POPULARITY
Jessica Hyde from Hexordia joins the Forensic Focus Podcast to discuss her unique journey from Marine Corps avionics technician to digital forensics expert. Jessica shares how her military background provided transferable skills for forensic investigations, emphasizing the importance of documentation, troubleshooting, and diverse perspectives in finding truth in digital evidence. The conversation explores critical topics including IoT forensics challenges, the urgent need for timely data acquisition before evidence degrades, and the role of AI in forensic analysis. Jessica also discusses her experience teaching at George Mason University since 2016, how students' questions enhance her own knowledge, and why interdisciplinary teams create better forensic outcomes. With candid reflections on maintaining perspective while handling difficult cases and thoughts on the future challenges of policy and law keeping pace with technology, this episode offers valuable insights for both seasoned professionals and those new to digital forensics. #DigitalForensics #MobileForensics #CyberInvestigation #DFIR #AI 00:00 Introduction and Guest Welcome 01:02 Jessica Hyde's Unique Career Path 03:06 Transition to Digital Forensics 13:17 Teaching and Learning in Digital Forensics 20:12 Hands-On Forensics and IoT Devices 24:19 The Importance of Interdisciplinary Teams 27:12 Humor and Levity in Forensics 29:38 The Role of Cyber Investigators 31:07 Bias in Cyber Investigations 32:01 Generational Perspectives in Technology 33:51 Privacy Concerns in Digital Forensics 36:53 The Importance of Timely Data Acquisition 44:28 Challenges with AI in Digital Forensics 54:42 Policy and Legal Challenges in Digital Forensics 56:56 Conclusion and Final Thoughts Show Notes Hexordia - https://www.hexordia.com George Mason University - https://dfor.gmu.edu/person/jessica-l-hyde SWGDE - https://www.swgde.org
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs
Black Hat, the cybersecurity industry's most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.Briefings highlights include:● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon● WorstFit: Unveiling Hidden Transformers in Windows ANSI!Trainings highlights include:● Assessing and Exploiting Control Systems and IIoT [4105]● Fundamentals of Cyber Investigations and Human Intelligence [2111]● Attacking DevOps Pipelines [2108]● Offensive Mobile Reversing and Exploitation [4108]● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:● Campus as a Living Lab: An Open-World Hacking Environment● Pandora: Exploit Password Management Software To Obtain Credential From Memory● Morion - A Tool for Experimenting with Symbolic Execution on Real-World BinariesFor registration and additional information on Black Hat Europe 2024, please visit www.blackhat.com/eu-24Note: This story contains promotional content. Learn more.ResourcesPress Release: https://www.blackhat.com/html/press/2024-11-06.htmlCatch all of our On Location Stories: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs
A.I.- generated deepfakes are spreading across Canada, and disturbingly is helping to fuel child exploitation and pornography...can this wave be slowed? To get a better handle on this issue, host Alex Pierson is joined by Bill McGarry, the director of Cyber Investigations for Investivative Solutions Network Inc. (ISN) who also served as a Toronto Police officer for over 30 years. Bill breaks down to Alex just how fast the technology is advancing, and tactics police are using to attempt to keep up. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also involves ensuring clear communication protocols and conducting regular training and testing. I'll explore preparation from the perspective of the investigation life cycle, where success is the reward for preparation. Join me as I uncover the importance of preparation in incident response and how it lays the foundation for success in investigations.
Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Following his keynote speech at MENA Information Security Conference 2023, Senior Managing Director and former FBI Special Agent Ted Theisen, speaks with Kajen Subramoney in the latest edition of The Cyber Series. In this episode, they discuss the development of the cybersecurity sector and the evolution of the cyber threat landscape throughout their careers. Ted shares his insights on his top three points on what people should have front of mind when considering their approach to cybersecurity: Be flexible.Plan as if you are being attacked.Look outside of your organization.
