Training Delivery - Online Training

Traumatic Cases and Events: How to Become Resilient and Move Forward

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allowing these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar, you will also learn how trauma is encoded within your body and how through simple techniques, you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation, but also thrive. Take charge of your feelings, life, and outcome!

Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation, Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. The presentation will explore the vulnerabilities, how they are attacked, and what it means to all of us.

Being Mickey in a Goofy World: Understanding User Attacks

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation, he will walk through the various attacks, including email, social media, and in-person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Investigating Terrorist Financing with Chainalysis Reactor

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution, and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 2:30 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 1:00 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop

This webinar on CipherTrace cryptocurrency anti-money laundering and financial investigation provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing sources of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. The webinar is designed to improve the efficiency and effectiveness of blockchain forensic investigations by explaining how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable, and legal commerce for cryptocurrency markets.

Removing Your Personal Identifying Information

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a thorough description of how and where your data is stored and how to remove it.

Pages