1 CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information Systems Auditor (CISA) by the Information Systems Audit & Control Association (ISACA) Certified Information Security Manager (CISM) by ISACA Certified in Risk & Information Systems Control (CRISC) by ISACA BACKGROUND Of her 20 years of professional experience, Angie Singer Keating has spent the past 10 years specializing in computer forensics, data recovery, data destruction, security incident response, information technology risk management, and system auditing. Angie has provided consultancy services related to e-discovery, forensic analysis, data breach response, and risk management within various types of industries, such as legal, financial services, healthcare, banking, insurance, government, and higher education. As the CEO and co-founder of Reclamere, Inc, Angie manages a team of Data Security Experts with over 75 years of combined expertise in complex projects and litigation services. Angie was also the chief architect in the proprietary development of the Reclamere data destruction process that guarantees 100% forensically-sound, quality control on all hard drives. The Reclamere on-site data recovery and forensic lab was designed by Angie to ensure maximum security and use of state-of-the-art industry tools. EXPERIENCE LEGAL FIRMS Litigation Support, Forensics, Data Recovery, and Non-Testifying Expert Services in the following decisions: Hodczak et al vs. Latrobe Specialty Steel Company Civil Action No (WD PA) AMG Resources Corporation vs. Trueblood et al Civil Action No (WD PA) United States vs. William Heiser Criminal Case 4:04-cr (WD PA)
2 PENNSYLVANIA PUBLIC SCHOOL DISTRICTS Project Management and Litigation Support Services related to employee misconduct investigations requiring expert computer forensics PENNSYLVANIA-BASED HEALTHCARE PROVIDERS Project Management for Risk Assessment and Policy Review & Development Services related to HIPPA / HITECH / ARRA Meaningful Use Initiatives PENNSYLVANIA PUBLIC ENTITIES Project Management and Computer Forensic Support Services to various PA county 911 centers, PA county courthouses, and PA higher education institutions PENNSYLVANIA-BASED BANKS & GLOBAL FINANCIAL SERVICE COMPANIES Project Management for Security Risk Assessment Projects on external network penetration utilizing ISO, NIST, and CoBIT security standards; Incident Response Assistance related to stolen confidential data PENNSYLVANIA-BASED INSURANCE COMPANIES Leader of a technical team assisting a PA-based law firm in the development of a company-wide e-discovery Preparedness Plan AFFILIATIONS National Association for Information Destruction (NAID) Certification Committee Chairperson NAID Electronic Media Destruction Subcommittee Co-Chairperson Ben Franklin Technology Partnership Board of Directors SPEAKING ENGAGEMENTS & PRESENTATIONS Computer Forensics & Compliant Employee Investigations Accredited by the Human Resource Certification Institute (HRCI) e-discovery by Geeks for Attorneys Accredited by the PA Continuing Legal Education Board (PA CLE) e-discovery & Computer Forensics What s the Difference? How to Increase Firm Revenue through e-discovery Preparedness Protecting your Identity & Brand in Social Media Five Things to Know about Acceptable Use Policies How to Handle an e-discovery Request
3 JULIUS BUD YOUNKE DATA & FORENSICS EXAMINER CERTIFICATIONS Certified Data Recovery Professional (CDRP) Microsoft Certified System Engineer (MCDE) Microsoft Certified Professional (MCP) Microsoft Certified Professional + Internet (MCP+I) COMPTIA A+ Technician Special Master in Data Recovery by the Federal District Court System Forensic Data Recovery Expert by the US District Court Middle PA BACKGROUND Julius Bud Younke is the lead Data Recovery Specialist for the Reclamere Data Security Team. Bud offers assistance in forensics and e-discovery fieldwork projects. His expertise includes recovery of forensically-sound images to be used as evidence in legal proceedings, as well as conducting Data Breach Risk and Vulnerability Assessments. Bud has been integral in the development and evaluation of Reclamere s custombuilt processes and applications related to data destruction and quality control procedures. He is also responsible for the implementation and review of Reclamere s internal security controls for physical and logical access of the IT infrastructure. Prior to joining Reclamere in 2008, Bud was the Director of Information Technology for a Pennsylvania Technical School. His responsibilities included the physical and intellectual security of a campus-wide system and served as the Project Coordinator for the development of the Network & Internet Security Program Administration.