Chris Bullock is the Founder, CEO, and Managing Member of Cyber Investigations and Intelligence Agency (CI2A), a company that provides world-class cybersecurity and cybercrime solution services. He is also an award-winning chief information security officer and a decorated law enforcement veteran. As a leader and program builder, Chris has built and managed several successful cybersecurity programs at large and small organizations across many business verticals and governments. He holds multiple certifications including Certified Information Systems Security Professional (CISSP) and Certified Cybercrime Examiner (CCCE). Chris frequently speaks at major security conferences and writes articles on cybersecurity, and in 2012, he was voted “85th Top Ranking CISO in the US.” In this episode… Open-source intelligence has provided public access to personal information on the internet, allowing hackers to compromise anyone's digital profile. With technology becoming increasingly pervasive in our daily lives, what steps can you take to reduce your digital footprint? According to Chris Bullock, attackers can steal data from your personal devices to be exchanged on the dark web. Most users aren't aware that seemingly mundane settings on these devices can collect and release your data. To prevent unwanted attacks, Chris recommends disabling location services, photo, and microphone access for all apps and deactivating the auto-join feature for Wi-Fi and Hotspots. In today's episode of She Said Privacy/He Said Security, Jodi and Justin Daniels welcome Chris Bullock, Founder, CEO, and Managing Member of CI2A, to discuss tips for protecting your digital profile. Chris also explains open-source intelligence, the impact of privacy laws on data security, and how security attacks against high-profile individuals have evolved.
In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.
Hackers and scammers have declared war on all of us and right now, they are winning. Nicole Vowell, a former news reporter who covered scams for nearly 10 years, was recently taken for $13,000 in an online scam. She joins the show. Chris Swecker, former head of the FBI
This week, Mat and Mike welcome Ken Graf from the U.S. Secret Service to chat about BIG10 sports, global credit card rings, and the Secret Service's connection to Lincoln. -------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu
The BlackMatter ransomware gang says that it's retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn't exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/212
Mike Snader is the Associate Director of Cyber Investigations at Kivu Consulting. Kivu helps companies prevent and manage cyber ransoms and theft. In this role, Mike negotiates with cyber-terrorists after they have locked a company's data in order to avoid the worst outcomes. Mike joined Kivu's team in January of 2020 after 25 years at the Scottsdale Police Department. He spent most of his police career in investigations, including nearly a decade on the United States Secret Service Electronic Crimes Task Force. Mike is also a Resident Security Agent for Major League Baseball. In this episode… You've walked into the office and none of the computers work. You call the IT team and they find an unnerving message on the screen: “We've stolen your data and you must pay for it to be unlocked.” You only have one question while the sudden dread settles in: What do I do now? Thankfully, Kivu Consulting's got your back. Their team of highly-trained investigators are ready to negotiate with cyber terrorists in any situation. It's similar to sending the SWAT team to negotiate for hostages at a bank robbery — but with specialized training for invisible, online attackers. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Mike Snader, the Associate Director of Cyber Investigations at Kivu Consulting, to discuss ransomware negotiations. Mike explains the negotiation process, how Kivu assists clients, and his tips for avoiding future scams. Stay tuned.
ELI WILKERSON AND CYBER INVESTIGATIONS | EPISODE 55 | JUN 15, 2021 Eli Wilkerson and cyber investigations is the topic this week. Mr. Wilkerson is a Texas private investigator and certified fraud examiner (CFE). Furthermore, he is a certified expert in cyber investigations and the principal at Praxis Detection Services, LLC in Amarillo, Texas If […]
Retired Cyber Investigator Dave Ostertag joins co-host Andy Bonillo on Episode #173 of Task Force 7 Radio to provide his perspective on the beginning of the data breach investigations era. Dave describes when the first payment data compromise happened and how that set the stage for future investigations, fraud analytics, standards, and investigatory tactics. Mr. Ostertag also highlights how things don't change and we can predict future attacks based on the past, especially in the national security arena. The pair wrap up the show with a call to action to those fighting the good cyber fight to share what they know with each other. All this and much, much more on Episode #173 of Task Force 7 Radio.
Retired Cyber Investigator Dave Ostertag joins co-host Andy Bonillo on Episode #173 of Task Force 7 Radio to provide his perspective on the beginning of the data breach investigations era. Dave describes when the first payment data compromise happened and how that set the stage for future investigations, fraud analytics, standards, and investigatory tactics. Mr. Ostertag also highlights how things don't change and we can predict future attacks based on the past, especially in the national security arena. The pair wrap up the show with a call to action to those fighting the good cyber fight to share what they know with each other. All this and much, much more on Episode #173 of Task Force 7 Radio.
