POPULARITY
Enjoying the content? Let us know your feedback!This week episode, we dive into one of the most fascinating aspects of digital investigations: Windows forensic artifacts.It does not matter who you are: a security professional, an aspiring investigator, or simply curious about how experts uncover the digital breadcrumbs left on your computer, this episode will walk you through the essential pieces of evidence, known as _forensic artifacts_.We'll dip our hand into that Shellbags...wait what bags? I heard you say, Don't worry we will break down those complex terms, discuss real-world cases, and provide you with an in-depth understanding of artifacts like Shellbags, Prefetch files, and more. Before we go any futher, we will review one top trending security news, this week... and that is: Microsoft NTLM Zero Won't get fixed until April 2025!- https://blog.0patch.com: NTLM Hash Disclosure Vulnerability (0day) - https://www.splunk.com: Cyber Forensics- https://www.coursera.org: Digital Forensics ConceptsBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.
Podcast: ICS Cyber Talks PodcastEpisode: Adv. Rami Tamam & Jack Altal, leaders of the Cyber Forensics MBA @Ono AC, about managers and cyberPub date: 2024-07-03עולם הסייבר הולך ומתרחב, יותר ויותר רגולציות ונושאים בהם נדרשים מנהלים לקחת החלטות שיהיו להן השפעות לטווח ארוך, איך מתמודדים ומה צריך לעשות על מנת לוודא שננקטו הצעדים הנכונים? נחשון פינקו מארח את עו"ד רמי תמם וג'קי אלטל מובילי תוכנית לתואר שני בסייבר פורנזיקה בקריה האקדמית אונו, בשיחה על הצורך והחשיבות של מנהלים להבין סייבר גם אם זה לא מרכז עיסוקם. The cyber-world is expanding, more and more regulations and issues require managers to make decisions that will have long-term effects. How do you cope, and what should be done to ensure that the proper steps have been taken? Nachshon Pincu hosts attorney Rami Tamm and Jackie Altal, leaders of a master's degree program in cyber forensics at the Ono Academic College, in a conversation about the need and importance of managers to understand cyber even if it is not their focus.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
עולם הסייבר הולך ומתרחב, יותר ויותר רגולציות ונושאים בהם נדרשים מנהלים לקחת החלטות שיהיו להן השפעות לטווח ארוך, איך מתמודדים ומה צריך לעשות על מנת לוודא שננקטו הצעדים הנכונים? נחשון פינקו מארח את עו"ד רמי תמם וג'קי אלטל מובילי תוכנית לתואר שני בסייבר פורנזיקה בקריה האקדמית אונו, בשיחה על הצורך והחשיבות של מנהלים להבין סייבר גם אם זה לא מרכז עיסוקם. The cyber-world is expanding, more and more regulations and issues require managers to make decisions that will have long-term effects. How do you cope, and what should be done to ensure that the proper steps have been taken? Nachshon Pincu hosts attorney Rami Tamm and Jackie Altal, leaders of a master's degree program in cyber forensics at the Ono Academic College, in a conversation about the need and importance of managers to understand cyber even if it is not their focus.
“The speed at which this happens is faster than anything we've seen before.”In this episode, Seize & Desist host Aidan Larkin is joined by Jarod Koopman, the Executive Director of Cyber and Forensic Services at IRS Criminal Investigations.As the only federal law enforcement agency to focus completely on fighting financial crimes, IRS Criminal Investigations has seized more digital assets than any other agency in the world. Aidan and Jarod discuss the secret to IRS-CI's status as a world leader in digital currency investigations, the reliability of blockchain analytics data in court and the lasting impact of asset seizures on criminal behaviour.Jarod shares his thoughts on the legitimacy of cryptocurrency transactions, the necessary compliance guidelines, and the parallels between Brazilian jiu-jitsu and cryptocurrency investigations.Timestamps01:00 - IRS's Expertise in Cybercrime and Asset Seizures05:30 - Unveiling the Success Behind Major Investigations07:00 - Revolutionizing Transactional Analysis with Blockchain Tools11:30 - Collaborative Innovation in Cybercrime Investigations13:30 - Evaluating FATF's Effectiveness in Asset Recovery16:00 - Balancing Privacy and Crime Prevention19:30 - Explaining Cryptocurrency Mixers and Blockchain Laundering20:00 - Legitimate Uses of Cryptocurrency Amongst the Illicit Activity25:30 - The Impact of Asset Seizure in Fighting Crime30:00 - Law Enforcement and the Evolving Digital Landscape33:00 - Fostering Resilience and Innovation36:00 - Why Martial Arts Promotes Success in the Investigative Services41:00 - Civil Forfeiture in Asset Recovery44:00 - Validating Blockchain Analytics in Legal JudgmentsResources Mentioned:Jarod on the TRM Talks PodcastSamourai Wallet Founders Arrested and Charged With Money Laundering IRS Criminal Investigations on LinkedIn About our Guest:Jarod Koopman is the Executive Director of Cyber and Forensic Services at IRS Criminal Investigations and a black belt in Brazillian Jiu-Jitsu.He joined the IRS directly after college, rising through the ranks to become the agency's first director of cybercrime. In this role, Jarod oversees all global operations involving cyber and forensic activities, including policy, procedures, budget and investigative services. He also oversees the operation of their new centralised Advanced Collaboration and Data Center (ACDC) which specialises in training and support for crypto compliance.DisclaimerOur podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material.The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.
Podcast: ICS Cyber Talks PodcastEpisode: Danit Leybovich-Shati Founder @Alpha Forensics DE & “Why cyber!?” Podcaster on Cyber Forensics valuePub date: 2024-05-08פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Cyber Talks PodcastEpisode: Danit Leybovich-Shati Founder @Alpha Forensics DE & “Why cyber!?” Podcaster on Cyber Forensics valuePub date: 2024-05-08פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
פרק מיוחד בשיתוף עם הפודקסט "למה סייבר!?" נחשון פינקו מארח את דנית ליבוביץ-שטי המייסדת של חברת אלפא חקירות דיגיטליות, מובילת הפודקאסט המצויין "למה סייבר!?". בשיחה על מה היא פורנזיקה דיגיטלית (כנראה לא מה שחשבתם), איך לבחור חברת מענה לאירוע סייבר, חשיבות הגיבויים ובדיקות חזרה מגיבוי באופן שוטף. ועוד A special episode in collaboration with the podcast "Why Cyber!?" Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.
