SlideShare a Scribd company logo
1 of 16
Copyright © 2010 Catelas Inc.  All rights reserved. Relationship Forensics Detect & contain Information Theft without collecting a single email
Copyright © 2010 Catelas Inc.  All rights reserved. Agenda Traditional approach to Data Leakage and Investigations Introducing  a new approach Catelas demo Q&A
Copyright © 2010 Catelas Inc.  All rights reserved. Guest speaker Scott Emery ,[object Object]
With i-fact, has worked on hundreds of complex Security Investigations for Corporate clients worldwide
Created and managed the Forensics Investigations Unit at State Street – recognized as one of the best in the world
Extensive experience in complex eDiscovery cases working with senior management, corporate General Counsel and Law firms
Conducted over 1,000 digital forensic and cyber investigations over a distinguished career
Participated in all aspects of corporate compliance,[object Object]
Current tools monitor data movement, not people
Security investigations , by nature, are reactiveDetect & contain Information Theft without collecting a single email * Ponemon Institute  - 78% of US companies have suffered unreported insider breaches; 59% of departing employees steal company information.
How We Do It Traditional process The Investigations Control Center: ,[object Object]
Too much data to collect / where to start
Investigations team gets called in after the event (or suspicion)
The information is needed tomorrow!How investigations are handled: ,[object Object]
Prioritization is difficult because usually not much is known about the case
Speed of collection tends to over-shadow quality of collection

More Related Content

What's hot

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi PowerpointJbhirsh
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development Polsinelli PC
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Learning to Thrive as a Tech-Savvy Lawyer by Nehal Madhani
Learning to Thrive as a Tech-Savvy Lawyer by Nehal MadhaniLearning to Thrive as a Tech-Savvy Lawyer by Nehal Madhani
Learning to Thrive as a Tech-Savvy Lawyer by Nehal MadhaniNehal Madhani
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Compliancy Group
 

What's hot (20)

BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
The 21st Century Law Firm
The 21st Century Law FirmThe 21st Century Law Firm
The 21st Century Law Firm
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Learning to Thrive as a Tech-Savvy Lawyer by Nehal Madhani
Learning to Thrive as a Tech-Savvy Lawyer by Nehal MadhaniLearning to Thrive as a Tech-Savvy Lawyer by Nehal Madhani
Learning to Thrive as a Tech-Savvy Lawyer by Nehal Madhani
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
Review questions
Review questionsReview questions
Review questions
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 

Viewers also liked

Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarRob Levey
 
Topic of the month: Radiological pathology of Wegener granulomatosis
Topic of the month: Radiological pathology of Wegener granulomatosisTopic of the month: Radiological pathology of Wegener granulomatosis
Topic of the month: Radiological pathology of Wegener granulomatosisProfessor Yasser Metwally
 
Interesses 20 09
Interesses 20 09Interesses 20 09
Interesses 20 09soniaaf
 
For Teenagers: Wonder of the Word - Let's go treasure hunting
For Teenagers: Wonder of the Word - Let's go treasure huntingFor Teenagers: Wonder of the Word - Let's go treasure hunting
For Teenagers: Wonder of the Word - Let's go treasure huntingChris Yeo
 
Data Synergy - Scaling Information Businesses
Data Synergy  - Scaling Information  BusinessesData Synergy  - Scaling Information  Businesses
Data Synergy - Scaling Information BusinessesMark Davis
 
Mobile phone population health programmes - Dr. Robyn Whittaker
Mobile phone population health programmes - Dr. Robyn WhittakerMobile phone population health programmes - Dr. Robyn Whittaker
Mobile phone population health programmes - Dr. Robyn WhittakerTed Eytan, MD, MS, MPH
 
Revista Ásiaki
Revista ÁsiakiRevista Ásiaki
Revista Ásiakirsfjo
 
I10 Classroom Management and Student Motivation in the Chinese Language Class...
I10 Classroom Management and Student Motivation in the Chinese Language Class...I10 Classroom Management and Student Motivation in the Chinese Language Class...
I10 Classroom Management and Student Motivation in the Chinese Language Class...Center for Global Education at Asia Society
 
