ETRM
PPT
VeriSign iDefense Security Intelligence Services
PPT
PPT
Verisign iDefense Security Intelligence Services
PPT
VeriSign iDefense Security Intelligence Services
PPT
DOC
01 11- alexandre atheniense
DOC
16 03 - institucional
PDF
Artigo velasquez (combate a crimes digitais)
PDF
C:\Fakepath-6 09 10 Financial Fraud Webinar
Casos de sucesso
Cases forense[2]
Cnasi sp apresentação marcelo souza
10 atributos que o seu firewall precisa ter
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
Insa cyber intelligence_2011-1
Apresentação SegInfo
Online fraud report_0611[1]
Ata srp 015 2010 v1 - marinha - netwitness
Road Show - Arcsight ETRM
VeriSign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
01 11- alexandre atheniense
16 03 - institucional
Artigo velasquez (combate a crimes digitais)
C:\Fakepath-6 09 10 Financial Fraud Webinar

Recently uploaded (20)

PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Training Program for knowledge in solar cell and solar industry
PPT
Geologic Time for studying geology for geologist
PPTX
TEXTILE technology diploma scope and career opportunities
DOCX
search engine optimization ppt fir known well about this
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
The influence of sentiment analysis in enhancing early warning system model f...
A proposed approach for plagiarism detection in Myanmar Unicode text
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Excel 365/2024 Beginner's training
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Consumable AI The What, Why & How for Small Teams.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Comparative analysis of machine learning models for fake news detection in so...
A contest of sentiment analysis: k-nearest neighbor versus neural network
sbt 2.0: go big (Scala Days 2025 edition)
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Training Program for knowledge in solar cell and solar industry
Geologic Time for studying geology for geologist
TEXTILE technology diploma scope and career opportunities
search engine optimization ppt fir known well about this
Convolutional neural network based encoder-decoder for efficient real-time ob...
UiPath Agentic Automation session 1: RPA to Agents
Enhancing plagiarism detection using data pre-processing and machine learning...

Cybersecurity - Sam Maccherola

  • 1. A New Era in Incident Response and Data AuditingThe Case for Cyberforensics
  • 2. Speaker Sam MaccherolaVice President and General Manager, Public Sector for Guidance Software Inc.Contact Info: [email protected] , (703) 657-7230
  • 3. Bio20+ years of government management and program development experience within the information technology and systems integration industry, At Guidance Software, manages strategic direction, as well as operational, sales, and business development for a growing global Government practice.Prior to Guidance Software:Vice President of Federal at ProSight Inc., responsible for overall strategic direction, as well as operations, sales and marketing components for the federal business unit. President of Tenix America and VP of Public Sector Sales for Tripwire, Inc.  Senior positions with Tumbleweed, Entrust Technologies, Inc., PLATINUM Technologies, and Legent Corp.Recognized as one of the 100 people in Government and Industry that made a positive difference in Government IT by a panel of Government and Industry leaders. Active participant in many associations that promote public-private sector information sharing and partnerships: AFCEA, ACT/IAC and ITAA
  • 4. Guidance Software, Inc.The World Leader in Digital InvestigationsEnterprise Ready, Market Proven SolutionsOver 150 customers of EnCase® eDiscoveryOver 650 customers of EnCase® Enterprise including:More than 100 of the Fortune 500 and over half of the Fortune 50Deployed on over 10 million desktops, laptops and serversThe Leading Court-Validated TechnologyUsed in thousands of cases worldwideAuthenticated in over 50 published court cases and EnCase technology validated under Daubert/FryeCourts have taken “judicial notice” of the validity of EnCase softwareTop-ranked Software by Industry Analysts Gartner’s highest rating for eDiscovery SoftwareSocha-Gelbmann’s Top 5 (highest category) for eDiscovery softwareForrester calls it “The de-facto industry standard for remote desktop collection” Committed to Support your On-going SuccessWorld-Class Training and Certification Program Top-Ranked Professional Services Organization
  • 5. Government Agencies of AllSizes Rely on EnCase® Solutions
  • 6. Evolving ThreatsPerimeter defense is never enoughWith new technologies come new exploitsThreats can also be internal and/or inadvertentA determined hacker will find a way (high end)Hacking has become “Productized” (low end)
  • 7. Key TrendsPer a recent Cisco Annual Security Report, statistics found included:
  • 8. the overall number of disclosed vulnerabilities grew by 11.5%.