“Blockchain analytics firms only capture a floor of illicit activity, not the ceiling” In this insightful episode of "Seize & Desist," Aidan Larkin hosts cybersecurity expert Carole House for a rich discussion on the complexities of digital assets, cryptocurrency, and the pressing issue of ransomware. As a veteran in the field, Carole shares her unique perspective on the growth of crypto-related crime and the importance of debunking myths surrounding illicit finance statistics.Carole and Aidan navigate through the thorny subject of quantifying illicit activities within the blockchain, how misinformation about these metrics can undermine efforts in combating crime, and the role of regulatory institutions like FinCEN.Stay tuned for Part 2, where the duo address the persistent underestimation of cyber threats posed by state-sponsored actors such as North Korea, and the challenges inherent in our existing countermeasures against the sophisticated use of cryptocurrency in ransomware-as-a-service models.Timestamps2 | Carole's major role in public sector policy in crypto and background 13 | Blockchain analytics firms only capture a floor of illicit activity, not the ceiling20 | The effectiveness of regulations in combating crypto-related crimes 26 | The ongoing debate of surveillance tools and a decentralised crypto society 31 | Lack of regulation and industry responsibility internationally 35 | Info sharing and other lessons from cybersecurity Resources Mentioned:Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes (UNODC 2-5% stat source)Congressional Hearing: Crypto Crime in Context Part II: Examining Approaches to Combat Illicit ActivityCounter-ransomware initiative (International Counter Ransomware Initiative (CRI) -)Book: Investigating Cryptocurrencies (by Nick Furneaux)Book: Currency Cold War (by David Birch)Podcast: The Lazarus Heist (by Geoff White) About our Guest:Carole House is a cybersecurity and risk management specialist with a background in U.S. military intelligence.Throughout her decorated career, she has held several senior positions in the government, including Senior Cyber and Emerging Tech Policy Officer at the US Treasury; Head of Virtual Assets at FinCen and Director of Cybersecurity and Secure Digital Innovation at the White House. In these roles, she spearheaded initiatives to strengthen digital infrastructure and counter cyber-enabled national security threats.Carole currently serves as the Executive in Residence at Terranet Ventures, where she advises start-ups and non-profits on strategies to protect against emerging cyber threats.DisclaimerOur podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material.The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.
Today Kevin and Laura speak with David Adeoye Abodunrin about cyber threat intelligence, compliance versus cyber security and human firewalls. We get into a debate about Zuckerburg vs. Musk, being a prince and much more!With a remarkable track record spanning over two decades, David Adeoye Abodunrin PMP, CSM, CSPO, CSP-SM, MSC is a distinguished authority in Project/Program Management, Agile Transformations, Human Capital Management, Cybersecurity, and Coaching, offering a multifaceted approach to personal and professional and enterprise growth. Holding a plethora of certifications, including being a Certified Scrum Professional- Scrum Master(CSP-SM), Certified Management Consultant (CMC) and Project Management Professional (PMP), he stands as a versatile figure equipped to navigate complex landscapes.Armed with a master's degree in Cybersecurity and specialization in Cyber Forensics and Threat Intelligence, David illuminates strategies to combat cyber threats, safeguard digital ecosystems, and address the nuances of cyberwarfare. His insights resonate with individuals and organizations seeking to fortify their online security measures.David's Agile PM, HR and Corporate leadership acumen sets him apart. By harmonizing his psychology, coaching, project management, and agile expertise, he empowers organizations to embrace agility in their enterprise practices, fostering leadership excellence. His holistic approach extends beyond conventional methodologies, enabling businesses to navigate dynamic environments with adaptability and innovation.
In this episode of "Know and Grow your Value," we sit down with the incredible David Adeoye Abodunrin directly from the UK to unravel the layers of effective communication.Devid after his MBA-Hult International Business School and specialization in MSc-Cybersecurity,Cyber Forensics &Threat Intelligence dedicate his carrer in PMO, Program & Project Management, Agile Coaching & Transformations and Organizational & HR Futurism also getting the Award Winning Coach. Join us as David shares his unique insights and experiences, offering practical tips on how to navigate conversations with finesse. From the power of empathy to the art of asking thoughtful questions, each moment is a valuable lesson in enhancing your communication skills. Discover the keys to building stronger connections, both personally and professionally, and gain a deeper understanding of the dynamics that shape meaningful dialogues. Whether you're a seasoned communicator or just starting your journey, this episode promises to be a source of inspiration and actionable wisdom. Tune in and embark on a transformative exploration of communication with "Dialogue Dynamics: Insights on Effective Communication with David Adeoye Abodunrin."Get in contact with David on Linkedin:https://www.linkedin.com/in/abodunrinadeoyedavid/Follow me on my social media and connect via email:nicolino.camarda@gmail.comSupport the showFollow me on Facebookhttps://www.facebook.com/personalgrowthpodcast?mibextid=ZbWKwL
The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre's journey, from the Anoka County Sheriff's Office, through the Illinois Attorney General's Office, to the state of Minnesota, provides fascinating insights into a career in stopping cyber-crime. Andre also recounts his time managing a digital forensics laboratory, shedding light on the intricate balance between risk and technology in the digital landscape. He shares stories about investigating arson cases, using phone evidence to reveal the diversity of online predators. His anecdotes provide a sobering perspective on the challenges and rewards of a career in cyber forensics. Finally, Andre breaks down the reality of the cyber security field beyond what you see in TV and film. His experiences range from putting together reports for the courtroom, dealing with data breaches and ransomware, to handling HR investigations. The conversation takes a darker tone as we address the chilling reality of online predators while Andre provides valuable advice on ways to keep children safe online.
In questo episodio parliamo di un Manuale dedicato alle investigazioni digitali e ai cybercrimes.
