Justice Information Sharing

Mindfulness in Domestic Violence Work: Working with Victims (Part I)

Although utilizing trauma-informed principles is a beneficial tool when successfully serving clients who are victims of domestic violence and sexual violence, going a step further by being mindful will get you that much further with this population. This webinar will examine why being self-aware of our own judgments, beliefs and attitudes is so important in our work with victims. More importantly, it is this awareness that could have a profound impact on our work within this field – it could be the difference between life or death for the victims we serve.

Self-Care for Justice Professionals

This webinar will begin by discussing the impact that trauma work has on the brain and body and present interventions that a person can do to mitigate these effects. The presentation will also discuss the personality types that are drawn to trauma work and working with other people’s trauma, and the self-care interventions appropriate for them. The webinar will end with guidance on developing a personalized self-care plan.

FC122 Intellectual Property Theft Training (June 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

FC122 Intellectual Property Theft Training (Jul 2019)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

Pages