Seven Samurai: Understanding Attacks to Drive Defenses
This presentation uses war stories from decades of working in IT and security to explore the attacks we see today. Kevin Johnson of Secure Ideas will walk through the attacks that are the root of the breaches today. These stories will explain how the attack was performed and why an attacker would take that direction. … Continue reading Seven Samurai: Understanding Attacks to Drive Defenses
Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. In this webinar, Andrew Lewman will share and explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. … Continue reading Law Enforcement Investigations on the Darknet: Case studies from the co-founder of the Tor Project
Being Mickey in a Goofy World: Understanding User Attacks
Kevin Johnson of Secure Ideas has been attacking users for as long as he has been working in security. With permission of course! In this presentation he will walk through the various attacks, including email, social media, and in person, Using various war stories, he will explain how the attacker views the user and what … Continue reading Being Mickey in a Goofy World: Understanding User Attacks
Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations
In this presentation Kevin Johnson of Secure Ideas will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things. We will explore the vulnerabilities, how they are attacked, and what it means to all of us. Presented by: Kevin Johnson, Secure … Continue reading Sandcastles in a Storm: Application Vulnerabilities and How They Weaken our Organizations
Phishing to Laundering: From Clicks to Cash-Out
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. During this webinar, a panel of NCFTA experts will explain how phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a botnet for delivery, … Continue reading Phishing to Laundering: From Clicks to Cash-Out
Busting Bitcoin Bandits
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. An underground movement of hackers is taking over victim telephones and draining their financial accounts! In the past 12 months, a California high tech task force … Continue reading Busting Bitcoin Bandits
Opioid Investigations: Extracting critical data
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. Facing social media barriers and the ability to mitigate their ever-changing platforms is something an investigator or analyst does not have time to do. The growing … Continue reading Opioid Investigations: Extracting critical data
NW3C’s Utility Suite
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. During this webinar we will be discussing the tools included within the NW3C Utility Suite. What they do, how they work, and how they can help … Continue reading NW3C’s Utility Suite
Zip File Forensics
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. We will review the effects that various Zip programs have on date time stamps, understand the cause of that effect and dive deep into the internal … Continue reading Zip File Forensics