In the face of cyber threats, how do nations & organisations safeguard personal data & secure the digital systems we rely on? In this episode, host David Karsten is joined by Dr Nickson Karie, a cybersecurity and forensics expert to discuss the looming threat of cyberattacks, the potential impacts of cyberwarfare on a nation, and what we can all do to keep our information safe in cyberspace.What is cyberwarfare? [00:57]The future of cyber-defence and AI [06:23]The likelihood of a catastrophic cyberattack [09:20]What inspires Dr Karie [20:20]Learn moreCurtin Institute for Data Science (Formerly Curtin Centre for Computation)Bachelor of Science (Cyber Security)Connect with our guestsDr Nickson M KarieDr Karie is an accomplished cybersecurity and forensics professional with more than ten years of academic teaching and research. He is currently a Senior Lecturer in Cybersecurity and Forensics at Curtin University.Dr Karie uses his cybersecurity and forensics skills and knowledge to contribute to the technological advances happening in different industries. He believes that security is not only a fundamental part of our daily life but also key to the future of our globaldigital economy.Dr Karie graduated from the University of Pretoria, South Africa in 2016 with a PhD in Computer Science. His research interests are in cloud forensics, critical infrastructure security, cybersecurity, digital forensics, incident handling and intrusion detection,IoT forensics, and mobile forensics. Join Curtin UniversityThis podcast is brought to you by Curtin University. Curtin is a global university known for its commitment to making positive change happen through high-impact research, strong industry partnerships and practical teaching.Work with usStudy a research degreeStart postgraduate educationGot any questions, or suggestions for future topics?Email thefutureof@curtin.edu.auSocial mediaTwitterFacebookInstagramYouTubeLinkedInTranscriptRead the transcriptBehind the scenesHost: David KarstenContent creator: Alex FootProducer and Recordist: Emilia JolakoskaSocial Media: Amy HoskingExecutive Producers: Anita ShoreFirst Nations AcknowledgementCurtin University acknowledges the traditional owners of the land on which Curtin Perth is located, the Whadjuk people of the Nyungar Nation, and on Curtin Kalgoorlie, the Wongutha people of the North-Eastern Goldfields; and the First Nations peoples on all Curtin locations.MusicOKAY by 13ounce Creative Commons — Attribution-ShareAlike 3.0 Unported — CC BY-SA 3.0 Music promoted by Audio Library.Curtin University supports academic freedom of speech. The views expressed in The Future Of podcast may not reflect those of Curtin University.
TW/CW: Su*cideIn April of 2009, Boston police detectives were hot on the trail of a killer who had robbed women at gunpoint before. He was escalating and they needed to stop him, but with very few forensic clues, they faced a brick wall...until they discovered that the killer found his victim on Craigslist. They had to use cyber forensics to trace his digital steps to catch him before he could kill again. But how did cyber forensics start? With a man named Clifford Stoll at the Berkley Lawrence Lab in California in 1986 when he noticed that some money, seventy five cents to be precise, was missing from the accounting system. Following clues left by the 'thief' he uncovered actual espionage and is the reason we have cyber forensics today! Discord, merch, Tarot readings, star charts, patreon, kofi and much more right here: https://linktr.ee/cruelteaContact Lillian: lillianasterios@icloud.com (for questions, tarot readings, art commissions and more!)Do you own a small business? Would you like for us to feature your business on our podcast? Please contact Lillian for more information!It's Lil and Merris's TEN YEAR ANNIVERSARY! Show some love (if you can, of course
Welcome to the daily304 – your window into Wonderful, Almost Heaven, West Virginia. Today is Wednesday, May 24 Did you know the Appalachian Trail runs through two parts of WV? Tourism has the scoop, along with what to see and do while you're hiking…learn more about Marshall's cyber forensics and security program…and grab your kilts for the WV Wild and Wonderful Celtic Festival and Highlands Games next month…on today's daily304. #1 – From WV TOURISM – Stretching from Georgia to Maine, the Appalachian Trail spans through 14 states and leads hikers alongside 2,200 miles of rugged terrain surrounded by astounding beauty all the way. Completing the trail is a daunting task and takes an average of 4 to 6 months to complete. However, The Mountain State is the perfect place for those looking to explore a portion of this nationally known wonder. The historic town of Harpers Ferry is home to four miles of the Appalachian Trail as well as the conservancy – the trail's headquarters. Stop by the Visitor's Center to pick up resources such as guides and maps, shop souvenirs and learn more about the perfect day-hikes available. A portion of this famous footpath also weaves in and out of southern West Virginia for about 20 miles along the Virginia border in Monroe County. The trail can be accessed along the crest of Peters Mountain by hiking up Groundhog Trail from Sugar Camp Farm. Learn more: https://wvtourism.com/how-to-hike-the-appalachian-trail-in-west-virginia/ #2 – From MARSHALL UNIVERSITY – Looking for an interesting and rewarding career? The Cyber Forensics and Security program at Marshall University gives a well-rounded learning experience that provides students with the best of both cyber forensics and the cyber security world. Students will gain hands-on experience with forensic collection techniques and evidence processing and be exposed to the world of testifying from the forensics aspect of the curriculum, while the security side provides students with the tools they need to do network analysis and defense, penetration testing, and open-source intelligence. The CFS program aims to provide students with a 50/50 split across the two fields to create the “Swiss Army Knife” student post-graduation. The Cyber Forensics and Security program actively seeks to create lasting collaborative efforts between Marshall and outside organizations, whether that be non-profits, private organizations, or local/state/federal agencies. Our collaboration efforts thus far have provided our students with access to high-end virtual cyber ranges, opportunities to support investigations worldwide, and funding for research and assistantships. Learn more: https://www.marshall.edu/cfs/prospective-students/ #3 – From WBOY-TV – The West Virginia Wild and Wonderful Celtic Festival and Highland Games is set to kick off June 17 for the first time at 4H Camp Pioneer in Beverly. Clan Ferguson is carrying on the tradition to educate and share the Scottish and Celtic heritage along with its traditions, values, and qualities from the past relating to the history of Celtic heritage found in the state. The festival will feature Highland Games that will be sanctioned by the Mid-Atlantic Scottish Athletics. “Young or old, Celtic or not, the festival is quite enjoyable for anybody, especially people of Celtic heritage. If they have some kind of lineage they can go to the clan tents, they can probably do some research on their ancestry and heritage,” Timothy Ferguson, President of the WV Wild and Wonderful Celtic Festival said. “The highland games is a great thing to witness, it is a very serious competition.” Read more: https://www.wboy.com/news/harrison/wv-wild-and-wonderful-celtic-festival-showcases-scottish-and-celtic-heritage/ Find these stories and more at wv.gov/daily304. The daily304 curated news and information is brought to you by the West Virginia Department of Commerce: Sharing the wealth, beauty and opportunity in West Virginia with the world. Follow the daily304 on Facebook, Twitter and Instagram @daily304. Or find us online at wv.gov and just click the daily304 logo. That's all for now. Take care. Be safe. Get outside and enjoy all the opportunity West Virginia has to offer.
Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist
Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
Brett's corner of the internet: https://bio.link/brettshavers Brett's website: https://BrettShavers.com Brett's books: https://brettshavers.com/my-books
This week on Hacker And The Fed we sit down with Bill Gardner, professor and Chair Department of Cyber Forensics & Security at Marshall University. Bill offers insight into the professional and academic path into the industry and the future of cybersecurity. Links from the episode: Follow Bill Gardner: Twitter: https://twitter.com/oncee Linkedin: https://www.linkedin.com/in/304blogs/ Marshall University Prospective Students Two papers written by Bill Gardner “I Did What I Believe Is Right”: A Study of Neutralizations among Anonymous Operation Participants Social Engineering in Non-Linear Warfare Support this episode's sponsors: Drata: Get 10% off and waived implementation fees at drata.com/partner/hacker-fed DeleteMe: Visit JoinDeleteMe.com/FED and use promo code: FED20 -- For more information on Chris and his current work visit naxo.com Follow Hector @hxmonsegur
In this episode we will look into: What strategy can you use to generate leads to a new website. You can use Search Engine optimization (a.k.a. SEO) to build visibility in search engines so that your website generates leads and increses your revenue. Sponsor of this Episode: Econry is an international training academy focused on innovative subjects. Companies, government employees and students use this to upskill their talents. In Germany the department of labour sponsers courses for unemployed. In other countries there are other options to help finance this additional education. Econry also cooperates with several universities and academies focused on other complementary niches. You might ask what econry focuses on. With AI being an important element of business, econry is looking to provide knowledge where this technology is relevant. Hence, this also applies to marketing, sales and even cyber security. Any company pumping marketing content into the inernet space needs to ensure that customer data is safely transmitted and stored. If this is poorly done, the trust will be lost and any great sales person will have difficulty convincing a buyer that they are safe with you. You can take courses from Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. Most of the courses are streamed live but some are also available at on demand video in combination with live workshops. If you want to learn a subject properly you need some level of human help. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Entrepreneurs differ from small business owners by the way they invest their profits back into the company. Based on this narrative we will look at Why you need to use Twitter blue to get new qualified leads. Generating leads does not automatically mean that you spam peoples inboxes. This insane strategy is the general BS that some Sales Gurus try to tell you to do. That will not get you to a sustainable level of revenue. Find out how to do it properly on Twitter and linkedin. Sponsor of this Episode: Econry is an international training academy focused on innovative subjects. Companies, government employees and students use this to upskill their talents. In Germany the department of labour sponsers courses for unemployed. In other countries there are other options to help finance this additional education. Econry also cooperates with several universities and academies focused on other complementary niches. You might ask what econry focuses on. With AI being an important element of business, econry is looking to provide knowledge where this technology is relevant. Hence, this also applies to marketing, sales and even cyber security. Any company pumping marketing content into the internet space needs to ensure that customer data is safely transmitted and stored. If this is poorly done, the trust will be lost and any great sales person will have difficulty convincing a buyer that they are safe with you. You can take courses from Neural Networks to Multi-plattform development (.NET MAUI), Cyber Security, SEO and HR Retention. Most of the courses are streamed live but some are also available at on demand video in combination with live workshops. If you want to learn a subject properly you need some level of human help. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Topic of this podcast: The new model for transforming customer acquisition with the intersection between paid search [Value-based bidding & automation], data science, and performance creative at scale. Who is today's guest? Paris Childress is an Ex-Googler, the CEO & Founder of Hop-Online, and the host of the Paris Talks Marketing Podcast. Paris has grown the agency to a highly recognized and awarded global performance marketing agency. Today, Hop Online is a Premium Google Partner Agency, managing over $20 million in annual performance advertising spend across Google and Facebook. You can find Paris Childress here at LinkedIn: https://www.linkedin.com/in/parischildress/ Sponsor of this Episode: Econry is an innovative training academy focused on innovative subjects. From Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
Topic of this podcast: The new model for transforming customer acquisition with the intersection between paid search [Value-based bidding & automation], data science, and performance creative at scale. Who is today's guest? Paris Childress is an Ex-Googler, the CEO & Founder of Hop-Online, and the host of the Paris Talks Marketing Podcast. Paris has grown the agency to a highly recognized and awarded global performance marketing agency. Today, Hop Online is a Premium Google Partner Agency, managing over $20 million in annual performance advertising spend across Google and Facebook. You can find Paris Childress here at LinkedIn: https://www.linkedin.com/in/parischildress/ Sponsor of this Episode: Econry is an innovative training academy focused on innovative subjects. From Neural Networks to Multi-plattform development, Cyber Security, SEO and HR Retention. As a global education provider, econry is a partner of selected universities and manufacturers. Thereby increasing the career options for people with and without a university degree. Who is actually on the Team of econry? The founders and trainers are experts in their particular niche. Christian, the leading founder is an expert in Cyber Forensics, New Business Development and Multi-Channel Market Entry Strategies (SEO, SEM, Coldcall, , while leading companies in 4 countries. Deniz, is a Researcher and University Professor focused on AI, VR, VX and Online Marketing. Eren is a cyber security and virtualisation expert, who has worked on google VR projects. Neylan is an expert in HR, Recruiting and leads several train-the-trainer programs to improve the quality of educators. Econry.de itself is the education section of ACATO GmbH, which is a Vodafone Enterprise Partner, Member of the Dell Expert Network and Partner of several Software and hardware manufacturers. This also includes SEO / marketing tools and automation solutions, e.g. keap / infusionsoft, memberium, TechSmith, ... Hence, people looking for a new career path have access to a wide variety of specialized knowledge from the founders and the trainers who also help educate more people in different languages. Some o the upcoming courses will include the "Digital Business Growth Expert" which is a combination of Search Engine Optimization Training and Branded Marketing Strategist.