LEAD BELLY to Ludacris: Analog to Digital
LEAD BELLY to Ludacris: Analog to DigitalLEAD BELLY to Ludacris: Analog to Digital
LEAD BELLY to Ludacris: Analog to DigitalAlvin Singh II
 

Viewers also liked (12)

Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 
Topic of the month: Radiological pathology of Wegener granulomatosis
Topic of the month: Radiological pathology of Wegener granulomatosisTopic of the month: Radiological pathology of Wegener granulomatosis
Topic of the month: Radiological pathology of Wegener granulomatosis
 
Interesses 20 09
Interesses 20 09Interesses 20 09
Interesses 20 09
 
Personas 2009
Personas 2009Personas 2009
Personas 2009
 
эра фантазий
эра фантазийэра фантазий
эра фантазий
 
For Teenagers: Wonder of the Word - Let's go treasure hunting
For Teenagers: Wonder of the Word - Let's go treasure huntingFor Teenagers: Wonder of the Word - Let's go treasure hunting
For Teenagers: Wonder of the Word - Let's go treasure hunting
 
презентация.Pptxлёша
презентация.Pptxлёшапрезентация.Pptxлёша
презентация.Pptxлёша
 
Data Synergy - Scaling Information Businesses
Data Synergy  - Scaling Information  BusinessesData Synergy  - Scaling Information  Businesses
Data Synergy - Scaling Information Businesses
 
Mobile phone population health programmes - Dr. Robyn Whittaker
Mobile phone population health programmes - Dr. Robyn WhittakerMobile phone population health programmes - Dr. Robyn Whittaker
Mobile phone population health programmes - Dr. Robyn Whittaker
 
Revista Ásiaki
Revista ÁsiakiRevista Ásiaki
Revista Ásiaki
 
I10 Classroom Management and Student Motivation in the Chinese Language Class...
I10 Classroom Management and Student Motivation in the Chinese Language Class...I10 Classroom Management and Student Motivation in the Chinese Language Class...
I10 Classroom Management and Student Motivation in the Chinese Language Class...
 
LEAD BELLY to Ludacris: Analog to Digital
LEAD BELLY to Ludacris: Analog to DigitalLEAD BELLY to Ludacris: Analog to Digital
LEAD BELLY to Ludacris: Analog to Digital
 

Similar to Catelas Security Webinar 12 14 10

Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmEddie Cogan
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace PrivacyDan Michaluk
 
Catelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor SlideshareCatelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor SlideshareRob Levey
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRsarah kabirat
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?loglogic
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision TreeMarc St-Pierre
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawRamon Ray
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 

Similar to Catelas Security Webinar 12 14 10 (20)

Sapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory ParadigmSapient Catelas The New Regulatory Paradigm
Sapient Catelas The New Regulatory Paradigm
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace Privacy
 
Catelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor SlideshareCatelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor Slideshare
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
Shutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HRShutting the digital gate - data preservation and HR
Shutting the digital gate - data preservation and HR
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 

More from Rob Levey

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?Rob Levey
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?Rob Levey
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based SecurityRob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsRob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance ReviewsRob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales SuccessRob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & LitigationRob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal InvestigationsRob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment TrapRob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative SellingRob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case AnalyticsRob Levey
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryRob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your peopleRob Levey
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools SuckRob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & InvestigationsRob Levey
 

More from Rob Levey (20)

