Lucas Zaichkowsky, Enterprise Defense Architect at AccessData, is a guest speaker at the conference and his presentation will focus on ‘incident response tools and strategies to get companies responding faster and minimizing risks following a cyberattack or breach’. “Every organization needs advanced and integrated security and forensic solutions to successfully investigate cybercrimes, internal policy violations and security incidents. Each case presents unique challenges as the data can often be hidden in plain sight. It is important for organizations to understand how to sift through the digital incident trail, reconstruct a timeline of events and identify the ‘who, what, when and how’ of a breach,” says Zaichkowsky.
His presentation will cover important topics like preserving digital evidence to recognized international standards, reviewing the latest forensic capture and analysis tools, critical features for network forensics investigation perspectives, integrating forensic techniques into incident response and creating and maintaining procedures and guidelines for performing incident response tasks.
Paul Wright, manager of professional services and investigation team, Middle East, India and Africa at AccessData says, “Organizations in the Middle East should be prepared to combat cyberattacks. It is no longer, 'if', but rather 'when' the enterprise will be attacked. According to HP’s Cyber Risk Report 2013, in today's world of rising e-crimes and growing demands for secure software, it is imperative to eliminate opportunities for stealing important information that is valuable for attackers. This applies to the Middle East as it is no different to any other region when it comes to the acceptance of emerging technologies and the vulnerabilities that they bring.”
“Organizations face growing pressure to protect terabytes of data on an increasingly porous network, manage information safely, close those electronic voids and implement cybercrime prevention measures. Therefore they need to be working with third-party vendors such as AccessData for specialized threat intelligence and incident response solutions. GISEC provides us a great opportunity to educate regional enterprises about the latest security threats and demonstrate how our innovative and market leading technologies like the ResolutionOne platform can help secure their information and assets.”
ResolutionOne is a Continuous, Automated Incident Resolution (CAIR™) platform, delivering the workflows and capabilities necessary to detect, analyze, and resolve any data event—from security breaches to e-discovery and other Governance, Risk and Compliance (GRC) issues. It is the industry’s first integrated, and automated platform to work seamlessly across third party security solutions and the sharing of incident data across company organizations. The ResolutionOne Platform integrates network, endpoint and malware analysis, end-to-end e-discovery and remediation technologies into a single, scalable solution. This makes it possible for all security, legal and compliance teams to do their jobs using one platform, automating tasks and collaborating in real time to address virtually any security incident or legal matter.
AccessData can be found at GISEC in the Sheikh Maktoum Hall, stand number GP – 2.
AccessData Group makes the world’s most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies and law firms around the world rely on AccessData software to protect them against the risks present in today’s environment of continuous compromise. For more information log onto http://accessdata.com
Resolution One Solution - http://accessdata.com/
AccessData's ResolutionOne Platform for Faster Response to CyberAttacks (http://www.youtube.com/
AccessData CISO Panel at RSA 2014 : Living in a World of Continuous Compromise (http://marketing.accessdata.com/
Overcoming Piecemeal PCI Compliance: Integrating Technologies and Processes
Ponemon Study: Threat Intelligence and Incident Response
Weaponizing Incident Response
Cerberus: Malware Triage and Analysis Technology
Tel: +971 563 975937