John is Head of Cyber Investigations & Principal Engineer bij McAfee. Daar houdt hij zich bezig met onderzoek naar vooral cybercriminaliteit en werkt regelmatig samen met internationale opsporingsinstanties bij acties tegen grote malware bendes, zoals recent met Emotet. Voor zijn tijd bij McAfee, werkte hij bij het Team High-Tech Crime (THTC) van de Nederlandse Politie. En daarvoor was hij marinier en is uitgezonden op verschillende missies zoals in Afghanistan en Somalië. Dus John heeft veel boeiende dingen te vertellen, niet in de laatste plaats vanuit de frontline tegen georganiseerde cybercriminalteit.
In this episode of The Gate 15 Interview, Andy Jabbour talks with Ben Spear, Director of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) and Al Murray, currently serving as the Assistant Special Agent in Charge over Cyber Investigations at FBI's Washington Field Office (WFO). In our discussion we address: Recent election history and security issues; Threats to the upcoming 2020 election; What to expect on election day (and after); Words of wisdom for citizens and elections officials. Please enjoy this episode of The Gate 15 Interview on Anchor, Apple, Spotify, as well as other locations.
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. In this episode, Shon will talk about questions for Domain 8 (Software Development Security) of the CISSP Exam. BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/ Want to find Shon Gerber elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS: ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources TechTarget https://searchsecurity.techtarget.com/quiz/CISSP-Domain-8-quiz-Law-Investigations-and-Ethics?q0=1&q1=0&q2=2&q3=1&q4=1&q5=1&q6=2&q7=0&q8=2&q9=0&q10=1&q11=3&q12=0&q13=3&q14=2&x=69&y=11
Former Secret Service Agent, Computer Forensic Expert, and founder of the security company Cyber Forensics, Gus Dimitrelos appears on Episode #103 of Task Force 7 Radio to talk to our audience about real life scenarios where Cyber Forensic Investigations have determined the outcome of trials where the defendants have been accused of some of the most heinous crimes. Listen as Dimitrelos describes the importance of computer forensics, cellular triangulation, and cell phone forensics in proving, and in some cases disproving, allegations of kidnapping, aggravated assault, murder, and acts of terrorism. Dimitrelos also gives his view on the privacy vs. security debate around cell phone encryption technology, what Apple is doing to thwart authorities from conducting forensics on their phones, and whats more secure: Apple IOS or Windows operating systems. All this and much, much more on Episode #103 of Task Force 7 Radio - the Voice of Cyber Security.
In this Podcast: On this episode, Amber Pedroncelli interviews Michael F D Anaya, Head of Global Cyber Investigations at DEVCON. Listen Download this PodcastThe post Global CISO Forum Podcast: Michael F D Anaya, Head of Global Cyber Investigations at DEVCON appeared first on EC-Council.
For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What are some of the best ways of keeping an eye on what our kids are doing online? How do we know what information apps, websites, etc. are collecting from our kids What are some simple steps that we can do to help automatically protect the privacy of our kids and ourselves when browsing the web? Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more---- He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies. He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator". Webpage: https://briansemrau.com Resource & Research: https://semsec.net Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches. (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.) If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use): https://www.lastpass.com/ 1Password: https://1password.com/ Dashlane: https://www.dashlane.com/ KeePass: https://keepass.info/ 3. Browser extensions: HTTPS Everywhere: https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger: https://www.eff.org/privacybadger - helps to block tracking as your browse the web. (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin: a. Chrome: https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en b. FireFox: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ c. Edge: https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab d. Safari: https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4. Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android: https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple: https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity
For YouTube Video - https://bit.ly/2Rkg7Zx (Parent Pump Radio Channel) What is the Dark Web and do we need to be concerned about it? Chrome and other browsers have recently started marking a lot of sites as "not secure". Are they truly not safe to use? How do we protect our social security numbers as well as our children’s? Our expert guest, Brain Semrau, is a Digital Forensics Investigator at Edelson PC where his practice focuses on a variety of tech-related cases related to privacy and information security.----more---- He also owns and operates an information security consulting firm which specializes in providing information security and digital forensics services to small to medium-sized companies. He graduated cum laude with a degree in Information Technology Management from Illinois Institute of Technology and holds board certifications as an "Expert in Cyber Investigations" and a "Forensic HiTech Investigator". Webpage: https://briansemrau.com Resource & Research: https://semsec.net 1. HaveIBeenPwned: https://haveibeenpwned.com - allows you to safely check exiting passwords and email addresses to see if they are in any known breaches. (Note: Tools like this aren't necessarily guaranteed to be 100% inclusive of all breaches; however, they do tend to have the data from the larger well-known breaches, and if your password(s) is/are found, that is a good indication that it/they needs to be changed.) If your email address is found in a previous breach, it will tell you exactly what data was also exposed in that breach. 2. Password managers: LastPass (the one I personally use): https://www.lastpass.com/ 1Password: https://1password.com/ Dashlane: https://www.dashlane.com/ KeePass: https://keepass.info/ 3. Browser extensions: HTTPS Everywhere: https://www.eff.org/https-everywhere - ensures that the browser tries https:// first instead of http://, and warns you if a website isn't compatible with https://. Privacy Badger: https://www.eff.org/privacybadger - helps to block tracking as you browse the web. (Note: on occasion, it can cause functionality issues; you can simply click on the "badger" icon in your browser and disable it for that specific site) uBlock Origin: a. Chrome: https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en b. FireFox: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ c. Edge: https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4?activetab=pivot:overviewtab d. Safari: https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3 4. Locking credit scores: Equifax: https://www.freeze.equifax.com Experian: https://www.experian.com/freeze/center.html TransUnion: https://freeze.transunion.com/sf/securityFreeze/landingPage.jsp 5. Resetting Advertising ID: Android: https://www.ghacks.net/2015/04/20/how-to-reset-your-advertising-id-on-android/ (note: even if you opt-out of targeted advertisements as mentioned in the article, I still recommend going in and resetting the advertising ID on a regular basis as some developers may or may not honor that setting). Apple: https://www.intego.com/mac-security-blog/how-to-reset-the-advertising-identifier-on-your-mac-ios-device-or-apple-tv/ ………………………………………………………………………………………………… Jacqueline’s Info: Email: Info@IntegrativeMinds.com Phone: (424) 262-4433 Website:IntegrativeMinds.com Cash flow with our Turnkey Real Estate Investment Program. Info & sign up to get property listings at TrueLegacyWealth.com. All properties $50K - $150K. Jacqueline’s books: https://amzn.to/2HYXs3u Follow Parent Pump Radio on YouTube, Facebook, Itunes, Stitcher and Google Play #ParentPumpRadio #integrativeminds #Jacquelinetdhuynh #Jacquelinehuynh #harmoniousfamily, #happyfamily #financialcommunication #wealthyfamily #familyFinancialfreedom #financialfreedom #financiallyfree #cashflow #legacywealth #BrianSemrau #CyberSecurity #OnlineSecurity
Raj Samani, Chief Scientist and McAfee Fellow, and John Fokker, Head of Cyber Investigations for McAfee Advanced Threat Research, discuss various ransomware attacks and how it's evolving.
Title: How Private Partnerships Impact Cyber Investigations Description: This episode of the Information Security Podcast features a presentation delivered by SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch M
One of the most experienced and prolific Cyber Investigations Professionals in the world, Mr. Paul Cavicchia, joins Episode #63 of Task Force 7 Radio to talk about the importance of implementing a proactive enterprise wide intelligence function, the process of fusing different kinds of intelligence together to get unique optics into threats to your firm, and how intelligence and investigative reporting should be formatted to promote a risk discussion with line of business executives who routinely make critical business decisions for the firm. Host George Rettas also leveraged Cavicchia's storied career by asking him how he pivoted from Law Enforcement to the private sector, what kind of skills law enforcement officers should emphasize when seeking to make the transition from the public sector the private sector, and how law enforcement officers can leverage their unique skills sets to solve problems and mitigate risks for large Fortune 500 companies.
Former United States Secret Service Agent and current Executive Vice President of Q6 Cyber, Robert Villanueva, joins Task Force 7 Radio Host George Rettas and Guest Hosts Tom Pageler and Paul Jackson to discuss the importance of implementing a robust Cyber Intelligence capability in your organization. Villanueva, who founded the Secret Service's Cyber Intelligence Section and also led the USSS Miami Electronic Crimes Task Force, talks about how he had the foresight to pioneer intelligence capabilities in the Cyber Space long before anyone else was thinking about it. Villanueva also shares his experiences as an Undercover Secret Service Agent infiltrating Cyber Organized Crime Groups around the world. TF7 Radio Hosts also ask Villanueva questions on today's fast changing threat environment and the challenges organizations face from the scourge of organized crime.
In this podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).