  • 9. Vulnerabilities in virtualization technology nearly tripled - from 35 to 103 year-over-year
  • 10. attacks are becoming increasingly blended, cross-vector and targeted.
  • 11. Cisco says its researchers saw 90% growth in threats originating from legitimate domains,
  • 12. This year, numerous legitimate websites were infected with IFrames, malicious code injected by botnets that redirects visitors to malware-downloading sites, the company says.2008 Intelligence Community Statistics55% Increase in Remote Access Cyber Intrusions
  • 13. 52% Increase in Insider Cyber Intrusions
  • 14. 22% Increase in Credit Card FraudVerizon Data Breach ReportAnalysis of over 500 e-forensics audits:73% resulted from external sources
  • 15. 18% by insiders
  • 16. 39% implicated business partnersBlackhats: Threat ActorsNation States
  • 17. 108 countries with dedicated cyber-attack organizations
  • 18. Dragon Bytes: Chinese Information War Theory & Practice
  • 21. Hamas and Al Qaeda
  • 22. Ibrahim Samudra and Irhabi 007
  • 24. Cybercrime is big business aka RBN
  • 25. FBI: #1 criminal priority is cybercrimeTrends in Attacks Against .GOVSQL Injection and Cross-site Scripting
  • 27. Remote User Compromise-VPN Attacks-Client Side Attacks
  • 31. Digital Insider AttacksData is the Lifeblood of GovernmentVulnerabilities & AssessmentsClassifiedInformationPII & Medical RecordsGovernment DataSensitive Projects & SchematicsEpicenter of RiskTroop MovementsBudgetary/ ProcurementDefense Contracts
  • 32. Let the Blood Loss Begin…25 July 2010U.S. National Security Advisor on Wikileaks Report on AfghanistanSays disclosure of classified information threatens U.S. national security
  • 33. On a Normal Day, an AgencyGets Hit by upwards of 2.4M AttacksHow effective is your security? 99.9%?99% 12,000 - 24,000 attacks99.9% 1200 - 2400 attacks through each day99.99% 120 - 240 attacks Multiple technologies must be layered to get near 99.9% effective It is impossible to achieve impenetrabilityEven if you pulled the plug, they can take the hard drive…
  • 34. Traditional Security is for Traditional Threats“Traditional security solutions are obsolete…the signature approach and other traditional methods of security are not keeping pace with the number of threats being created by online criminals.”“The days of traditional URL filtering are dead, we care about where users go and they all use the top 500 websites. We care about enforcing capable policy security and the content on pages is dynamic.”“It often takes up to 24- to 72-hours from the time a threat is identified, analyzed, and its signature is developed to the time it is finally delivered to the endpoint. While consumers and enterprises are playing the waiting game; their endpoints are exposed and vulnerable.”“The degree of difficulty for identifying malware targeting data is outpacing the innovation of traditional security vendors.”
  • 35. The CISO Knows this more than anyone“…there needs to be a continuing and stronger emphasis on protection and management of data, distinct from focusing too heavily on threats and attacks.”— Recommendations from the 2010 State of Cybersecurity from the Federal CISO’s Perspective — An (ISC)2 Report“Perimeter defenses are no longer effective, if they ever were. It’s harder to fight a war from the inside than maintaining the perimeter. It requires additional resources.”— John Wang, Security Architect,NASA
  • 36. Over $40B Spent on FISMA since 2002 … not enoughMore checklists and standardsConsensus Audit Guideline; CVE/OVAL; DISA GOLD/STIG; NSA/NIST NIAP (CCEVS EAL); DIACAP; FIPS; FISMA; ISO 17799; IEC 27002; GLBA; SOX; HIPAA; FDCC; SCAP; NERC’s CIP 009-2; and so on…Compliance is not an insurance policy against the unknown threat.Heartland Payment SystemsBreach cost at $12.5M+
  • 37. History Repeats ItselfHannibal using the Roman Roads to cross the Alps40% Increase in Major Intrusions (US-CERT)
  • 38. The Challenge – The Starting LineYou Are Here
  • 39. The Challenge – 1st HourYou Are Here
  • 40. The Challenge – 2nd HourYou Are Here
  • 41. The Challenge – 3rd HourYou Are Here
  • 42. The Challenge – OwnedYou Are Here
  • 43. Hosting Companies = Watering Holes
  • 44. Current Challenges in Cyber DefenseRegardless of what you do…Attacks will continue 24/7/365Enemy at the Gates will continue to recon/infiltrate/exfiltrateAnonymity will challenge attributionMalware will be custom designed and used against youThey live in 0-day environmentPolymorphic Code is on the riseYou need to be right 100% of the timeHow do you learn to defend if you never learn what happened or who you’re dealing with?