While cybercrime is relatively new, criminals tend to organize themselves in traditional ways. Vincent D'Agostino, Head of Cyber Forensics and Incident Response at BlueVoyant, has had plenty of experience with traditional organized crime during his time at the FBI which has given him insights into his current work in cybercrime. That experience and those insights make him a perfect guest for The Cyber Crime Lab Podcast. Vincent and host Andy Anderson discuss: that cybercrime crews, like businesses, have niches, and hence no business is entirely safe from attack the hierarchy and “outsourcing” methods used by some of the top-level cybercrime organizations how and why criminals are “early adopters” of the newest technology and software You'll also hear how geopolitics and US federal law factor into how ransomware is deployed and paid for (or sometimes not). The Cyber Crime Lab Podcast is brought to you by DataStream Insurance When the worst happens, you want the best financial, legal, and technical support to get you back up and running again. With Cyber Insurance from DataStream, we offer the most comprehensive insurance coverage on the market alongside critical post-incident customer support — all for the price of a cup or two of coffee each day. Make DataStream part of your business continuity plans today. Book a meeting with us at datastreaminsurance.com
Welcome to the Cyber Security Happy Hour Podcast. Host: Christie Topic: Cyber Forensics What is Computer Forensics? Examples of Cyber Forensics? Forensics Procedures Types of computer forensics Skills and Knowledge required to become a Cyber Forensics Examiner. Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ This is Cyber and Information Security Podcast - do not forget to protect your data in transit and maintain your privacy by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/ Do not forget to subscribe to the podcast so you never miss an episode. Email: podcast@intexit.co.uk Website: https://intexit.co.uk
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Gary Warner, Director of Research in Computer Forensics' for the University of Alabama at Birmingham (UAB) and the Director of Threat Intelligence for DarkTower. From his LinkedIn bio, “Gary is the ‘Director of Research in Computer Forensics' for the University of Alabama at Birmingham (UAB). In this role, which brings together the Computer Science and Criminal Justice departments, he is concentrating on research that will help law enforcement and other security professionals to identify, apprehend, prosecute and convict those who are committing cybercrime, and spread information to victims and potential victims about cybercrime issues. 90 analysts and programmers work in the UAB Computer Forensics Lab building tools and providing intelligence for a variety of clients around Cybercrime, Fraud, and Terrorism, as well as the Social Media aspects of more traditional crimes, including Gang Activity and Transnational Drug Networks. In addition to his duties at UAB, Warner serves as the Director of Threat Intelligence for DarkTower, a subsidiary of Queen Associates in Charlotte, North Carolina. Gary Warner was the founding president of the Birmingham InfraGard chapter, and has served as secretary and member of the board of the InfraGard National Members Alliance, among other roles. Read more on LinkedIn. Gary on Twitter: @GarWarner. Gary's blog: CyberCrime & Doing Time; A Blog about Cyber Crime and related Justice issues. “Malware analysis is a team sport” – Gary Warner, on information sharing, during our podcast recording In the discussion we address: • Gary's backstory and the work he's doing today • Information sharing and the value of plugging into information sharing communities • The great work being done by the FBI and CISA • The importance of knowing your competition, China, Russia, and ongoing threats • Some of Gary's go-to resources • Gary talks about haikus, Talking Heads, GarBot, birdwatching, and more! “CISA, it's a new era of info sharing in the government” before giving some shout outs to CISA's first Director, Chris Krebs, and current Director, Jen Easterly A few references mentioned in or relevant to our discussion include: • CISA's Known Exploited Vulnerabilities Catalog (KEVC), something Gate 15's Jen Walker raves about often, including in our recent Risk Roundtable: The Risk Roundtable EP 27: Don't let bias guide your preparedness (07 Mar 22). https://www.cisa.gov/known-exploited-vulnerabilities-catalog • Gary discussed this event: Justice Department Announces Court-Authorized Effort to Disrupt Exploitation of Microsoft Exchange Server Vulnerabilities (13 Apr 21) https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-effort-disrupt-exploitation-microsoft-exchange • BITNET https://bit.net • FBI SENTINEL System https://www.fbi.gov/services/information-management/foipa/privacy-impact-assessments/sentinel • Intellipedia https://en.wikipedia.org/wiki/Intellipedia • REN-ISAC https://www.ren-isac.net • Gary's four CISA “must watch” sites from the CISA cyber landing page: o Current activity: https://www.cisa.gov/uscert/ncas/current-activity o Alerts: https://www.cisa.gov/uscert/ncas/alerts o Bulletins: https://www.cisa.gov/uscert/ncas/bulletins o Analysis: https://www.cisa.gov/uscert/ncas/analysis-reports • Gary strongly encouraged listeners to check CISA Director Jen Easterly's “about” section in her LinkedIn profile to understand why she is so excellently qualified to be the woman leading CISA today (something Chris Krebs, her predecessor at CISA agrees with)
In this episode of the Simple Cyber podcast, Chris Lawley, our CCO, and our Co-Founder & CEO Robert Potter, discuss the new approach to cyber forensics and intelligence analysis that Internet 2.0 is pioneering. This episode focuses on how diversity of skills, experience, and domain knowledge can improve the functions of a team, and how this collective thinking approach helped uncover one of the more significant discoveries from Internet 2.0 in recent memory; the 'unusual levels' of PCR procurement in Wuhan. After listening in, you can get more information on the report discussed by visiting here to download the full report.
