Computer Forensics strategies is widely prevalent across multiple industries today. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics activities on their jobs.
It is utilized in prosecutors' offices, law firms, consulting firms, police departments, law enforcement organizations, Immigration and Naturalization Services, the FBI, the Drug Enforcement Administration, and the U.S. Customs Service, and more.
The reality today is that every computer is a potential crime scene and must be treated as such. When companies need to conduct internal investigations, especially those involving litigation, discovering and maintaining evidence becomes paramount.
The Computer Forensics Show, November 1-2, 2010 at the Fort Mason Center in San Francisco, is a strategically important for all IT Security, Legal, Accounting, Risk Management, Executive and Law Enforcement professionals.
As a media partner, Infosec Island is pleased to help promote this conference.
For individuals and companies currently not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your bottom line.
For IT professionals already familiar with computer forensics, The Computer Forensics Show assembles the leading minds and operational experts in the industry who will inform you about industry developments, technology advances and trends.
In my recent conversation with the show's event coordinator, Frank Manley provided some insight into the event's origins and evolution:
I would say that when we looked around before we started The Computer Forensics Show, we saw that the field in general was exploding and that the technology and what was possible had many different applications.
There have been some conferences that simply offer training for those already involved in Forensics, but our goal and mission is to bring some of that knowledge and expertise to the greater IT world and to also show how computer forensics will be an issue that almost everyone in IT Security will need to be concerned with going forward.
I think there can be greater synergy in the IT community by taking aspects from what the Computer Forensics Professionals are doing and applying that to each organizations over-all IT Security plan. So while some of our show does provide seminars and training for those already in forensics, it also can give IT professionals an idea of what is going on.
One of the conference's featured presenters is Matthijs van der Wel, MBA CISSP CISA RON QSA, and Manager of Investigative Response for Verizon Business Security Solutions.
Matt provides some insight into how computer forensics is instrumental to security efforts in the adaptation of cloud-based services:
Cloud services means the user knows nothing about the underlying platform and structure, where we as forensic investigators want to know everything. When a security incident occurs, forensic investigators need to be able to investigate the incident successfully.
But if users of cloud computing do not properly prepare themselves, investigating a security incident may not be possible or seriously hindered. Best to be aware of potential pitfalls before the incident occurs, than to be faced with them in a crisis situation.
Participants will learn what the potential difficulties may occur while conducting a forensic IT investigation that includes cloud-based services or data stored in the cloud. Participants will also learn what to do now and what to ask your provider in advance to allow for a successful investigation in the future when they move to the cloud.
There Are Six Main Tracks in the Conference:
- Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.
- Legal (A) - EDD, including Litigation and Best Practice Issues.
- Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.
- IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.
- IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.
- Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.
Presentation Descriptions and Presenters Biographies:
Cloud Number 9: Cloud Computing from a Forensic IT Investigators Perspective
Matt van der Wel - Manager, Investigative Response, EMEA of Verizon Business
PANEL: Legal Technology and Cost Management
Bruce Furukawa, Esq. - Severson & Werso; Shamir B. Colloff - Chief Technology Officer at Evolve Discovery
Navigating Computer Usage and Records Management Policies
William A. McComas - Partner at Shapiro Sher Guinot & Sandler/ Stevenson University
Avoiding E-Discovery Landmines
Eric J. Sinrod - Partner at Duane Morris LLP
Cost-Effective E-Discovery Processes
Herbert L. Roitblat, Ph.D. - Electronic Discovery Institute, OrcaTec LLC
PANEL: Corporate Perspectives on eDiscovery and Computer Forensics
Julie Lewis - President & CEO of Digital Mountain, Inc. / TBA
Disarming The Insider Threat
Philip Lieberman - President of Lieberman Software
KPMG PANEL: E-Discovery - Smart Ways to Save Litigation Cost
Rick Nalle - Director; Namrata Choudhury - Manager of KPMG LLP
Johnny Lee - Director, Forensic Technology Services of Grant Thornton LLP
The Physics of Digital Information and Its Applications to Digital Forensics
Dr. Fred Cohen - CEO and President of Fred Cohen & Associates and California Sciences Institute
Intrusion Detection and Prevention Systems
David Allen - Senior Security Consultant at Pervasive Netwerks
Security of Confidential Information and Intellectual Property
Ernesto F. Rojas CISSP, DFCP, DABRI, FACFE - President & CEO of Forensic & Security Services, Inc.
The Compliance Elephant: Attacking Compliance One Bite at a Time
Tim Erlin - Principal Product Manager at nCircle
Intelligent Agent Technology in IT Security and Forensics
Tony Gigliotti - Founder & CEO of Autonomic Software, Inc.
Applying NIST to Address Compliance Mandates
Uday ‘Ali' Pabrai - CEO of ECFIRST
Identification of Challenges, Tools and Techniques to Perform Network Forensic Analysis
Amjad Zareen - Information Technology Officer; Dr. Irfan Anjum Manarvi - Center for Advanced Studies in Engineering, Pakistan
What Network Testing, Or Lack Thereof, Can Tell A Computer
Mike Hamilton - Director of Sales/Systems Engineering at BreakingPoint System
Securing Communication in an Insecure World
Andrew Wyatt - Chief Operating Officer of Clearswift
How a Business Can Benefit from Managed Network Security and a UTM Device
Pierluigi Stella - CTO of Network Box USA
Forensic Investigations of Hacking Incidents
Ondrej Krehel, CISSP, CEH - Information Security Officer at Data Breach and Forensic Services
Dealing with Next Generation Cyber-Security Threats and Business Compliance Risks - Are you Ready?
Anupam Sahai - President of eGestalt Technologies, Inc.
Standards, Measurement, and Cyber Security: Policy Standards & Today's Shifting Threats
Michael Markulec - CTO of Lumeta
Strengthening Logon Security: New Strategies for Two-Factor Network Authentication
Matt Berzinski - Product Manager of Passlogix, Inc.
Keys to kingdom Or Keys Across the kingdom? - Managing Cryptography Key as an Asset
Swamy Patil - Senior Consultant at Infosys Technologies, Ltd
State of the Hack - Find Evil. Solve Crime.
Michael E. Malin - Executive Vice President and CFO at MANDIANT
Using Network Forensics to Combat Cyber Attacks
Joe Habib - Director of Professional Services and Education at WildPackets
Advanced Persistent Threats: Leading the Wave of Cybercrime
Tom Murphy - Chief Strategy Officer at Bit9
Building a Resilient Homeland Network and Protecting Critical Cyber Infrastructure with Deep Packet Inspection
Joel Ebrahimi - Solutions Engineer at Bivio Networks
Paul de Souza - Founder/ Director of CSFI-CWD (Cyber Warfare Division)
Anatomy Of A Database Attack
Josh Shaul - VP Product Management of Application Security, Inc.
Free Computer Forensics Tools & Techniques for Law Enforcement
Mun-Wai Hon - Principal Systems Engineer at Noblis, Inc.
Data Breaches: Paths and Prevention
Kevin Nibler - Senior Manager, Security and Audit Services at Canaudit, Inc.