Evolution18: Cybersecurity Investigations: From Hollywood to the White House to Your Company

Cybersecurity Investigations: From the White House to Your Company

Cybersecurity investigations, from Hollywood fiction to your company’s reality, were one of the key topics at Code42’s annual Evolution18 customer conference April 9 – 11 in San Francisco.

While the Hollywood version of cybersecurity investigations includes a geek sitting in a dark room in front of a computer screen having an “aha!” moment, real-life cybersecurity investigations are incredibly complex. Guest keynote speaker Theresa Payton should know. In addition to being a national data security expert and former White House CIO, Payton is a star of the CBS series “Hunted,” a reality TV show about cyber investigators who hunt down people living off the grid.

“If solving our cybersecurity and privacy issues were as simple as following security best practices, we would all be safe,” Payton said in her keynote presentation on April 11, striking a serious note between regaling the audience with stories from her time in the White House and her experience on reality television. “In spite of talented security teams and hours of security training, breaches still happen. That’s why I want you to consider a new path to security, that of ‘designing for the human.’ This is the path that recognizes that humans can and do make mistakes, and plan for a way to respond when that inevitably happens.”

To that end, Evolution18 also marked the release of Code42 Forensic File Search, our latest enterprise security product. Code42 Forensic File Search reduces the time it takes to investigate, respond to and recover from data security incidents. By collecting file metadata and events from employee endpoints and making them searchable via the cloud, Forensic File Search provides comprehensive answers to challenging data security questions. It tackles tough questions like:

  • Does known malware have, or has it ever had, a foothold in our environment?
  • Has a particular crypto-mining agent been installed on our employees’ computers? Who has it now?
  • What files did an employee download or delete in the months before resigning?

“Responding to cyberattacks takes too long, exposing organizations to greater risks and climbing costs,” said Joe Payne, president and chief executive officer of Code42. “By collecting, analyzing and indexing file events, Code42 Forensic File Search helps organizations shrink time-to-response windows. Our new product provides visibility to where data lives and moves across all endpoints in seconds.”

Other highlights of the conference included these sessions:

Whether through ignorance or malintent, employees are one of the top data security threats to any organization. Code42 Senior Director of Information Security Jadee Hanson provided a behind-the-scenes look at running an insider threat program to prevent employees from leaking, exposing and exfiltrating data. Hanson also moderated a “Futurist Discussion” panel with industry leaders to discuss what’s on the horizon for data security. Thanks to these panels, attendees learned what’s to come in the near future of cybersecurity, what will become the latest buzzwords in the field and much, much more.

Minimizing user downtime during a device migration is a critical part of any IT strategy. Best practices discussed during a packed-room panel session with Code42 customer MacDonald-Miller include self-service migration and data restoration as well as managing user expectations.

Data compliance for higher education can be complex, particularly considering that federal grant requirements now require data retention for seven years. In a game show format complete with swag prizes and packs of ramen noodles (Get it? Higher ed? Ramen?) customers learned how to tell if data is leaving the university and how to build Freedom of Information Act requests into their data management issues. Yum.

The reviews from attendees are already rolling in, and we’re blushing at the positive responses:

“Love hearing what other Code42 customers are doing!” – desktop support specialist, Entrust Datacard

“Thanks to everyone at Code42 for putting on such a terrific conference! I’ve already started reaching out to my peers–encouraging them to attend Evolution19.” – IT program manager, University of Colorado Skaggs School of Pharmacy and Pharmaceutical Sciences

“Already registered for Evolution19 and looking forward to Colorado. See you guys then!” –systems administrator, Utex Industries

“Thank you, Code42! It was a great Evolution.” – computer support analyst, Stanford University

Dozens of customers have already signed up for Evolution19. Interested in joining them? Registration for next year’s conference, April 30 – May 2 in Denver, is open now. We hope to see you there!

Facebook Twitter Google LinkedIn YouTube