Professional Training Course - Cybercrime Investigation Body of Knowledge -

Similar documents
PROVIDING INVESTIGATIVE SOLUTIONS

Legal, Ethical, and Professional Issues in Information Security

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMPUTER FORENSICS (CFRS)

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Promoting Global Cybersecurity

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Inter-American Port Security Cooperation Plan

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Cybersecurity Risk Management:

Incident Response Services

OVERVIEW OF SUBJECT REQUIREMENTS

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Bachelor of Information Technology (Network Security)

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Effective Cyber Incident Response in Insurance Companies

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Cyber Security Strategy

Cybersecurity Auditing in an Unsecure World

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Cyber Security Development. Ghana in Perspective

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Security and Privacy Governance Program Guidelines

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

CCISO Blueprint v1. EC-Council

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

STRATEGIC PLAN. USF Emergency Management

Risk Advisory Academy Training Brochure

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Information Security Incident Response Plan

Cybersecurity. Securely enabling transformation and change

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cyber Security in Smart Commercial Buildings 2017 to 2021

Security Director - VisionFund International

Commonwealth Cyber Declaration

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Sage Data Security Services Directory

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Cyber Risks in the Boardroom Conference

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

2017 RIMS CYBER SURVEY

Strategic Security Analyst

locuz.com SOC Services

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC)

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

Credit Card Data Compromise: Incident Response Plan

The Customer Relationship:

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Global Security Advisor

Information Security Incident Response Plan

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

China and International Governance of Cybercrime

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Cybersecurity and Hospitals: A Board Perspective

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Phishing Activity Trends Report October, 2004

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

The NIST Cybersecurity Framework

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Global Wildlife Cybercrime Action Plan1

G8 Lyon-Roma Group High Tech Crime Subgroup

Strategic and operational threat analysis at Europol's EC3

Forensics and Active Protection

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism

Caribbean Cyber Security: Not Only Government s Responsibility

Mastering Data Privacy, Social Media, & Cyber Law

ISACA West Florida Chapter - Cybersecurity Event

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

G7 Bar Associations and Councils

Contact us What makes us different Dinesh Anand Our offices Forensic Bangalore Kolkata Cutting-edge technology to deliver more efficiently Services

Donor Countries Security. Date

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

What Does the Future Look Like for Business Continuity Professionals?

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Critical Information Infrastructure Protection Law

Strategic threat advisory services

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Cyber Crime Seminar 8 December 2015

CYBER SOLUTIONS & THREAT INTELLIGENCE

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Legal and Regulatory Developments for Privacy and Security

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Solutions Technology, Inc. (STI) Corporate Capability Brief

Electronic payments in the Netherlands

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Donor Countries Security. Date

Transcription:

Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce and trade to grow and adapt to near-real time access to each to information services. Related to that growth, however, has been the intrusion of criminal actors who take advantage of the same services to commit traditional types of crimes in innovative ways that exceed by many magnitudes previous scales of theft, fraud, intimidation, and extortion. What began as disassociated efforts of individuals seeking attention or personal gain, has since become organized and syndicated activities. Those criminal activities offer speed and (some) anonymity with techniques that are difficult to keep pace with in traditional investigative methods. To address these challenges, law enforcement investigators and prosecutors, and corporate incident responders and risk management executives collaborated to create the Cyber Investigation Body of Knowledge as a standard of practice to align law enforcement and corporate understanding and approaches in investigation and response.

Objectives. An overview of the knowledge, skills and techniques required by law enforcement and corporate security officers (and executives) to understand how to identify, respond, and investigate cybercrimes will be covered including: 1. Popularizing and promoting a commonsense approach concerning consistent international cybercrime investigations, not dependent upon the laws of each country. 2. Offering a detailed demonstration of the positioning of other systematized customary practices, project management, computer science and digital forensics within the scope of cybercrime investigations. 3. Characterizing and demonstrating the content that should be put into practice in cybercrime investigations. 4. Presenting means to utilize the topics covered in this body of knowledge of cybercrime investigations collected from experienced professionals. 5. To provide a framework for developing training curricula and individual knowledge and skills pertaining to duties of investigators and responders.

