Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.
Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.
Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse.
Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center
This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization.
Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute
Starting with a basic overview of cryptocurrencies, this webinar will focus on some of the more technical aspects of the crypto industry. Additionally, this webinar will look at criminals' abilities to use cryptocurrency, the potential future of crypto, and considerations for how to seize cryptocurrency as part of criminal investigations.
Laundering being missed? Law enforcement and government agencies globally have examples of intelligence failures that could have led to offenders being brought to justice earlier if relevant data had been shared between partners. In this webinar, the presenter will discuss whether there are means of more effectively sharing intelligence to fight financial crime and criminals.
Merriam-Webster is our go-to source for thousands of definitions. Digital Forensics and Incident Response (DFIR) use terms that are not typically defined in mainstream dictionaries. A quick review of any common listserve reveals a lexicon of hundreds, if not thousands, of unique terms and words. This webinar series will start with the most basic of DFIR definitions and build upon them. The webinar content will be rooted in empirical facts with a misting of industry history and professional experiences.
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.
Investigators need to understand the dark side of information sharing and the potential risks it brings to victims, witnesses, and investigators. To avoid potentially dangerous individuals, first responders, security professionals, and intelligence officers choose to keep their families and homes off the grid. Employees and agencies are at greater risk now more than ever because fraudulent predators are taking advantage of those unfamiliar with working from home. Hacking, phishing, and scamming are on the rise, and the threats are expected to increase. Helping the public and high-risk targets protect their personally identifiable information is a priority during these uncertain times. Opting out of online personal data aggregates and managing the technology devices inside your home can reduce the risk to you and your family. This webinar is meant to help facilitate your understanding of the dark side of information sharing and how to protect your, your family's, and the high-risk targets' personal privacy in a very open online world. There is no one solution, no one vendor, that has all the answers. Knowledge from this session will enable you to begin to remove, obstruct, or obscure the open source information that leaves you, your family, and high-risk targets vulnerable online.
In this ever-changing fraud environment we live in, one thing has remained constant, investigating first-party fraud and the use of synthetic identities has always been difficult. Join us for an interactive presentation that will not only educate you but give you resources to assist in your investigations. There will be content on synthetic identity creation and use, CPNs (credit privacy number), assumed identity fraud, bustouts, collusive/shell merchants, false fraud claims, manufactured spend and much, much more. We'll also discuss trends in the industry and how Capital One can assist in your investigations.