By most estimates, 90% of legal evidence resides in computer systems, rather than on paper. Cases involving corporate trade secrets, personal and commercial disputes, employment discrimination, misdemeanor and felony crimes, and personal injury can be won or lost solely with the introduction of recovered e-mail messages and other electronic files and records.
The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when.
Like it or not, every computer is a potential crime scene and must be treated with care. When companies need to conduct internal investigations-especially those involving litigation-discovering and maintaining evidence becomes paramount.
Computer Forensics is widely used in prosecutors' offices, law firms, consulting firms, police departments, law enforcement organizations, Immigration and Naturalization Services, the FBI, the Drug Enforcement Administration, and the U.S. Customs Service, among numerous other industries. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics activities on their jobs.
The Computer Forensics Show, November 1-2, 2010 at the Fort Mason Center in San Francisco, is the don't miss event of the year for all IT Security, Legal, Accounting, Risk Management, Executive and Law Enforcement professionals.
As a media partner, Infosec Island is pleased to help promote this conference.
For IT professionals already familiar with computer forensics, The Computer Forensics Show assembles the leading minds and operational experts in the industry who will inform you about industry developments, technology advances and trends.
For individuals and companies currently not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your bottom line.
There Are Six Main Tracks in the Conference:
- Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.
- Legal (A) - EDD, including Litigation and Best Practice Issues.
- Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.
- IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.
- IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.
- Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.
Presentation Descriptions and Presenters Biographies:
PANEL: Legal Technology and Cost Management
Bruce Furukawa, Esq. - Severson & Werso; Shamir B. Colloff - Chief Technology Officer at Evolve Discovery
Navigating Computer Usage and Records Management Policies
William A. McComas - Partner at Shapiro Sher Guinot & Sandler/ Stevenson University
Avoiding E-Discovery Landmines
Eric J. Sinrod - Partner at Duane Morris LLP
Cost-Effective E-Discovery Processes
Herbert L. Roitblat, Ph.D. - Electronic Discovery Institute, OrcaTec LLC
PANEL: Corporate Perspectives on eDiscovery and Computer Forensics
Julie Lewis - President & CEO of Digital Mountain, Inc. / TBA
Disarming The Insider Threat
Philip Lieberman - President of Lieberman Software
KPMG PANEL: E-Discovery - Smart Ways to Save Litigation Cost
Rick Nalle - Director; Namrata Choudhury - Manager of KPMG LLP
Johnny Lee - Director, Forensic Technology Services of Grant Thornton LLP
The Physics of Digital Information and Its Applications to Digital Forensics
Dr. Fred Cohen - CEO and President of Fred Cohen & Associates and California Sciences Institute
Intrusion Detection and Prevention Systems
David Allen - Senior Security Consultant at Pervasive Netwerks
Cloud Number 9: Cloud Computing from a Forensic IT Investigators Perspective
Matt van der Wel - Manager, Investigative Response, EMEA of Verizon Business
Security of Confidential Information and Intellectual Property
Ernesto F. Rojas CISSP, DFCP, DABRI, FACFE - President & CEO of Forensic & Security Services, Inc.
The Compliance Elephant: Attacking Compliance One Bite at a Time
Tim Erlin - Principal Product Manager at nCircle
Intelligent Agent Technology in IT Security and Forensics
Tony Gigliotti - Founder & CEO of Autonomic Software, Inc.
Applying NIST to Address Compliance Mandates
Uday ‘Ali' Pabrai - CEO of ECFIRST
Identification of Challenges, Tools and Techniques to Perform Network Forensic Analysis
Amjad Zareen - Information Technology Officer; Dr. Irfan Anjum Manarvi - Center for Advanced Studies in Engineering, Pakistan
What Network Testing, Or Lack Thereof, Can Tell A Computer
Mike Hamilton - Director of Sales/Systems Engineering at BreakingPoint System
Securing Communication in an Insecure World
Andrew Wyatt - Chief Operating Officer of Clearswift
How a Business Can Benefit from Managed Network Security and a UTM Device
Pierluigi Stella - CTO of Network Box USA
Forensic Investigations of Hacking Incidents
Ondrej Krehel, CISSP, CEH - Information Security Officer at Data Breach and Forensic Services
Dealing with Next Generation Cyber-Security Threats and Business Compliance Risks - Are you Ready?
Anupam Sahai - President of eGestalt Technologies, Inc.
Standards, Measurement, and Cyber Security: Policy Standards & Today's Shifting Threats
Michael Markulec - CTO of Lumeta
Strengthening Logon Security: New Strategies for Two-Factor Network Authentication
Matt Berzinski - Product Manager of Passlogix, Inc.
Keys to kingdom Or Keys Across the kingdom? - Managing Cryptography Key as an Asset
Swamy Patil - Senior Consultant at Infosys Technologies, Ltd
State of the Hack - Find Evil. Solve Crime.
Michael E. Malin - Executive Vice President and CFO at MANDIANT
Using Network Forensics to Combat Cyber Attacks
Joe Habib - Director of Professional Services and Education at WildPackets
Advanced Persistent Threats: Leading the Wave of Cybercrime
Tom Murphy - Chief Strategy Officer at Bit9
Building a Resilient Homeland Network and Protecting Critical Cyber Infrastructure with Deep Packet Inspection
Joel Ebrahimi - Solutions Engineer at Bivio Networks
Paul de Souza - Founder/ Director of CSFI-CWD (Cyber Warfare Division)
Anatomy Of A Database Attack
Josh Shaul - VP Product Management of Application Security, Inc.
Free Computer Forensics Tools & Techniques for Law Enforcement
Mun-Wai Hon - Principal Systems Engineer at Noblis, Inc.
Data Breaches: Paths and Prevention
Kevin Nibler - Senior Manager, Security and Audit Services at Canaudit, Inc.