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 

Catelas Security Webinar 12 14 10

  • 1. Copyright © 2010 Catelas Inc. All rights reserved. Relationship Forensics Detect & contain Information Theft without collecting a single email
  • 2. Copyright © 2010 Catelas Inc. All rights reserved. Agenda Traditional approach to Data Leakage and Investigations Introducing a new approach Catelas demo Q&A
  • 3.
  • 4. With i-fact, has worked on hundreds of complex Security Investigations for Corporate clients worldwide
  • 5. Created and managed the Forensics Investigations Unit at State Street – recognized as one of the best in the world
  • 6. Extensive experience in complex eDiscovery cases working with senior management, corporate General Counsel and Law firms
  • 7. Conducted over 1,000 digital forensic and cyber investigations over a distinguished career
  • 8.
  • 9. Current tools monitor data movement, not people
  • 10. Security investigations , by nature, are reactiveDetect & contain Information Theft without collecting a single email * Ponemon Institute - 78% of US companies have suffered unreported insider breaches; 59% of departing employees steal company information.
  • 11.
  • 12. Too much data to collect / where to start
  • 13. Investigations team gets called in after the event (or suspicion)
  • 14.
  • 15. Prioritization is difficult because usually not much is known about the case
  • 16. Speed of collection tends to over-shadow quality of collection
  • 17. Process is iterative – re-collection is inevitable Re-active & iterative Labor &cost intensive
  • 18. Insider Theft Trade Secrets – departing employee UBS Accuses Three Quant Traders Of Stealing Its Source Code “UBS has filed a lawsuit against three quant former employees alleging that they stole proprietary trading software with the intent of using it at their new employer, Jefferies & Company.“ The three were also accused of starting their new jobs at Jefferies & Co while still employed at UBS. Uncover IP theft in minutes - without collecting email Early detection = containment!
  • 19. Litigation Investigations Early Case Analytics Internal Investigations Example: M&A press leak. Who inside the company leaked information to the press [shaded grey]? Some individuals are authorized to speak to the press. Some are not! F Keavey who works in R&D should not be communicating with John Edmiston Quickly establish who to investigate and tag suspicious emails.
  • 20. Kick-backs - FCPA Kick-backs - FCPA SEC fines GE $23M for FCPA violations General Electric Company, whose compliance program is among the most respected and admired in the world, has settled civil violations of the Foreign Corrupt Practices Act with the SEC. The company agreed to pay $23.4 million to resolve claims of kick-backs to Iraqi government officials for lucrative supply contracts by four GE subsidiaries paid under the United Nation's oil-for-food program. Quickly assess the severity of the investigation. Co-operate with authorities. Negotiate early. Early resolution = reduced fine and less PR exposure
  • 21.
  • 22. Automated anomalous Behavior reporting: identify high-risk relationships and define policy before incidents occur
  • 23. Detailed Forensics Investigations:identify key suspects before collection process and review beginsConduct investigations 5 times faster; detect & contain Info Theft without collecting a single email Copyright © 2010 Catelas Inc. All rights reserved.
  • 24.
  • 25. Proven link analysis methodology used by law enforcement
  • 26. Allows surveillance of entire email network with same manpower as sampling
  • 27. Pro-active, non-disruptive, highly efficient work flow – at significantly lower costCopyright © 2010 Catelas Inc. All rights reserved.
  • 28.
  • 29. Social Network Analysis identifies missing custodians & uncovers ‘friends in common’
  • 30. Log file analysis allows ENTIRE company network to be uncovered
  • 31. Advanced Data Analytics uncover IP theft & information flow
  • 32. Highly scalable & comprehensive
  • 33. Easy to use, deploy & maintain
  • 34. No integration with email server
  • 35. Low cost of ownershipIM Email Telephony Log files Copyright © 2010 Catelas Inc. All rights reserved.
  • 36.
  • 37. Identify and tag relevant custodians and/or specific emails (or documents)
  • 38. Reduce collection and investigation time and costs by up to 80%Copyright © 2010 Catelas Inc. All rights reserved.
  • 39.
  • 40. Identify people, behavior, communications – collect only precisely what is needed
  • 41. More effective investigations – save money; use your time more effectivelyCopyright © 2010 Catelas Inc. All rights reserved.
  • 42.
  • 43. Uncover security and compliance breaches without collecting a single email
  • 45. Conduct investigations 5 times faster !
  • 46. Intelligent Collection and Early Case Assessment for Legal cases
  • 47. Identification - preserve & collect the right people first time
  • 48. Reduce collection time and costs by 75%
  • 49. Holistic solution – Info Sec, Legal and Compliance
  • 50. Quick time to value through shared cost of ownershipCopyright © 2010 Catelas Inc. All rights reserved.
  • 51. Live Demo Copyright © 2010 Catelas Inc. All rights reserved.
  • 52. Copyright © 2010 Catelas Inc. All rights reserved. Thank You Eddie Cogan 617-407-2967 eddie.cogan@catelas.com www.catelas.com Scott Emery 978-844-3463 semery@i-factanalysis.com www.i-factanalysis.com

