Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. This webinar will cover credit card fraud and identity theft from initial investigative steps to arrest and prosecution. The presenters will discuss how to identify points … Continue reading Cybercrime Basics: Investigation and Prosecution of Credit Card Fraud
Seven Samurai: Understanding Attacks to Drive Defenses
This presentation uses war stories from decades of working in IT and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction. … Continue reading Seven Samurai: Understanding Attacks to Drive Defenses
Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. … Continue reading Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Being Mickey in a Goofy World: Understanding User Attacks
Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person, Using various war stories, he will explain how the attacker views the user and what … Continue reading Being Mickey in a Goofy World: Understanding User Attacks
Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations
In this presentation Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. We will explore the vulnerabilities, how they are attacked, and what it means to all of us. Presented by: Kevin Johnson, Secure … Continue reading Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations
Phishing to Laundering: From Clicks to Cash-Out
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, … Continue reading Phishing to Laundering: From Clicks to Cash-Out
Busting Bitcoin Bandits
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. An underground movement of hackers is taking over victim telephones and draining their financial accounts! In the past 12 months, a California high tech task force … Continue reading Busting Bitcoin Bandits
Opioid Investigations: Extracting critical data
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing … Continue reading Opioid Investigations: Extracting critical data