Justice Information Sharing

Webinar – Part II: Now That You’ve Got it and Can Read It, What Can You Do With It?

Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – Part I: The Investigative Stage—Recognition, Collection, Search

Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Join AEquitas and the Denver, Colorado District Attorney’s Office for a two-part webinar series on effectively collecting and using digital evidence. “Part I: The Investigative Stage—Recognition, Collection, Search” will take place on September 18, 2020 at 1:00 p.m. ET and will focus on properly obtaining digital evidence.

Webinar – “Police Report Writing in Tribal Domestic and Sexual Assault Cases”

Join TA2TA on September 21, 2020 for their free law enforcement training on “Police Report Writing in Tribal Domestic and Sexual Violence Cases.” Dr. James D. Diamond, Dean of Academic Affairs at the National Tribal Trial College, will provide practical tips on documenting witness and suspect statements, overcoming hearsay, and diagramming the crime scene to increase successful prosecution and conviction rates. This one-hour course is sponsored by the U.S.

Join TA2TA for their “Police Report Writing in Tribal Domestic and Sexual Assault Cases” webinar on September 21, 2020 at 12:00–1:00 p.m. ET. Attendees will learn “practical tips on documenting witness and suspect statements, overcoming hearsay, and diagramming the crime scene to increase successful prosecution and conviction rates.”  

This webinar is intended for individuals serving American Indian/Alaska Native survivors of sexual violence.

Join the International Association of Crime Analysts (IACA) for their free 2020 virtual conference. To replace their in-person conference, IACA is hosting a series of virtual workshops focused on crime analysis in August–October 2020. Many of the past sessions are also recorded and available for viewing. Certificates are available to those who attend the event live.

Register for the conference today!

IACP 2020 Virtual Training Event and Expo

Given the global impact of COVID-19, the IACP has decided to move IACP 2020 from an in-person meeting to an online training event and expo in the fall of 2020!

While the details are still being finalized, here are just a few of the things you will be able to do at the IACP 2020 Virtual Training Event and Expo:

Join the International Association of Chiefs of Police for their 2020 Virtual Training Event and Expo on October 21–23, 2020. The IACP is still finalizing the details of the conference, but it will include over 175 educational workshops, access to workshops and presentations for 12 months, a virtual exhibit hall with vendors and sponsors, and a platform to interact and network online with fellow participants and presenters. Pricing for the conference varies based on membership, and group pricing is available until October 23.

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Building an Effective Insider Risk Management Program Part 1

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization. 

Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

Pages