Editor's Notes

  1. KEY POINTSQuickly highlight the relationships that matter, saving time, enabling a risk assessment to be made earlier in the cycleBy knowing who and what to investigate EARLY, our clients save an enormous amount of time and money downstream in the EDRM process.EXAMPLE – JP Morgan - always on log file analysis – 250,000 employees – identify custodians, dramatically reduced the number of pst’s and hence emails that need to be collected, preserved and analyzed.Early Case Analysis and Assessment. How can you make a real assessment when you may not have all the right people, custodians, wrong data etc.The other methods just “tell you that their technology filter data sets down by 95% based on keywords etc” , but it is still looking at the data. One way the Catelas technology is being used for eDiscovery Cases is to analyzes log files from Exchange and other systems even before collecting any emails. The value comes from being able to make sure you have all the right suspects, custodians etc. upfront the first time. This allows functions such as Legal, Compliance, Risk and Information Security to understand both who knows who, how well and a chance to uncover non-obvious relationships, BEFORE a single email is ever collected and get a better handle of what data really needs to be collected. Normal methods of looking at content really may be (too big to look at all the emails, so some just look a snapshot –that still depends on your keywords or how good your search is)…that all changes with Catelas, because you can analyze log files (20GB may = 10-15 MM emails) and Catelas is the only ones doing that today. Avoid over collection and spoliation; preserve the right content by uncovering non-obvious relationships and activity
  2. UBS loses trade secrets theft caseFeb 22 2010The US Financial Industry Regulatory Authority (FINRA) has ruled against UBS in its allegations that three of its former employees stole an algorithmic trading code used by the bank.The arbitration case found in favor of the three employees – Jatin Suryawanshi, Partha Sarkar, and Sanjay Girdhar. According to the UBS complaint, they were accused of misappropriating trade secrets, breach of contract, breach of fiduciary duty, unfair competition and “other wrongdoing” while they were employed by UBS Securities.They were accused of obtaining proprietary company information – in this case the source code for UBS’s algorithmic trading programmes. They were then planning to give the source code to their new employees at investment bank Jefferies & Co, according to the report which appeared in Securities Industry News.Reports said that Sarkar had allegedly copied 25,000 lines of computer source code from UBS computers. This was roughly equal to the length of one algorithm, or parts of several. He then allegedly emailed this code to this personal email account. Suryawanshi was also accused of attempting to hide his colleague’s theft by deleting the records from a UBS computer.The three were also accused of starting their new jobs at Jefferies & Co while still employed at UBS. Suryawanshi was accused of a breach of fiduciary duties by poaching the other two programmers to work for other investment bank. The three former UBS employees had denied the charges.
  3. The Catelas Platform is based our UNIGUE combination of Sciences: Behavioural Analysis, Social Network Analysis, and Data Analytics.  We analyze communications data including e-mail, IM and telephony. For the Webmail and external IM we would take a feed from the Firewall.Our advanced network & relationship analysis algorithms allow networks to be analyzed quickly.  Within hours, Catelas identifies both the internal and external people who should be investigated, before all the email content is analyzed and reviewed.  For example Catelas was deployed in 2 days into one of largest financial services companies, with 40 exchange servers/12 million emails per week, with no disruption to existing systems such as Microsoft Exchange. For example, the strength of a relationship is not solely influenced by the raw number of communications but rather the patterns within the interactions between two people. i.e. During a shared experience – such as working on a project together – the strength of Relationship between 2 people will become stronger faster. This is represented by a burst of interactions. We analyse these burst and other patterns to determine the strength of a relationship.
  4. For Security ONLY