Ep:099 Award-winning author, C. L. Brees, was born and raised in rural Indiana, a place where the environment was a bit too restrictive to contain his overactive imagination. He needed a place where he could expand his horizons. In 2011, after relocating to Maryland, he followed his passion for forensics and law enforcement and enrolled at the University of Baltimore. Four years later he earned not only a B.S. in Police Studies but also an M.S. in Cyber Forensics.C.L. Brees WebsiteC.L. Brees Amazon Author PageC.L. Brees on FacebookMurder Most Lovely by Hank Edwards and Deanna WadsworthCash Out by Marshall ThorntonThe Postscript Murders by Elly GriffithsPaul Rudd Video of the WeekHistory Briefs Podcastbradshreve.comRequeered Tales.com
This week the Mat and Mike welcome Dr. Marcus Rogers from Purdue University to the show. They discuss cybercrime and cyber forensics, the Purdue High Tech Crimes Unit, and why Johnny Mnemonic is required viewing in Dr. Rogers' class.-------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu
Lam Nguyen, Director of the Cyber Forensics Laboratory at the US Department of Defense, tells Tonya Hall how the lab protocols were safeguarded when the pandemic forced them to telework. Learn more about your ad choices. Visit megaphone.fm/adchoices
Lam Nguyen, Director of the Cyber Forensics Laboratory at the US Department of Defense, tells Tonya Hall how smart cars are an endless source of forensic data during criminal investigations. Learn more about your ad choices. Visit megaphone.fm/adchoices
All of his books are available here: https://amzn.to/3pJ3CHPwebsite: https://www.fredericklane.com/Sponsors:https://mybookie.com Promo Code minddoghttps://record.webpartners.co/_6_DFqqtZcLQWqcfzuvZcQGNd7ZgqdRLk/1https://apply.fundwise.com/minddoghttps://myvitalc.com/minddog. promo code minddogtvhttps://skillbuilder.academy/dashboard?view_sequence=1601856764231x540742189759856640&promoCode=MINDDOG30OFF
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
Richard Stiennon, leading author and analyst, speaks with Mark Rasch, well-known attorney, on the charges against Joe Sullivan, former Uber CSO. With more than 30 years of experience in cybersecurity and data privacy – including within the U.S. Department of Justice, where he created the DOJ Computer Crime Unit and Cyber-Forensics practice, Mark discusses the implications and what it could mean for CSOs and CISOs.
Welcome to Episode 28 of The Main Thing Podcast and another dose of wisdom! I'm your host, Skip Lineberg, and today I am thrilled to introduce you to my special guest, Bill Gardner. Bill is an Assistant Professor at Marshall University, in Huntington, West Virginia, where he teaches in the Cyber Forensics and Security Degree Programs. Prior to joining the faculty at Marshall Univ., Bill co-founded the SecureWV/Hack3rCon cyber security conference. He also helped to start 304geeks, a non-profit technology organization based in Charleston, WV. Bill Gardner is an active member of the cyber security community and has spoken at a number of professional conferences including AIDE, DerbyCon and Shmoocon. He has co-authored two books: "Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats" and “Google Hacking For Penetration Testers.” He has also written a number of academic & non-academic journal articles. Get ready! Over the next 9-minutes you will discover why Bill Gardner is, without a doubt, one of the wisest people I know. Connect Bill Gardner on LinkedIn Free Poster! Thank you for being a loyal listener! Here's your link to download your free poster. It's a professionally designed work of art, emblazoned with the core wisdom lessons from our first seven guests in Season One. Credits Graphic Designer Emma Malinoski Editor and Technical Advisor Bob Hotchkiss Want to Help Support the Growth of this Podcast? Become a subscriber. Share the podcast with one or two friends. Buy some Main Thing Merch from our Merchandise Store. Become a patron of the show and consider supporting us on Patreon with a nominal, goodwill monetary donation.
How does an organization know which security controls, applications, or programs to implement, when everything is a threat and every system is vulnerable? Looking at cybersecurity through a risk management lens is one way of reducing the noise of the threat environment. This presentation will discuss why having a Cyber Risk Management (CRM) program is a critical piece to an effective cybersecurity program. This presentation discuss the various Cyber Risk Management frameworks, the building blocks of an effective CRM program, regulatory & standards bodies driving cyber-risk management, metrics, CRM life cycle, and finally, how CRM fits into the overall Enterprise Risk Management program. At the end of the presentation the attendees will have the building blocks to start building a Cyber Risk Management program in their organizations. Additionally, this presentation will look at a few case studies through the cyber risk lens and how a CRM program would have aided in identifying those issues and risks. About the speaker: Nick Sturgeon currently serves as a Director of Information Security for IU Health and IU School of Medicine. His responsibilities include supporting the IU School of Medicine cyber risk management program and leading IU Health's Security Research & Red Team. Nick has worked in Information Technology for over 15 years, with 10 years in Cybersecurity, nine years in Law Enforcement, and 10 years in State Government. Nick earned his Bachelor of Science in Management Information Systems from Indiana State in 2003 and a Master of Science in Cyber Forensics from Purdue 2015. Nick has extensive experience in incident response, digital investigations, criminal investigations, digital media recovery, criminal law, data governance, end point protection, network & log analysis, vulnerability management, security operations, incident management, project management, as an instructor, and service implementation of managed security services. Throughout his career he has supported multiple industries and sectors including, academia, StateLocalTribalTerritorial (SLTT) Governments, healthcare, Information Technology and manufacturing. In addition to his current duties, Nick is a host on two podcasts, is a part time Information Security Instructor at UTSA and Adjunct Professor at the University of Southern Indiana. He also serves as a board member for the Cyber Resilience Institute, Ohio River valley Chapter of the Cloud Security Alliance, and the National Council of Registered ISAOs.
In this episode, Susan speaks with Dr. Scott Belshaw, Director of the Cyber Forensics Lab at UNT, and Lab Research Assistant, Lorrin Underwood. They explain the Dark Web, which is a difficult-to-access region of the internet where many users conduct illegal business and bypass the censorship measures of repressive governments. They also discuss the Lab's role in developing cybersecurity tools for the military and law enforcement, as well as a wand they’ve developed to help merchants detect “skimmers” that may be stealing their customers’ credit card information. Finally, they share a preview of Dr. Belshaw's forthcoming book, Dark Web Unfiltered. Follow the UNT Cyber Forensics Lab Twitter account: @UNTcyberlab. For more information about OLLI at UNT, please visit our website, https://olli.unt.edu/, or send an email to olli@unt.edu.
