SlideShare a Scribd company logo
Security – The Growth
Engine for eDiscovery.
PANELISTS
Nate Latessa
Heureka Chief Operating Officer
nate.latessa@heurekasoftware.com
Ron Copfer
CEO
ronald.copfer@heurekasoftware.com
Donald Wochna
Co-Chair, E-Data Law Group
dwochna@E-DataLawGroup.com
HEUREKA OVERVIEW
Heureka
Meaning: “I’ve found it!”
Heureka was formed to allow
clients to search and respond
quickly to discovery, security,
compliance and free-form
investigation needs.
WHY?
There is a need for quick information regarding:
• Breaches
• Data Classification
• Lawsuits
• Failed Audits
• HR Issues
• BSA Licensing
• Process Changes
• Data in the Cloud
• IP Loss
• Unpatched Endpoints
• Proof of Compliance
HOW?
• Endpoint Intelligence
• Viewed via the search and
correlation platform
• Numerous workflows
– eDiscovery
– Data Classification
– Incident and Indicator Response
– Audit and Compliance
– Free Form Investigation
WOCHNA LAW BACKGROUND
Attorney, Client and Technology:
• We embed technology in our legal
solutions.
• Created an E-data law group
• New site opening January 1, 2015
• dwochna@e-datalawgroup.com
• 330.815.2891
OVERVIEW
• Trends in eDiscovery and Security
• Why security is ready for eDiscovery
professionals to lead
• How to leverage eDiscovery processes to impact
security
• Why your experience and expertise is
desperately needed
• How to cross the boundary, impact your
company, and build your career
PANELIST OPENING COMMENTS
How and why did you get from
eDiscovery to Security?
eDISCOVERY AND SECURITY
• eDiscovery
– Episodic
– Non-budgeted
– Fractured data repositories
– Immature standards
• Security
– Continuous
– Budgets Increasing
– Holistic to the Enterprise
– Mature standards
eDISCOVERY AND SECURITY
• Similarities
– Data explosion
– Needle in the haystack identification
– Forensic analysis
– Malware explosion
– Need quicker response time
– Need for enterprise-wide data analytics
– Both assume huge risks to the business
– Challenges in communicating needs to mgmt.
WHAT ISSUES/COMMENTS/NEEDS HAVE
YOU HEARD OR SEEN THE MOST FROM
CLIENTS IN THE LAST 12 MONTHS?
TRENDS
• Many articles written in last two years
• Executives Taking Ownership of
Cybersecurity
• Players: IT, Legal, CFO, Insurance, Vendors,
Experts
• Legal is moving to become CISO
WHAT ARE THE STANDARDS DRIVING
THE
INDUSTRIES AND WHAT DO THEY HAVE
IN COMMON?
ISO ALIGNMENT
• ISO 9000—requirements and best practices
for the quality management systems
• ISO 27001, 27002 — The process and
controls for an Information Security
Management System (ISMS) .
• ISO/IEC 27050 — Information technology —
Security techniques — Electronic discovery
(DRAFT). This ISO standard is within the
family of standards that focus on information
security management.
ISO 27050
• The fundamental purpose of the digital forensics
standards ISO/IEC 27037, 27041, 27042 and
27043 and 27050 is to promote good practice
methods and processes for forensic capture and
investigation of digital evidence
• This four-part standard concerns the discovery
phase, specifically the discovery of Electronically
Stored Information (ESI), a legal term-of-art for
data.
IMPACT OF ISO
• Rise of Certification to ISO standard
– Law firms
– Vendors
– Experts
• ISO standard requires “measurement of
accuracy”
• How accurate are the results of the
ediscovery process used
WHAT IS THE CHANGE FROM PROCESS
TO ANALYTICS IN THE EDISCOVERY
FIELD AND WHY IS IT IMPORTANT?
ACCURACY OF RESULTS
• Accuracy of Results measures the
output—not the process
• Accuracy of Results relates to the Data—
not the process
• Accuracy of Results requires moving
beyond Process and analyze the Data
being identified, preserved, and produced
ACCEPTANCE TESTING
• Establish whether or not it can be stated,
at a given level of confidence, that recall is
at or above a specified level.
• EG: a passing acceptance test would
allow us to state with a 95% confidence
interval that our retrieval efforts have
achieved 80% recall or better.
STANDARDS REQUIRE
SAMPLING
• Sampling is the “bridge” between e-
discovery and cybersecurity.
• Sampling applicable to eDiscovery tests
the Data—not the process
• Tools used in eDiscovery are applicable in
cybersecurity to test the Data
SAMPLING AND DATA
ANALYTICS
• Data analytics is the key to the future of
eDiscovery and cybersecurity
• Data analytics is the result of the application of
defensible sampling techniques to a universe of
data in order to extract reliable intelligence about
the data that informs business decisions.
• Data analytics is being applied to eDiscovery
and to cybersecurity, data breach areas
EDRM
R3 MODEL
USING THE STRENGTHS OF AN
EDISCOVERY BACKGROUND, HOW
CAN ATTENDEES LEVERAGE THEIR
LEGAL CONTACTS AND EDISCOVERY
PROCESSES?
WHAT WOULD YOU RECOMMEND
EDISCOVERY/LEGAL
PROFESSIONALS LEARN TO
INCREASE THEIR REACH AND
INFLUENCE?
PANELIST CLOSING COMMENTS
Additional Questions?
THANK YOU!
HEUREKA – I’VE FOUND IT!
www.heurekasoftware.com

More Related Content

PDF
CISSP Preview - For the next generation of Security Leaders
PPTX
Big data in term of security measure
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
PPTX
Data Connectors San Antonio Cybersecurity Conference 2018
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Security Risks: The Threat is Real
PPTX
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
CISSP Preview - For the next generation of Security Leaders
Big data in term of security measure
Ofer Maor - Security Automation in the SDLC - Real World Cases
Data Connectors San Antonio Cybersecurity Conference 2018
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Security Risks: The Threat is Real
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
Making Cloud Security Part of Your DNA Webinar Slides

What's hot (20)

PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
PDF
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
PPSX
William Diederich - Security Certifications: Are They Worth the Investment? A...
PDF
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
PPTX
Alert Logic - Corporate Overview
PDF
To MSSP or not to MSSP IISF 2015
PPTX
If We Only Had the Time: How Security Teams Can Focus On What’s Important
PPTX
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
PDF
2015-11-17 Time for an IT Assessment
PDF
Technology Assesment
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PDF
Addressing the Cyber-Security Landscape
PDF
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
PPTX
Hipaa Reality Check
PDF
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
PPT
IT Security Strategy
PPT
Acqueau lumin ultra
PPTX
NTXISSACSC2 - The Evolving DMZ by John Fehan
PPTX
Managed it business leader ppt
PPTX
The Case For Secure Data Science
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
William Diederich - Security Certifications: Are They Worth the Investment? A...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Alert Logic - Corporate Overview
To MSSP or not to MSSP IISF 2015
If We Only Had the Time: How Security Teams Can Focus On What’s Important
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
2015-11-17 Time for an IT Assessment
Technology Assesment
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Addressing the Cyber-Security Landscape
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
Hipaa Reality Check
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
IT Security Strategy
Acqueau lumin ultra
NTXISSACSC2 - The Evolving DMZ by John Fehan
Managed it business leader ppt
The Case For Secure Data Science
Ad

Similar to Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals (20)

PDF
The Sherpa Approach: Meeting the Demands of the Digital Age
PPTX
BDO-ACEDS 10-29-14 Webcast
PDF
IDOL eDiscovery
PDF
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
PDF
ZyLAB White Paper - Bringing e-Discovery In-house
PDF
Aceds 2015 wie nycpa final oct panel slides
PDF
Weekly eDiscovery Top Story Digest - November 20, 2013
PPT
Unit 4 standards.ppt
PDF
Demystifying analytics in e discovery white paper 06-30-14
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PPTX
Empowering the business for eDiscovery in Office 365 - BRK2112
PPT
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
PDF
standards1.pdf
PDF
Conference on Digital Forensics & Cyber Security 2016
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PDF
Focused agile audit planning using analytics
PPT
E-Disccovery Best Practices 20090710 Ver02
PPTX
Gov civilworkshop
PDF
ACEDS Dallas - Back to School Lessons on the EDRM
The Sherpa Approach: Meeting the Demands of the Digital Age
BDO-ACEDS 10-29-14 Webcast
IDOL eDiscovery
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
ZyLAB White Paper - Bringing e-Discovery In-house
Aceds 2015 wie nycpa final oct panel slides
Weekly eDiscovery Top Story Digest - November 20, 2013
Unit 4 standards.ppt
Demystifying analytics in e discovery white paper 06-30-14
Technical track chris calvert-1 30 pm-issa conference-calvert
Empowering the business for eDiscovery in Office 365 - BRK2112
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
standards1.pdf
Conference on Digital Forensics & Cyber Security 2016
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
Focused agile audit planning using analytics
E-Disccovery Best Practices 20090710 Ver02
Gov civilworkshop
ACEDS Dallas - Back to School Lessons on the EDRM
Ad

Recently uploaded (20)

PDF
Notes to accompany the TMT and FRAND Overview Slides
PPTX
Income under income Tax Act..pptx Introduction
PDF
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PPTX
Digital Security in Cyber Law and Mitigating Cyberxrimes
PDF
Constitution of India and fundamental rights pdf
PDF
New York State Bar Association Journal, September 2014
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PDF
Notes on Plausibility - A Review of the English and EPO Cases
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
PPT
wipo: IP _smes_kul_06_www_6899913 (1).ppt
PPT
Over view on IPR and its components :ppt
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PPT
Criminal law and civil law under of collage corriculum
PPTX
Ethiopian Civil procedure short note.pptx
PPTX
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
Notes to accompany the TMT and FRAND Overview Slides
Income under income Tax Act..pptx Introduction
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Digital Security in Cyber Law and Mitigating Cyberxrimes
Constitution of India and fundamental rights pdf
New York State Bar Association Journal, September 2014
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Notes on Plausibility - A Review of the English and EPO Cases
Louisiana Bar Foundation 2023-2024 Annual Report
wipo: IP _smes_kul_06_www_6899913 (1).ppt
Over view on IPR and its components :ppt
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
Criminal law and civil law under of collage corriculum
Ethiopian Civil procedure short note.pptx
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
Vinayaka Mission Law School Courses and Infrastructure.pdf

Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals

  • 1. Security – The Growth Engine for eDiscovery.
  • 2. PANELISTS Nate Latessa Heureka Chief Operating Officer nate.latessa@heurekasoftware.com Ron Copfer CEO ronald.copfer@heurekasoftware.com Donald Wochna Co-Chair, E-Data Law Group dwochna@E-DataLawGroup.com
  • 3. HEUREKA OVERVIEW Heureka Meaning: “I’ve found it!” Heureka was formed to allow clients to search and respond quickly to discovery, security, compliance and free-form investigation needs.
  • 4. WHY? There is a need for quick information regarding: • Breaches • Data Classification • Lawsuits • Failed Audits • HR Issues • BSA Licensing • Process Changes • Data in the Cloud • IP Loss • Unpatched Endpoints • Proof of Compliance
  • 5. HOW? • Endpoint Intelligence • Viewed via the search and correlation platform • Numerous workflows – eDiscovery – Data Classification – Incident and Indicator Response – Audit and Compliance – Free Form Investigation
  • 6. WOCHNA LAW BACKGROUND Attorney, Client and Technology: • We embed technology in our legal solutions. • Created an E-data law group • New site opening January 1, 2015 • dwochna@e-datalawgroup.com • 330.815.2891
  • 7. OVERVIEW • Trends in eDiscovery and Security • Why security is ready for eDiscovery professionals to lead • How to leverage eDiscovery processes to impact security • Why your experience and expertise is desperately needed • How to cross the boundary, impact your company, and build your career
  • 8. PANELIST OPENING COMMENTS How and why did you get from eDiscovery to Security?
  • 9. eDISCOVERY AND SECURITY • eDiscovery – Episodic – Non-budgeted – Fractured data repositories – Immature standards • Security – Continuous – Budgets Increasing – Holistic to the Enterprise – Mature standards
  • 10. eDISCOVERY AND SECURITY • Similarities – Data explosion – Needle in the haystack identification – Forensic analysis – Malware explosion – Need quicker response time – Need for enterprise-wide data analytics – Both assume huge risks to the business – Challenges in communicating needs to mgmt.
  • 11. WHAT ISSUES/COMMENTS/NEEDS HAVE YOU HEARD OR SEEN THE MOST FROM CLIENTS IN THE LAST 12 MONTHS?
  • 12. TRENDS • Many articles written in last two years • Executives Taking Ownership of Cybersecurity • Players: IT, Legal, CFO, Insurance, Vendors, Experts • Legal is moving to become CISO
  • 13. WHAT ARE THE STANDARDS DRIVING THE INDUSTRIES AND WHAT DO THEY HAVE IN COMMON?
  • 14. ISO ALIGNMENT • ISO 9000—requirements and best practices for the quality management systems • ISO 27001, 27002 — The process and controls for an Information Security Management System (ISMS) . • ISO/IEC 27050 — Information technology — Security techniques — Electronic discovery (DRAFT). This ISO standard is within the family of standards that focus on information security management.
  • 15. ISO 27050 • The fundamental purpose of the digital forensics standards ISO/IEC 27037, 27041, 27042 and 27043 and 27050 is to promote good practice methods and processes for forensic capture and investigation of digital evidence • This four-part standard concerns the discovery phase, specifically the discovery of Electronically Stored Information (ESI), a legal term-of-art for data.
  • 16. IMPACT OF ISO • Rise of Certification to ISO standard – Law firms – Vendors – Experts • ISO standard requires “measurement of accuracy” • How accurate are the results of the ediscovery process used
  • 17. WHAT IS THE CHANGE FROM PROCESS TO ANALYTICS IN THE EDISCOVERY FIELD AND WHY IS IT IMPORTANT?
  • 18. ACCURACY OF RESULTS • Accuracy of Results measures the output—not the process • Accuracy of Results relates to the Data— not the process • Accuracy of Results requires moving beyond Process and analyze the Data being identified, preserved, and produced
  • 19. ACCEPTANCE TESTING • Establish whether or not it can be stated, at a given level of confidence, that recall is at or above a specified level. • EG: a passing acceptance test would allow us to state with a 95% confidence interval that our retrieval efforts have achieved 80% recall or better.
  • 20. STANDARDS REQUIRE SAMPLING • Sampling is the “bridge” between e- discovery and cybersecurity. • Sampling applicable to eDiscovery tests the Data—not the process • Tools used in eDiscovery are applicable in cybersecurity to test the Data
  • 21. SAMPLING AND DATA ANALYTICS • Data analytics is the key to the future of eDiscovery and cybersecurity • Data analytics is the result of the application of defensible sampling techniques to a universe of data in order to extract reliable intelligence about the data that informs business decisions. • Data analytics is being applied to eDiscovery and to cybersecurity, data breach areas
  • 22. EDRM
  • 24. USING THE STRENGTHS OF AN EDISCOVERY BACKGROUND, HOW CAN ATTENDEES LEVERAGE THEIR LEGAL CONTACTS AND EDISCOVERY PROCESSES?
  • 25. WHAT WOULD YOU RECOMMEND EDISCOVERY/LEGAL PROFESSIONALS LEARN TO INCREASE THEIR REACH AND INFLUENCE?
  • 28. HEUREKA – I’VE FOUND IT! www.heurekasoftware.com

Editor's Notes

  • #5: Pain Story – why Something bad happened. People are yelling You're in trouble and you need answers from across the enterprise...ASAP!
  • #12: Ron to take lead via remote collections, Don second with cost-effective, standardized solution gets out of spoiliation. Pre-collection analytics from Nate.
  • #15: Don to Lead – Maturing industry moving to standardized protocols. ISO is under the security umbrella. Validation. eDiscovery is a process under security and info technology.
  • #26: Need to add links