2014 Annual Convention. Expert Witnesses

Size: px
Start display at page:

Download "2014 Annual Convention. Expert Witnesses"

Transcription

1 2014 Annual Convention Expert Witnesses 1.5 General CLE Hours April 30 May 2, 2014 Columbus

2 Contributors Bartley J. Eckhardt Robson Forensic Inc. Lancaster, Pennsylvania Mr. Eckhardt is a Mechanical Marine Systems Expert Witness, Marine and Industrial Engineering Expert. He is a Merchant Mariner who has versed in ship design and operation, co-authored the U.S. Navy Towing Manual, and been a recreational boater since childhood. Mr. Eckhardt took his shipboard experience ashore where he designed, built, tested, troubleshot, maintained, and repaired highly specialized machines and systems. From machine guarding to piping, kettles to presses, and rigging to blocking, he has probably done it and crafted the instructions and warnings, too. Mr. Eckhardt holds a patent for remediation of contaminated soil, is a Professional Engineer registered by the National Council of Examiners for Engineering and Surveying (NCEES), and is licensed in more than 20 states. Mark Songer Robson Forensic Inc. Denver, Colorado Mr. Songer is a multi-faceted entrepreneur, who has created businesses and joint venture partnerships in the education, entertainment, technology, and publishing sectors. Currently, he serves as a Forensic Document Examiner with the firm Robson Forensic. Prior to Robson, Mr. Songer was a former FBI Special Agent and Forensic Examiner, where he worked cases involving white collar crime, foreign-counter intelligence, and domestic terrorism issues. He also served on the FBI s Rapid Deployment Team and Evidence Response Team, responding to various international issues. In addition, Mr. Songer has instructed and created several notable forensic science programs with universities and colleges, both domestically and internationally. He also served in the U.S. Marine Corps and U.S. Army, and he is a lifetime member of the VFW. Dr. Linda Volonino Robson Forensic Inc. Clifton Park, New York Dr. Volonino, Ph.D., CISSP is a professor of Information Technology (IT), computer forensics expert at Robson Forensic LLC, and an author of 10 books on computer forensics, e-discovery, and IT. She has served as an expert witness in a wide range of criminal and civil cases for plaintiff and defense. In recent cases, Dr. Volonino has searched for and investigated electronic evidence from social media, mobile devices, photographs, and mobile apps.

3 Chapter 1: Social, Mobile, Cloud, and App Forensics Dr. Linda Volonino Robson Forensic Inc. Clifton Park, New York Table of Contents Social, Mobile, Cloud, and App Forensics PowerPoint Presentation... 1 Social, Mobile, Cloud, and App Forensics i

4 ii Expert Witnesses

5 Social, Mobile, Cloud, and App Forensics PowerPoint Presentation Social, Mobile, Cloud, and App Forensics 1.1

6 1.2 Expert Witnesses

7 Social, Mobile, Cloud, and App Forensics 1.3

8 1.4 Expert Witnesses

9 Social, Mobile, Cloud, and App Forensics 1.5

10 1.6 Expert Witnesses

11 Social, Mobile, Cloud, and App Forensics 1.7

12 1.8 Expert Witnesses

13 Social, Mobile, Cloud, and App Forensics 1.9

14 1.10 Expert Witnesses

15 Social, Mobile, Cloud, and App Forensics 1.11

16 1.12 Expert Witnesses

17 Social, Mobile, Cloud, and App Forensics 1.13

18 1.14 Expert Witnesses

19 Social, Mobile, Cloud, and App Forensics 1.15

20 1.16 Expert Witnesses

21 Social, Mobile, Cloud, and App Forensics 1.17

22 1.18 Expert Witnesses

23 Social, Mobile, Cloud, and App Forensics 1.19

24 1.20 Expert Witnesses

25 Social, Mobile, Cloud, and App Forensics 1.21

26 1.22 Expert Witnesses

27 Social, Mobile, Cloud, and App Forensics 1.23

28 1.24 Expert Witnesses

29 Social, Mobile, Cloud, and App Forensics 1.25

30 1.26 Expert Witnesses

31 Social, Mobile, Cloud, and App Forensics 1.27

32 1.28 Expert Witnesses

33 Social, Mobile, Cloud, and App Forensics 1.29

34 1.30 Expert Witnesses

35 Social, Mobile, Cloud, and App Forensics 1.31

36 Mark Songer Robson Forensic Inc. Denver, Colorado Chapter 2: Questioned Documents Table of Contents Questioned Documents PowerPoint Presentation... 1 Questioned Documents i

