FacultyFaculty/Author Profile
Greg Osinoff

Greg Osinoff

Navigant Consulting (PI) LLC
Managing Director, Disputes & Investigations
New York, NY, USA


Mr. Osinoff is a Managing Director in the Disputes & Investigations practice. Mr. Osinoff works within the Technology Solutions group, providing guidance to clients in the handling of information as evidence within the context of investigations, litigation and regulatory reviews.

Mr. Osinoff possesses extensive leadership, consulting and project management experience focusing on cyber security incident response, litigation support, information governance, compliance and risk related big data analytics (GRC), technology assisted document review solutions. Mr. Osinoff has over 19 years of experience collaborating with law firms and corporate legal departments to plan and implement information management strategies in order to reduce the risks related to the use, processing, storage, and transmission of a company's data.

Prior to joining Navigant, Mr. Osinoff was a Senior Vice President of GRC and Legal Risk Analytics at Opera Solutions assisting companies in developing strategies for detecting fraud and potentially problematic employee behavior, and advanced analytics-driven investigatory solutions designed to accelerate fact-finding in the context of a compliance assessment, internal investigation or early case assessment. Previously, he founded Digital Mandate which provided discovery lifecycle management solutions. Mr. Osinoff successfully sold Digital Mandate to RenewData where he worked as Senior Vice President of Document Review and Information Analysis.

Mr. Osinoff has collaborated with hundreds of organizations, law firms and corporate legal departments to plan and implement project-specific incident response and document management strategies. He provides guidance to clients in the handling of information as evidence within the context of investigations, litigation and/or regulatory reviews. He is often called upon to bridge the gap between technology and operational requirements in order to achieve an efficient, cost-effective outcome.

Mr. Osinoff is regarded as an innovative pioneer in the investigatory and litigation support industry. These innovations include:
  • Created an industry first disputes and investigation analytics business combining highly specialized forensic linguists, mathematicians, librarians and attorneys to provide Language-Based Analytics consulting and solutions;
  • Developed Vestigate, a patented analytics platform designed to help users better understand relevant facts of an investigation when faced with massive unstructured data populations;
  • Brought to market Anagram, an innovative and highly effective way of developing defensible and reliable taxonomies;
  • Introducing the litigation support industry's first dedicated "on demand" incident response and litigation support project management model; and
  • Creating a proprietary vendor analysis process to determine true vendor capabilities.
Education and Certifications

Fordham University School of Law, JD
State University of New York at Albany, BS, Political Science

Professional History

Opera Solutions, Sr. VP, GRC and Legal Risk Analytics
RenewData, Sr. VP, Document Review and Information Analysis
Digital Mandate, CEO and Founder

Expertise

Computer Forensics
Data Breach Incident Response
Electronic Discovery
Structured and Unstructured Analytics
Text Mining
Risk Analytics
Risk Management
GRC

Representative “Cyber” Engagement Experience

Incident Response

Handled multiple data breach/data loss investigations on behalf of a major hotel chain. In this capacity helped develop the incident response plan and coordinated multiple vendors, contractors, forensic investigators, malware and threat analysis providers, and auditors to identify and diagnose sophisticated attacks involving hackers who stole information from hundreds of thousands of payment cards, resulting in millions of dollars in fraud loss.

Theft of proprietary data

Provided leadership of forensic team responsible for examining former employee computers for stolen proprietary information. Applied various computer forensic analytics strategies, such as link analysis, metadata, event logs, recovered unallocated e-mail and document fragments, and unstructured text mining and analysis. This analysis established evidentiary proof that the suspects had intentional accessed restricted information and reconstructed their actions. Coordinated expert testimony with outside counsel in order to secure court-ordered access to suspects’ home and new work computers. Further forensic analysis of these computers, confirmed the unauthorized use of the client company’s proprietary information.

Security Program Development

On behalf of a Fortune 100 company, helped develop and implement a vendor security program focused on both the physical and digital security of companies providing services to client where digital information was shared. Coordinated multiple security providers to audit and assess the risk associated with information sharing. Services included: ISO/ IEC 27001:2005 based Policy, Risk Assessments & Threat Analysis, Architecture Design, Penetration Testing, Compliance Audits, Log Management, 24/7 SOC monitoring and SIEM integration, Incident Response, Forensics and Info Security Awareness Training Policy and Procedures, Impact Analysis, Least Privilege, Application Whitelisting, Contingency Plan, Planning Policy and Procedures.

Investigations

Client was unsure whether highly sensitive identity information was stored on a stolen external hard drive. The loss of this information would require governmental notification. Coordinated a team of investigators and forensic experts in order to determine how the hard drive was stolen, the contents of the information stored, and how that information was being used by the criminals. Forensic analysis – including analyzing the computers’ registry, link files, and system and event logs – was performed to attempt to determine what had been copied from those computers to the stolen drive. Iterative investigation and forensic strategies led to a detailed reconstruction of the events, and analysis of the company's exposure and recommendations for further actions.
Share
Email

  • FOLLOW PLI:
  • twitter
  • LinkedIn
  • GooglePlus
  • RSS

All Contents Copyright © 1996-2017 Practising Law Institute. Continuing Legal Education since 1933.

© 2017 PLI PRACTISING LAW INSTITUTE. All rights reserved. The PLI logo is a service mark of PLI.