Training Delivery - Online Training

Mindhunters: Exploiting Offender Psychology in Proactive Operations and Abuse Investigations

Learn psychological insights and practical strategies to exploit Internet sex offender dynamics. Discover how to apply the behavioral profiles of solicitation and child pornography offenders in a variety of settings, including while conducting proactive operations or pretext phone calls, crafting undercover personas, identifying device usage, and interviewing perpetrators. This webinar will also address how to attack sex offender risk assessments, with perspectives from prosecution and forensic psychology.

Digital Evidence: Putting the Digital Pieces Together for a Judge and Jury

Modern criminal cases almost always have a technology connection, and putting the pieces together can be overwhelming for prosecutors who may not have the background or experience the investigators have. This webinar will provide an overview of the various types of digital evidence in criminal investigations and concepts for explaining them to a judge and jury.

Research for the Real World: Law Enforcement Stress and Trauma

Increased attention has been given to police officer exposure to traumatic events as well as their prolonged involvement in stressful situations, environments, and working conditions. High stress can have precipitous negative effects on an individual’s mental health — including the onset of mental illnesses such as post-traumatic stress disorder, depression, and/or anxiety. Moreover, research conducted in other fields of employment have shown that stress and stress-related disorders can cause problems with concentration, memory, and mood, which impacts workplace performance.

Busting Bitcoin Bandits

An underground movement of hackers is taking over victims' telephones and draining their financial accounts! In the past 12 months, a California high-tech task force named REACT has identified more than 800 victims and nearly $50 million in losses of cash and cryptocurrency. Please join Santa Clara County, California Prosecutor Erin West and District Attorney Investigator David Berry as they explain this phenomenon known as sim-swapping and detail how the hackers are able to access phones, hijack social media, and ultimately steal millions of dollars. The presenters will take a look at this new class of criminals and identify ways to protect people against this growing crime wave.

Phishing to Laundering: From Clicks to Cash-Out

It is widely acknowledged that phishing is responsible for more than 90 percent of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ‘click the link’ or ‘open the attachment,’ thus often handing over to the criminal the golden nugget – valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

Traumatic Cases and Events: How to Become Resilient and Move Forward

This webinar is meant for individuals who are looking to build resiliency to combat the effects of trauma. Traumatic events can set your life on one course or another. These events occur frequently in the course of investigations and working with child exploitation cases. Rather than allowing these events to define us or take us over, learn how to recognize different types of trauma through warning signs and become aware of the impact it has in not only your life but those around you. Throughout this webinar, you will also learn how trauma is encoded within your body and how through simple techniques, you limit the impact trauma has on our lives. You will also learn how to reframe any situation for your benefit. You will learn tools on how to shift your mind to not only overcome and situation, but also thrive. Take charge of your feelings, life, and outcome!

Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation, Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. The presentation will explore the vulnerabilities, how they are attacked, and what it means to all of us.

Seven Samurai: Understanding Attacks to Drive Defenses

This presentation uses war stories from decades of working in information technology and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction.

Pages