Topics This 5-day course will provide a description with supporting interactive exercises concerning the following topics: Introduction to CIBOK Cybercrime and its Investigation Types of Cybercrimes Artifacts of Cybercrime Scope of Cybercrime Sources of Evidence Methods of Evidence Collection Methods of Evidence Analysis Incident Resolution Cybercrime Information Sharing Management Framework Who should take this course This course is designed as an executive introduction for law enforcement investigators and prosecutors, and corporate auditors and incident handlers who may be tasked with related risk and compliance assessments and mitigation. What participants will be provided Participants will be provided with a copy of the CIBOK First Edition, a course manual, and reference materials. Trainers Dr. Shane Shook is a well-known veteran of information security and response engagements with nearly 30 years of experience spanning government and industry issues. He has led forensic analysts and provided expert testimony in many of the most notorious breaches involving financial services, healthcare, retail, hospitality, transportation, energy, automotive, and entertainment corporate (and government) systems. He has also served as expert witness in related federal, civil and commercial disputes. He currently serves on the advisory boards of several emerging security technology companies.

Topic Day 1-2: Knowledge Development The 5 objectives of CIBOK What is a Cybercrime? - Technology as a Target - Technology as a Tool - Technology as a Distraction What are Cybercrime Investigations? - With evidence of data/other loss - Without evidence of loss What are challenges to Cybercrime Investigations? - Jurisdiction and Venue - Human Rights and Privacy What skills, knowledge and experience are necessary to develop investigative capabilities to address Cybercrime? Objective To understand, through examples, the types, scope, artifacts of, and approaches to identifying and investigating Cybercrimes. To include jurisdictional considerations and information sharing within international privacy boundaries. Case Examples: - Retail/POS Breaches - Tech/Defense IP Theft - Healthcare/Gov Data Theft - Bank ATM/Payments Network Theft - Securities Fraud - Social Networks/Services Identity Theft and Fraud The knowledge development, while generally intended to assist organizational stakeholders in understanding the types of Cybercrime (by objective), is an important foundation for investigators and analysts to become aware of the scope of Cybercrimes and the types of communication and decision-making that executive leaders must make. It is recommended that executive stakeholders, as well as lead investigators or department managers participate in this section of training. It is also recommended that investigators and analysts attend this section to gain understanding of how their tasks are associated to strategic prevention, detection, and investigation of Cybercrimes. The knowledge development section will conclude with a table-top exercise depicting a real-world cybercrime.

Topic Objective Day 3-5: Skills Development To understand the practical What is evidence vs. artifacts of requirements for conducting a cybercrime? Cybercrime investigation. What are the sources of evidence? What are the methods of evidence To include the identification collection? (and discretion) of crimes versus anomalous activities, How should evidence be handled for and methods of evidence investigative and judicial purposes? collection and handling for What are methods of analysis for evidence analysis. of Cybercrimes? What sources of information are available to Also to include methods of intelligently discover or prevent efficient collection, processing Cybercrimes? and analysis with popular How should information about Cybercrimes expert tools. be shared? What are the minimum organizational Technical demonstrations, with requirements for a Cybercrimes associated exercises (and investigation unit? samples), will be performed for What tools and training are available to discussion. develop Cybercrimes investigation staff? The skills development is intended to expose participants to sources of evidence for consideration when conducting a cybercrime investigation. Such sources include external threat intelligence, industry and law enforcement intelligence, internet proprietary and open source information, and (some) discussion of dark/deep web. Additional sources will include security research samples and evidence from network, file and operating systems, and live memory acquisition. Methods of collection, processing and analysis will be covered with particular emphasis on appropriate documentation, custodial control and documentation of such evidence. It is recommended that technical and non-technical investigators and department managers participate in this section of training to understand skills and knowledge requirements of cybercrimes investigation functions and staffing. The skills development section will include technical analysis exercises.