37 ii Expert Witnesses

38 Questioned Documents PowerPoint Presentation Questioned Documents 2.1

39 2.2 Expert Witnesses

40 Questioned Documents 2.3

41 2.4 Expert Witnesses

42 Questioned Documents 2.5

43 2.6 Expert Witnesses

44 Questioned Documents 2.7

45 2.8 Expert Witnesses

46 Questioned Documents 2.9

47 2.10 Expert Witnesses

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR

STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR Judith Germano, Esq. Member, New Jersey Supreme Court s Working Group on Ethical Issues Involving Metadata in Electronic Documents Germano

More information

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA Perfect 10 Inc v. Google Inc et al Doc. 780 Case 2:04-cv-09484-AHM-SH Document 780 Filed 03/03/10 Page 1 of 18 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Jeffrey N. Mausner

More information

Beyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts

Beyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts Beyond Academia: Cyber Security Research Impacts January 2017 Never Stand Still The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 1 ACCS INCUBATOR IMPACT #1: MILITARY

More information

Cell Phone Record Analysis in Support of Criminal Cases

Cell Phone Record Analysis in Support of Criminal Cases Cell Phone Record Analysis in Support of Criminal Cases Reference Manual Volume No. 16-W060 Ohio State Bar Association Continuing Legal Education is a division of the Ohio State Bar Association. Ohio State

More information

FBI. National Security & Oil and Natural Gas. NOIA Conference April 11, 2014

FBI. National Security & Oil and Natural Gas. NOIA Conference April 11, 2014 FBI National Security & Oil and Natural Gas NOIA Conference April 11, 2014 Strategic Partnership Program Partnership with public and private sector entities to protect the national and economic security

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Cyber Terrorism Prevention Pdf Download ->>> DOWNLOAD

Cyber Terrorism Prevention Pdf Download ->>> DOWNLOAD Cyber Terrorism Prevention Pdf Download ->>> DOWNLOAD 1 / 5 2 / 5 How Can We Deter Cyber Terrorism?. Genetic programming for prevention of cyber terrorism through..cyber warfare an analysis of the means

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and

More information

Investigative Report Medical Examiner s Office December 8, 2015

Investigative Report Medical Examiner s Office December 8, 2015 OFFICE OF INSPECTOR GENERAL PALM BEACH COUNTY John A. Carey Inspector General Inspector General Accredited Enhancing Public Trust in Government Investigative Report 2015-0004 Medical Examiner s Office

More information

Sirius Security Overview

Sirius Security Overview Sirius Security Overview Rob Hoisington IT Security Consultant www.siriuscom.com 8/18/2017 1 Rob Hoisington IT Security Consultant - CISSP, GLEG, GCIH Robert.Hoisington@siriuscom.com - 757.675.0101 Rob

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

Northeast Service Center

Northeast Service Center Northeast Service Center Frank J. Poerio Jr. IAAI-CFI Senior Fire Investigator Newark, NJ 201-874-1757 fpoerio@uis-usa.com EDUCATION: Bergen Community College Criminal Justice Paramus, New Jersey 1994-1996

More information

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Syllabus for P.G. Diploma in Cyber Law and Information Technology Syllabus for P.G. Diploma in Cyber Law and Information Technology Paper I: Basic of computer and Cyber Security Paper II: Information Technology Law (Cyber Law) Paper III: Cyber crime and investigation

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Forensics: What Lawyers Need to Know about Forensic Technology and Strategies to Litigate Data Privacy and Cybersecurity Breaches

Forensics: What Lawyers Need to Know about Forensic Technology and Strategies to Litigate Data Privacy and Cybersecurity Breaches Today s Speakers: Daniel B. Garrie, Executive Managing Partner, Law and Forensics; Special Master, Arbitrator, Forensic Neutral, JAMS William Spernow, Chief Forensic Officer, Law and Forensics Jeffrey

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

Digital Forensics on today s digital world

Digital Forensics on today s digital world Digital Forensics on today s digital world D a v i d M a r q u e s E - m a i l : D M a r q u e s @ D R C. p t Morada: Rua Alexandre Herculano, Edifício Central Park, 1 - Piso 7, 2795-242 Linda-a-Velha

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

PROGRAMME CODE QHA5101. This Programme helps to understand various types of crime in digital world and the related legislations in India.