  • 45. Cyber Forensics is the Spear Tipof any Cybersecurity InitiativeIdentify covert/undiscovered threats: dynamically adaptive patented technology gives InfoSec the advantage against new threats:Polymorphic MalwarePacked filesOther advanced hacking techniquesAttribute new attacks to older attacks, invaluable in attributing malware to an attackerComplete visibility into endpoint risk with the ability to target static and live data to locate sensitive informationFind and remediate malware: risk mitigation by wiping sensitive information, malware and malware artifacts from hard drives, RAM and the Windows RegistryPowerful investigative capabilities allow organizations to audit for PII (e.g., credit card numbers, account numbers, etc.), and perform internal investigations such as those dealing with fraud or HR matters
  • 46. 2010 Cybersecurity Survey (Continued)Endpoint was used in all of the top 3 insider theft mechanisms
  • 48. 42% Copied information to mobile device
  • 49. 38% Downloaded information to home computer)38%42%44%
  • 50. 2010 Cybersecurity Survey (Continued)Incident response and internal forensics can make a difference28% of events resulted in legal or law enforcement action35% could not pursue legal action due to lack of evidence29% could not identify the individuals responsible
  • 51. The Endpoint Needs Comprehensive Visibility Endpoint VisibilityCyberPreparednessMultiple OS and File Systems;See through Data at rest solutions;Packed and compressed; DataUniverse is ever expandingSpeed,Mobility,Adaptability Data ProtectionTargeted search &remediation; DLP;Encryption, etcInfinite digital reach;Speed of cyber, notUPS/FedEx; Adaptivemalware identification& recovery
  • 52. The Missing Layer in Defense in Depth …Incident Response at the Forensic Level with Endpoint VisibilityEnCase Cybersecurity provides…Enterprise-wide incident responseCyberforensic triage and in-depth analysis, attack attribution analysis, and remediationSystem deviation assessmentsExpose system integrity issues caused by unknown threatsData policy enforcementIdentify and wipe PII/Classified data from unauthorized endpoints
  • 53. Information Security ChallengesProactively identifying and addressing covert/unknown threatsDetermining the capabilities and purpose of unknown files or running processesIdentifying and recovering from known malware and/or polymorphic malwareSignature-based detection tools are insufficient when faced with code that morphs to evade detectionQuickly triaging and containing an identified threatLocating and rapidly responding to data leakage (PII, IP, etc.)Compliance with data protection and breach notification lawsDetermining the “State of the Network” by comparing known profiles to data on systems
  • 54. The PastOne Computer at a timeDays, weeks, and monthsto get the dataCostly & Time ConsumingThe gathered intelligencewas valuable, but useless
  • 55. The PastEnCase Field Intelligence Module (FIM)One computer over the network. (2004)
  • 56. The PastSearching only onetarget at a time.??
  • 57. EnCase Cybersecurity provides…Network-enabled incident responseCyberforensic triage and analysis, attack attribution analysis, and remediationSystem deviation assessmentsExpose system integrity issues caused by anomalous or unknown threatsData policy enforcementIdentify and wipe PII/IP/Classified data from unauthorized endpoints A Cyber Forensics Approach
  • 59. The PresentAutomation of searchingmultiple targets in parallel.Pre-defined Critera
  • 60. The PresentAutomation of searching forcompromises and malware.
  • 61. Benefits & Features of Cyber Forensics
  • 62. Questions/ThoughtsToday, how do you…Identify unknown or covert threats?Limit the risk exposure presented by sensitive information?Respond to a suspected threat? Limit the scope of a data breach?Ensure endpoints remain in a trusted state?Address and scale technologyand processes to include file servers, email servers,semi-structured data repositories?