With the rise of cybercrime comes the need for cyber forensics, and this episode’s guest, Dr. LeGrande Gardner has been in the field of digital evidence for more than 30 years. Currently, he is an instructor in the Criminology Department at the University of South Florida, where he also serves as the Director of the MS in Cybercrime degree program and administrates the Graduate Certificate Program in Digital Forensics. Co-hosts Bill McQueen and Ernie Ferraresso joined Dr. Gardner for a discussion about digital evidence, its role in the justice community, and opportunities for the future. The field of cyber forensics started rather simply, as a way to detect and connect the pieces of a crime. As evidence was being submitted into the justice system, a need for increased scientific methodologies and protocols grew to preserve legal integrity and the rights of the accused. Cyber forensic professionals are able to examine a range of devices, networks--even the cloud--to uncover criminal activity and gather evidence that can lead to legal prosecution. Dr. Gardner discusses how advances in computer science have made an impact in the ability to locate criminals. In his first example, he shares how hash algorithms are used to catch pedophiles and provide a digital footprint to catch larger pedophile rings. Next, he details the Target breach, where criminals were able to hack the nationwide retailer via their air conditioning’s computerized system. Then, he talks about how search warrants involving cybercrime uncovered how criminals were using their neighbor’s open IP addresses, putting routers unknowingly in their attics, and other deviousness that thwarted detection and capture. Unfortunately, Dr. Gardner reveals, international criminals are even more elusive, but that having solid cyber forensics can help law enforcement agencies from multiple countries coordinate efforts.Cyber forensics now has several sub-specialties, such as cloud forensics, network forensics, malware forensics, IoT forensics, and vehicle forensics. Many colleges and universities are developing programs and training around these expanding and evolving sub-specialties. Dr. Gardner points out that this is a great time to be a cybercriminal and there will be an increased need for cyber forensic technicians and digital evidence specialists to combat the widespread crime. There is a push for law enforcement officers to receive training in cyber forensics to facilitate crime scene collections, recognize patterns, and maintain protocols. Dr. Gardner’s history in law enforcement and as a Task Force Agent with the FBI’s Cyber Crime Unit gave him a special insight to device and data collection at crime scenes and he shares his thoughts on training opportunities in police academies. Hackers and cyber criminals aren’t the only reasons the field of cyber forensics is growing. Corporations are also employing their own forensic teams. Companies use digital evidence to substantiate their security and to protect themselves if a situation with an employee requires documentation. Civil matters are increasingly including digital evidence, and professionals are being called upon to provide expert testimony.The need for cyber forensics professionals is growing exponentially, according to Dr. Gardner. There is no end in sight for the potential of this field and the importance it will play in protecting our security and stopping crime.TIME STAMPS00:43 Meet Our New Co-host: Ernie Ferraresso, Associate Program Director of Cyber Florida02:43 Who is Dr. LeGrande Gardner, Director of the MS in Cybercrime Degree Program, University of South Florida03:15 What is Cyber Forensics and Digital Evidence?04:47 Recognizing the field of Cyber Forensics05:59 Following the Rules of Evidence and Procedure06:33 The Growing Impact of Digital Evidence and Digital Exploitation 07:35 Evolving Field of Cyber Forensic Careers08:58 Collecting Cyber Forensic Data 09:51 Digital Evidence as a Science12:52 Components of Digital Evidence13:45 Hash Algorithms, Digital DNA14:25 Child Pornography Hash Algorithms14:55 Hash Algorithms are like Fingerprints 16:37 Verifying and Preserving Digital Evidence Using Scientific Protocols18:29 Training to be a Cyber Forensic Technician or Specialists21:34 Specialized Cyber Forensic Fields24:01 Criminals, Digital Evidence & Law Enforcement26:30 Training Law Enforcement for Digital Evidence Collection28:24 Finding Breaches and Identifying Vulnerabilities31:00 How to Start a Cyber Forensic Investigation31:29 Cyber Forensic Incident Response34:38 Cyber Police of the Future35:35 Trends in Cyber Forensic Prosecutions37:05 International Cyber Criminals and Cyber Forensics38:19 Every Cop as a Cyber Cop38:39 How is Cybercrime Changing 41:26 The Future of the Cyber Forensic Field42:24 Corporate Digital Forensic Units and Civil Courts44:43 Cyber Forensic Academics, Digital Certifications and Careers
Former Secret Service Agent, Computer Forensic Expert, and founder of the security company Cyber Forensics, Gus Dimitrelos appears on Episode #103 of Task Force 7 Radio to talk to our audience about real life scenarios where Cyber Forensic Investigations have determined the outcome of trials where the defendants have been accused of some of the most heinous crimes. Listen as Dimitrelos describes the importance of computer forensics, cellular triangulation, and cell phone forensics in proving, and in some cases disproving, allegations of kidnapping, aggravated assault, murder, and acts of terrorism. Dimitrelos also gives his view on the privacy vs. security debate around cell phone encryption technology, what Apple is doing to thwart authorities from conducting forensics on their phones, and whats more secure: Apple IOS or Windows operating systems. All this and much, much more on Episode #103 of Task Force 7 Radio - the Voice of Cyber Security.
Learn about research that is shaping global policies for digital forensics and redefining what is possible in cyber investigations. How do the latest solid state drives and cloud computing effect evidence recovery? How do criminologists profile online predators and understand the effects of social networking in criminal behavior?
In this episode, August talks with one of the world's foremost experts in Cyber Forensics. Bryan Neumeister, head of USA Forensic, helps law enforcement, government agencies and the legal system. He can find erased information on cell phones--your bank accounts, exactly where you've been, the passwords to all your accounts and so much more. He can do the same with your laptop, as well as pick out a single voice in a crowded airport and help identify people on grainy video footage. Bryan and August talk about the best ways for you to keep your online information private and give you Bryan's top 7 tips to protect yourself and your family.