PROGRAMME CODE QHA5101. This Programme helps to understand various types of crime in digital world and the related legislations in India. PROGRAMME CODE QHA5101 This Programme helps to understand various types of crime in digital world and the related legislations in India. TABLE OF CONTENT About the Programme Overview Benefits Objectives

More information

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc. Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,

More information

Data Breach Preparation and Response. April 21, 2017

Data Breach Preparation and Response. April 21, 2017 Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, Chief Strategist 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs

COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

SINGLE SPACE ELECTRONIC PARKING METERS RFI NO PAGE

SINGLE SPACE ELECTRONIC PARKING METERS RFI NO PAGE The Philadelphia Parking Authority 701 Market Street, Suite 5400 Philadelphia, PA 19106 Request for Information No. 16-36 Single Space Electronic Parking Meters Introduction: The Philadelphia Parking Authority

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering CCI Post Office Box 9627 Mississippi State, MS 39762 Voice: (662) 325-2294 Fax: (662) 325-7692

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems T H E U N I V E R S I T Y O F T E X A S A T E L P A S O College of Business Administration Information Systems What is Computer Information Systems? A field of studying computers and algorithmic processes.

More information

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Field Series. Jump-start investigations with forensically sound data in real time.

Field Series. Jump-start investigations with forensically sound data in real time. Field Series Jump-start investigations with forensically sound data in real time. Frontline teams need real-time insights they can act on, fast. As devices and data become more embedded in our lives, the

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Clean Energy Solutions Center, REN21, and Leonardo Energy

Clean Energy Solutions Center, REN21, and Leonardo Energy Clean Energy Solutions Center, REN21, and Leonardo Energy REN21 Renewables 2012 Global Status Report: North America Focus September 4, 2012 Vickie Healey Moderator Christine Lins Presenter Alexander Ochs-

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Six Beacon Street, Suite 815 Boston, MA 02108

Six Beacon Street, Suite 815 Boston, MA 02108 Six Beacon Street, Suite 815 Boston, MA 02108 CURRICULUM VITAE John Wilson, ACE, AME, CBE 6341 Highway 92, Suite 201 Acworth, GA 30102 (678) 673-3463 JWilson@HaystackID.com Bio/Summary: Mr. Wilson is a

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

Mobile Forensic Investigations: A Guide To Evidence Collection, Analysis, And Presentation Ebooks Free

Mobile Forensic Investigations: A Guide To Evidence Collection, Analysis, And Presentation Ebooks Free Mobile Forensic Investigations: A Guide To Evidence Collection, Analysis, And Presentation Ebooks Free This in-depth guide reveals the art of mobile forensics investigation with comprehensive coverage

More information

Information Governance, the Next Evolution of Privacy and Security

Information Governance, the Next Evolution of Privacy and Security Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic

More information

User Story. Persona. Nimfa Improve criminal case assessment and decision making

User Story. Persona. Nimfa Improve criminal case assessment and decision making User Story As a law firm, LK and Partners law office receives a number of criminal cases from different clients. These cases must be assessed completely and keenlyby conducting deeper investigation and

More information

Fidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum

Fidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum Fidelis Overview 15 August 2016 ISC2 Cyber Defense Forum Fidelis Cybersecurity EST. 2002 T HE W O RLD S M O ST VAL U ABLE BR AND S USE FIDELIS* I N D U S T R I E S W E S E R V E Defense Contractors Financial

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

PIONEER TRAINING INSTITUTE

PIONEER TRAINING INSTITUTE PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management

More information

Biography and Curriculum Vitae of John C. Villines

Biography and Curriculum Vitae of John C. Villines Biography and Curriculum Vitae of John C. Villines John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations)

More information

Case 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL

Case 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL Case 114-cr-00068-KBF Document 57 Filed 09/05/14 Page 1 of 10 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - UNITED STATES OF

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program

Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program Manager New York State Forensic Overview Office of Forensic

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

Revelstoke RCMP COMMUNITY POLICING TOWN HALL

Revelstoke RCMP COMMUNITY POLICING TOWN HALL Revelstoke RCMP COMMUNITY POLICING TOWN HALL 2018-02-27 Role of the RCMP The Revelstoke RCMP provide law enforcement, address social issues and provide public safety education. The Administration Staff

More information

Detecting Computer Intrusions: Are You Pwned?

Detecting Computer Intrusions: Are You Pwned? Detecting Computer Intrusions: Are You Pwned? Steve Anson Former computer agent for the U.S. Department of Defense and Federal Bureau of Investigation (FBI) Former computer crime investigation instructor

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Media Kit. California Cybersecurity Institute

Media Kit. California Cybersecurity Institute Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government

More information

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa Certificate, Diploma and Online Digital Transformation Education covering Innovation, Opportunity Management, Systems Engineering, Management, Technology and Digital Analytics Developed and Prepared by

More information

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER 1 INCIDENT RESPONDER'S FIELD GUIDE TABLE OF CONTENTS 03 Introduction

More information

Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts

Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts Dr. Hans Henseler, University of Applied Sciences Leiden Sophie van Loenhout M.Sc., Netherlands Register of Court Experts

More information

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations Gabriel Accascina gabriel@it4dev.net Contents The E-readiness Assessment (ERA) process and analysis The components

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry

First Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry First Science-Policy- Industry meeting on CBRN-E Introductory words Brussels, 30 th January 2014 Philippe Quevauviller Security and Industry DG Enterprise and Industry FP7 CBRN- Where do we stand? Around

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

Students Preferences for Receiving Communication from the University: A Report from the Student Life Survey

Students Preferences for Receiving Communication from the University: A Report from the Student Life Survey Preferences for Receiving Communication from the University: A Report from the Student Life Survey Center for the Study of Student Life March 2017 INTRODUCTION This report explores questions on the Student

More information

The Age of Heightened Security

The Age of Heightened Security The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul Harmonizing National Legal Approaches and International Legal Coordination International Cooperation in Cybercrime Investigations A Law Enforcement Perspective Colonel Claudio Peguero ITU / WSIS Thematic

More information

Presentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007

Presentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007 Presentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007 2 TEAM WORK LOWER MAINLAND DISTRICT One part of the police service relies on the other parts for a truly integrated

More information

Forensic Discovery By Wietse Venema, Dan Farmer READ ONLINE

Forensic Discovery By Wietse Venema, Dan Farmer READ ONLINE Forensic Discovery By Wietse Venema, Dan Farmer READ ONLINE Get this from a library! Forensic discovery. [Dan Farmer; Wietse Venema] -- "Computer forensics - the art and science of gathering and analyzing

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

Participants - non-commission: Judith Bertini, various DEA colleagues, DOJ attorney

Participants - non-commission: Judith Bertini, various DEA colleagues, DOJ attorney .- f Event: Briefing by the Drug Enforcement Administration (DEA) Type of Event: Briefing Date: October 16, 2003 Special Access Issues: None Prepared by: Gordon Lederman Team Number: 2 Location: Main Justice

More information

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations

NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations Background The NALA Certifying Board provides oversight for the development and ongoing maintenance of the Certified

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

LOOKING BEYOND. Towards a stronger partnership with civil society organizations on drugs and crime

LOOKING BEYOND. Towards a stronger partnership with civil society organizations on drugs and crime LOOKING BEYOND Towards a stronger partnership with civil society organizations on drugs and crime Bringing civil society s voice to the international debate! Beyond 2008 has been a catalyst for generating

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

E-BOOK SYSTEM FORENSICS INVESTIGATION AND RESPONSE EBOOK

E-BOOK SYSTEM FORENSICS INVESTIGATION AND RESPONSE EBOOK 08 March, 2018 E-BOOK SYSTEM FORENSICS INVESTIGATION AND RESPONSE EBOOK Document Filetype: PDF 87.06 KB 0 E-BOOK SYSTEM FORENSICS INVESTIGATION AND RESPONSE EBOOK AbeBooks.com: System Forensics, Investigation

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information