Cybercrime & Computer Forensics 

Recorded: Feb 03 2011

About this summit
In Last year the world experienced significant breaches involving the use of botnets, viruses and other forms of attacks targeting government and businesses alike. Engage live with experts in threat management, information security and e-discovery to learn what the latest threats to your business are, how to effectively manage breaches and how to safeguard your organization from cybercriminals all over the world.

Upcoming | Archived | All 


NISTEnterprise-Wide Risk Management

Presenting: Ronald S. Ross; NIST Fellow

For decades, organizations have managed risk at the information systems level. This information system focus provided a very narrow perspective that constrained risk-based decisions by senior leaders/executives to the tactical level—devoid, in many cases, of any direct linkage or traceability to the important organizational missions/business functions being carried out by enterprises.


Security Warrior ConsultingUsing Logs for Breach Investigations and Incident Response

Presenting:  Dr. Anton Chuvakin; Security Warrior Consulting, Principal

The presentation will cover how to use various logs during incident investigations.


preventingPreventing CyberCrime by Relying on SSL Protocol

Presenting: Larry Seltzer; Security Analyst

At the heart of almost all cybercrime is the technique of social engineering, which usually means impersonating someone else.


KPMGYou've been Breached, What Now? E-Crime Scene Investigation

Presenting: Steven J Morrison; Private Investigator and Director of Forensic Technology, KPMG 

Whether you've only read about it or you've work on several investigations, you already know that no two cases are the same. What are the 3 biggest blunders that others make, and how can you avoid them?


CACybercrime and Identity

Presenting:  Mike Small, Fellow Analyst at Kuppinger Cole

Cybercrime is a global business but not all crime is committed by organized criminals. As well as the much reported production and exploitation of malware, employees steal or misuse corporate data and systems, and individuals expose themselves to prosecution through misuse and mistake.

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  Next 
  •  End 
  • »
Page 1 of 2

Subscribe via Email

 Your Email:


bedava porno