Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

In this presentation Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. We will explore the vulnerabilities, how they are attacked, and what it means to all of us. Presented by: Kevin Johnson, Secure … Continue reading Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations

Phishing to Laundering: From Clicks to Cash-Out

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, … Continue reading Phishing to Laundering: From Clicks to Cash-Out

Free

Busting Bitcoin Bandits

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. An underground movement of hackers is taking over victim telephones and draining their financial accounts!  In the past 12 months, a California high tech task force … Continue reading Busting Bitcoin Bandits

Free

Opioid Investigations: Extracting critical data

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing … Continue reading Opioid Investigations: Extracting critical data

NW3C’s Utility Suite

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help … Continue reading NW3C’s Utility Suite

Zip File Forensics

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal … Continue reading Zip File Forensics

Cloud Combat: Law Enforcement Access to Overseas Data

This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. Two attorneys clash in this heated exchange on whether, and how, law enforcement can obtain evidence stored electronically overseas. A former prosecutor and a high-tech crime … Continue reading Cloud Combat: Law Enforcement Access to Overseas Data

Free

Office 365 Forensics and Business Email Compromises

This webinar will discuss the types of evidence that should be collected in a response to a business email compromise/ Office 365 email investigation. Methods of email compromise (phishing, malware, brute force attacks, external compromise/credential stuffing),Types of data at risk and commonly seen schemes. Evidence Collection and Analysis •Review of the Office 365/ Azure Admin … Continue reading Office 365 Forensics and Business Email Compromises

Free