Magazine Button
Guidance to prioritise forensic security at (ISC)2 SecureDubai

Guidance to prioritise forensic security at (ISC)2 SecureDubai

Middle EastMore News
Fortunato Guarino, Solution Consultant EMEA and Cybercrime & Data Protection Advisor, Guidance Software

Guidance Software, makers of EnCase, the gold standard in forensic security, and EnForce, an automated risk management platform, has announced their participation at (ISC)2 SecureDubai 2016 to be held November 22 at the Burjuman Arjaan by Rotana, Dubai. Under the event theme of Securing the Virtual Organisation, Guidance will lead a discussion on how organisations can manage the surface area of digital risk in a virtual world with forensic security.

“Using aviation as an analogy, if airlines promised a 99% safety rate, we are looking at approximately 300,000 crashes a year! You wouldn’t tolerate the 1% failure rate with airlines, so why should you when it comes to the security of your organisations’ most critical assets?” said Fortunato Guarino, Solution Consultant EMEA and Cybercrime & Data Protection Advisor at Guidance Software, who will be leading Guidance’s presentation at the event. “Building on the aviation analogy, Network Protection tools are like airport security, they are getting more advanced, but they aren’t perfect and threats still get through. And when they do, they aren’t easy to uncover. In fact, according to a Verizon Data Breach Investigation Report, 66% of breaches take months or even years to discover, highlighting acute visibility gaps in security defences.”

Given the multi-dimensional world most organisations operate in, where data is stored in multiple geographic locations, and increasingly spread across varied cloud-based data stores and file-sharing systems, deploying forensic security solutions that give IT teams 360-degree visibility of all critical assets is paramount. Using three use cases, Guidance will highlight how their EnForce Risk Manager can help organisations proactively identify, categorise, and remediate private or sensitive data across the enterprise. The solution offers the deepest level of insight and control of electronic data across all endpoints, file shares, servers, and cloud repositories. This enables organisations to improve business intelligence, ensure compliance, and mitigate many types of risks.

“It is no longer a case of if a data breach will occur but rather a question of when. As such, it is imperative for organisations to go beyond just perimeter security solutions and deploy endpoint detection and response tools that identify forensic residue across every stage of the attack cycle and then triage and remediate the threats that will penetrate the network,” concluded Fortunato.

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive