About AccessData    |     Support    |     Follow Us on Facebook     |     Follow Us on Twitter

Take a Coffee Break with AccessData®!

Attend any of the webinars and be entered to win a $5* coffee card!**

Must include your industry relevant, professional email to be eligible to win.  Sorry Mom!

Coffee Breaks are a series of 30-minute "how-to" webinars designed to provide a brief tutorial of some of the most common, or most requested, questions from customers. They’re fast, effective and best of all, they’re on the house! Click below to register for the webinars.

Topic Date Time
How to keep up-to-date with the newest versions
Find out the easiest and most efficient ways to upgrade to the newest versions of FTK
®. Learn how files are kept and how copy case can help you move cases to the next version.

Speaker: Jim Martin, Sr. Instructor

How to use forensic tools to investigate a breach, Part I
When investigating a breach, there are six steps that an organization should follow to effectively address an incident. This series will focus on how AccessData's tools align to the six-step framework.

Part I of this series will look at the first three steps of the incident response plan—preparation, identification and containment. Learn which tools will help you best deal with an incident at each step in the process.

Speaker: Robert Comella, Sr. Instructor

How to use forensic tools to investigate a breach, Part II
Part II will focus on the last three steps of the incident response plan—eradication, recovery and lessons learned.

Robert Comella, Sr. Instructor
How to investigate someone using remote acquisition
Sometimes your biggest threats are inside your organization. This webinar will show you how to perform investigations covertly to avoid alerting employees to the investigation and prevent disruption of business operations. Feel confident in monitoring content, scanning your network for violations, investigating IP theft and tracking employee misconduct.

Speaker: Chris Sanft, Coordinator


How to investigate Internet artifacts
Almost every investigation involved the analysis of Internet artifacts. Web browsing caches store records of sites a suspect has visited, web-based emails may help to prove intent or correlate other events and instant message conversations or social media sites can contain evidence. When evidence is processed, artifact files are categorized and organized so that you can easily see them. Learn how to locate this hard-to-find key evidence.

Speaker: Robert Buhecker, Sr. Instructor


How to protect your organization with Cerberus
Data breaches are increasing and when your organization is hit with malware and viruses, you risk downtime or even reputation damage while you work to fix the breach. Even if you have an incident response plan, adding the right software can help you identify compromises later.

Learn how Cerberus, an option to FTK, can help you determine both the behavior and intent of security breaches, sooner and how to strengthen your security defenses and prevent malicious software from running.

Speaker: Nick Drehel, VP Forensic Training

      Download the slides

How to raise the bar on your investigations with our latest forensic release
With increasing global regulatory changes, it’s never been more important to have control over your data—and your customers’ PII. You need options. More ways to control your investigation environment, your workflow, and your access to data to mitigate risk and get exactly the results you want for your organization. Our recent forensic release provides more flexibility than ever before, with improved collections and processing, expanded third-party integrations, and new tools to manage risk.

Speaker: Tod Ewasko, Director Product Management

How to use advanced searching techniques
Are you searching effectively, using all of the tools at your fingertips? If not, join this webinar to find out the best way to make use of advanced searching. Whether you use live or index search options, you'll learn something new in this webinar.

Speaker: Jim Martin, Sr. Instructor


How to identify, assess and eliminate risk with AD RTK™
The stakes have never been higher. You face relentless threats to your data. To protect your organization—and yourself—from risk, you need total visibility of your data across all endpoints. AD RTK™ is a new risk management solution that allows non-technical teams to quickly identify and remediate suspect data before launching a full-scale forensic investigation.

Speaker: Mike Olig, Product Manager
*Coffee card will be awarded in your home country's currency.
**No purchase necessary. The coffee break webinar offer is limited to the addressee specifically selected for this promotion, and is void where prohibited by law or your employer’s policies. To be eligible for the coffee card giveaway, you must attend at least 20 minutes of the webinar and provide a business email address. Winners will be chosen at random. The contest runs from September 26, 2017 through December 31, 2017. You will not be eligible to win a gift card if you download and view the on-demand webinar. Winners will be notified via their business email address. The gift card will be delivered electronically to the winner’s business email address.