Cybersecurity threats are constantly evolving and becoming more sophisticated. This has been observed through advanced spear phishing campaigns, increase in ransomware families/variants and the use of IoT devices for DDOS attacks. As well, the tactics, techniques and procedures (TTPs) utilize by bad actors are evolving with the technology and seemingly staying one step ahead of security technologies. This presentation will look at some of the trends from the past year and look at the emerging cyber threats for 2017 and beyond. About the speaker: Nick Sturgeon is the Manager of the Indiana Information Sharing and Analysis Center (IN-ISAC) and the Security Operations Center (SOC). As the Manager of the IN-ISAC, Nick is responsible for overall strategic planning, budget planning, project oversite, and ensures all efforts are focused on achieving the IN-ISAC's mission. Nick also provides management and oversight of the IN-ISAC's Security Awareness and Training program, as well as direction on IN-ISAC/SOC policy and procedure development. As the SOC Manager, Nick is responsible for all day to day operations of the SOC. Additionally, Nick serves as the Deputy Director for Cyber for the Indiana Intelligence Fusion Center (IIFC). As the Deputy Director for Cyber, Nick is responsible for developing and distributing cyber threat information to multiple sectors. Nick is actively involved with the Information Sharing and Analysis Organization's Standards Organization's (ISAO-SO), were he serves as a co-lead for Working Group 4 and is a member of three other ISAO-SO Working Groups. Before joining the Indiana Office of Technology, Nick spent eight years with the Indiana State Police serving various roles. Nick held ranks of Trooper, Sergeant and First Sergeant. His last assignment was in the Criminal Justice Data Division and serving as the Assistant Commander of the Information Technology Section. Nick earned a B.S. in Management Information Systems from Indiana State University 2003, and a M.S. with a specialization in Cyber Forensics from Purdue University in 2015.
The Indiana Information Sharing and Analysis Center (IN-ISAC) is an entity developed by the State of Indiana and key partners to mitigate cybersecurity risks for the State of Indiana. The IN-ISAC will accomplish this through sharing threat information and collaborating with the public, private industry, local government and other governmental agencies. About the speaker: Nick Sturgeon is the Manager of the Indiana Information Sharing and Analysis Center (IN-ISAC) and the Security Operations Center (SOC). As the Manager of the IN-ISAC, Nick is responsible for overall strategic planning, budget planning, project oversite, and ensures all efforts are focused on achieving the IN-ISAC's mission. Nick also provides management and oversight of the IN-ISAC's Security Awareness and Training program as well as direction on IN-ISAC/SOC policy and procedure development. As the SOC Manager, Nick is responsible for all day to day operations of the SOC. Nick is also involved with two Crit-Ex working groups and the State of Indiana Cybersecurity Coordination group. Nick also serves as the Deputy Director for Cyber Intelligence for the Indiana Intelligence Fusion Center (IIFC). Before joining the Indiana Office of Technology, Nick spent eight years with the Indiana State Police serving various roles. Nick held ranks of Trooper, Sergeant and First Sergeant. His last assignment was in the Criminal Justice Data Division and serving as the Assistant Commander of the Information Technology Section. Nick earned a B.S. in Management Information Systems from Indiana State University, and a M.S. with a specialization in Cyber Forensics from Purdue University.
This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
Barry Lewis concludes his introduction to Cyber Forensics, with specific implementation examples.Pubcast Episode 142160;Download the160;160;Full Audio Fileaudiohttp://www.discussit.co.za/_media/_audio/itsp/Pubcast_Episode_143.mp3/a...
Barry Lewis provides an introduction to Cyber Forensics, leading in with five principles: - Do no harm; - Use copies (never originals); - Establish and maintain an audit trail; - Ensure other parties can replicate your work; and - Always ...
In our ever connected society, security has become an essential component for all facets of life. Businesses, government, academics, and individually, all facets have a need to protect and secure technology. Over the past 5-10 years, the demand for cyber security professionals has significantly increased. According to the Bureau of Labor Statistics, employment for Cyber Security Specialists is expected to increase much faster than the average career over the course of the next 10 years. Despite the growing demand, women represent an alarmingly low percentage. This can be demonstrated in nearly any university's technology courses. Cyber security especially is highly male-dominated. Research shows that having a balance of male and female perspectives facilitates diverse and creative innovation and problem solving, within the ever changing realm of cyber security.The NSF SFS funded Broadening Participation of Women in Cybersecurity Project, which aims to build a movement towards diversifying Cyber Security. The program put on the Women in Cyber Security Conference (WiCyS), in Nashville, TN, April 11-12. I will discuss my experience at this conference. I will also discuss takeaways from this conference, and important information for anyone interested in pursuing a career in this ever evolving and highly demanded field. About the speaker: Rachel Sitarz is a PhD student in Cyber Forensics at Purdue University. She studies under the guidance of Dr. Marcus Rogers. She obtained her Master degree in Cyber Forensics in 2010 from Purdue University. She received her undergraduate degrees in Law and Society, Psychology and Forensics in 2007 from Purdue University. Over the past three years, while being a full-time student, Rachel worked full-time for the Indiana State Police, as a Criminal Intelligence Analyst, on the Internet Crimes Against Children Task Force. Currently, Rachel works for the IT Security and Policy section at Purdue, where she builds analytical products from the current threats that are seen on the Purdue network. Rachel is also an Adjunct Professor, teaching Research Methods. Rachel's area of research interest is on the psychological and behavioral analysis of cyber criminals. She aims to understand the user behind the crime. How they are behaving, what programs they are using to facilitate their crimes, how do they engage with other criminals, are among many of her areas of study.
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducted research indicates the evidence found on older file structures, such as Windows XP, as well as outdated versions of Yahoo! Messenger. Several differences were found within the Yahoo Messenger's registry keys and directory structure on Windows Vista and Windows 7 as compared to Windows XP. About the speaker: Final year PhD student in Cyber Forensics in College of Technology. Completed my under graduate studies in India in Electronics and Telecommunications Engineering. Completed my Masters from Oklahoma State University in Telecommunications Management. Got interested in the filed of Digital Forensics in my last semester at Oklahoma State University after taking a course in Digital Forensics. Area of interest is social networking in teens, forensic investigation.