Training Delivery - Online Training

Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation, Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. The presentation will explore the vulnerabilities, how they are attacked, and what it means to all of us.

Being Mickey in a Goofy World: Understanding User Attacks

Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation, he will walk through the various attacks, including email, social media, and in-person. Using various war stories, he will explain how the attacker views the user and what they do to increase the success rate of these attacks.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Investigating Terrorist Financing with Chainalysis Reactor

Terrorist organizations are using cryptocurrencies as a new way to raise funds and facilitate operations. This poses a challenge to both public and private sector organizations, but also creates a new opportunity for lead development centered on blockchain data. This webinar will review an analysis of recent cases of terrorist organizations using Bitcoin, provide an overview of Chainalysis data and the Reactor software solution, and speak to the future of terrorist financing through cryptocurrency and how to stop them.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 2:30 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Collecting Advertiser ID Evidence in Criminal Investigations (Mar 19 2019, 1:00 p.m.)

Many mobile phone users choose to share Advertiser ID information with app developers and social media companies. This includes precision handset geolocation information. Advertiser ID handset geolocation information is separate and distinct from handset geolocation information collected by cellular carriers, by Google for Android OS devices, or on iOS handsets in Significant Locations. Commercially available Advertiser ID information can be used during criminal investigations to determine if a handset was at multiple crime scenes near the times of those crimes and to determine specific locations where a handset was previously located. This webinar will discuss Advertiser IDs, show where Advertiser ID controls are located on iOS and Android OS handsets, outline investigative use and considerations, and detail specific instances when evidence collected from commercially available Advertiser ID information was used during the investigations of serious crimes.

Blockchain Tracing: Cryptocurrency Anti-Money Laundering and Financial Investigation Workshop

This webinar on CipherTrace cryptocurrency anti-money laundering and financial investigation provides hands-on instruction on blockchain and blockchain tracing. Attendees will learn a risk-based approach to tracing sources of blockchain funds and de-anonymizing cryptocurrency transactions with cryptocurrency forensic tools. They will develop and hone digital forensic investigation techniques. The course will equip participants with an understanding of cryptocurrency fundamentals and the specific understanding of tracing cryptocurrency transactions. The webinar is designed to improve the efficiency and effectiveness of blockchain forensic investigations by explaining how to best leverage tools and resources to reduce investigation time and improve information yield. CipherTrace provides the infrastructure to enable secure, verifiable, and legal commerce for cryptocurrency markets.

Removing Your Personal Identifying Information

Everyone is at risk for identity theft, online and physical stalking, and harassment. Beyond social media, your public records are for sale, so your home address and assets are easily located through simple online searches. This course provides a thorough description of how and where your data is stored and how to remove it.

Leveraging Partnerships and Avoiding Multiagency Pitfalls

Have you ever wished that everyone was in the same boat as you, and more importantly, rowing in the same direction? Today people live in a global society that consists of various teams and departments working with and against each other. People face individual and institutional challenges that sometimes inhibit their ability to succeed. Investigations today comprise public and private entities, investigators from different departments, attorneys, and others that can impact your investigation or goals. This webinar will teach students the art of leverage and how to maintain, develop, and execute partnerships that will provide long-term success. True success comes when you are able to maintain partnerships and rely on each other for that success. This webinar will provide students with strategies used by some of the most successful Fortune 500 companies. Students will be able to implement these strategies directly to their teams and their investigations. This webinar will give them insight on how to develop relationships and leverage people in order to be more efficient and provide them with lasting success.

Mobile Extractions + Power Analytics: Using XRY and PLX Together to Solve Your Investigations

In most investigations today, mobile phone data is one of the most critical sources of evidence. The reasons are clear, given the volume and variety of data in today's smartphones and the depth with which mobile devices capture activities. This presentation will focus on what types of data can be recovered from mobile devices using XRY and how to then export that data into PLX. You will learn how PLX can then help you swiftly organize, analyze, and dissect the many different sources of information you have, including mobile device data, in one easy-to-use platform.

Pages