4 PROJECT EXPERIENCE Advanced Physical and Logical Data Recovery Operations on customer databases, server arrays, encrypted drives, and physical repair of damaged hard drives On-site evidence collection of electronically stored information from desktops, complex server drive arrays, and wireless communication devices Search and preservation of electronic data for defense counsel in a Class Action Age Discrimination Lawsuit Search and preservation of electronic data for defense counsel in an intellectual property and trade secret matter for an international firm Recovery of electronic evidence from hard drive equipment resulting in a favorable settlement on an employment contract matter Recovery of electronic evidence in the intentional destruction of data involving employee misconduct that resulted in an injunctive relief for the employer Cell phone forensic analysis to collect evidence related to a progressive disciplinary action of an employee of a national firm AFFILIATIONS US AIR FORCE Nuclear Weapons Maintenance Technician from 1983 to 1986
5 THOMAS LAINO FORENSICS SPECIALIST CERTIFICATIONS Certified Electronic Evidence Collection Specialist (CEECS) Certified Computer Forensic Examiner (CFCE) COMPTIA A+ Certified Profession (A+) COMPTIA Network + Certified Professional (Network +) Certified Hacking Forensic Investigator (CHFI) EnCase Certified Examiner (EnCE) BACKGROUND Thomas Laino spent over 25 years with the Pennsylvania State Police. He was promoted from a Trooper to a Corporal in 1987 and spent his police career as a Computer Crime Investigator. With over 600 hours of training in computer crime and forensics, Tom has successfully identified and prosecuted numerous individuals guilty of child pornography, child solicitation, identity theft, and fraud. Tom is recognized as a qualified expert witness in computer forensics in various Pennsylvania District Courts and Courts of Common Pleas. After retiring from the Pennsylvania State Police, Reclamere recruited Mr. Laino to provide his expertise as part of the Data Security Expert Team. As a Certified Forensic Examiner, Tom has served as an expert witness in several litigation cases on behalf of Reclamere, Inc. He has also provide forensic examination and analysis services on various types of hard drives in order to produce evidence of data wiping and altering, keyword searches of accounts, and server imaging. Along with his accredited certifications, Tom is a member of the International Association of Computer Investigative Specialist (IACIS) organization and authored several articles including Does Size Really Matter published for the 2011 Storage and Destruction Business Journal.
6 ADDITIONAL TRAINING Criminal Investigators Course by the Pennsylvania State Police Computer Crimes and the Internet by the Municipal Police Officers Education & Training Commission (MPOETC) Basic Data Recovery and Analysis (BDRA) by the National White Collar Crime Center Advanced Data Recovery and Analysis Microsoft Windows 9x Systems (ADRA-Win9x) by the National White Collar Crime Center Advanced Data Recovery and Analysis Inet (ADRA-Inet) by the National White Collar Crime Center Basic On-line Technical Skills (BOTS) by the National White Collar Crime Center Forensic Computer Examiner Training Program by the International Association of Computer Investigative Specialists (IACIS) Advanced Data Recovery and Analysis, I-Look (ADRA-ILook) by the National White Collar Crime Center Advanced Data Recovery and Analysis, (ADRA- ) by the National White Collar Crime Center Advanced Data Recovery and Analysis, NTx (ADRA-NTx) by the National White Collar Crime Center Cybercop 302 (Inet) Windows Internet Trace Evidence by the National White Collar Crime Center Protecting Children On-Line by the Office of Juvenile Justice & Delinquency Protection National Center for Missing and Exploited Children CORE IMPACT Certified Professional Training by Core Security Technologies
SUMMARY Mr. Hatchett consults in the areas of digital forensics and electronic providing assistance to law firms, businesses of all sizes, federal and state courts, and foreign and domestic governmental
About DCJS The New York State Division of Criminal Justice Services (DCJS) is a multi-function criminal justice support agency. DCJS is among the nation s leaders in developing criminal justice technologies,
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce
Legal Cybersecurity Assistance Leviathan Security Group limitless innovation. no compromise. Cyber Due Diligence Digital security is a critical part of due diligence for any funding round or acquisition.
10 Cyber Security Summit 2014 SPEAKERS Mark Abbott Chief Information Officer, Atomic Data Inevitable Since the early nineties, Mark has garnered expertise in a diverse background of IT, law and business.
EC-Council Press The Experts: EC-Council EC-Council s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based
2013 HIPAA/HITECH AMENDMENTS: HOW THE CHANGES IMPACT THE ediscovery PROCESS Brian Brown Danny Tijerina RenewData, an LDiscovery Company Austin, TX Introduction Maintaining compliance with government regulations
December 12, 2013 Presentation EMERGING TRENDS IN INFORMATION PRIVACY AND SECURITY Logistics CPE Credit Requirements Takeaways Full service Professional Services Firm: Attest services Tax preparation and
110101001101101101010011000 11011010100110110101001100 11011010011011010100110000 10100110110101001100010010 Protecting Information The Role of Community Colleges in Cybersecurity Education A Report from
Computer Forensic Services and the CPA Practitioner 2010-2012 Forensic Technology Task Force 2010-2012 Forensic Technology Task Force Ron Box Margaret Daley Carl Hoecker Joel Lanz Charles Reid Donna Tamura
Security Whitepaper: OCLC's Commitment to Secure Library Services Contents Executive Summary... 2 I. Information Security and Enterprise Risk Management... 4 A. OCLC's Corporate Policies... 5 B. Data Classification
Cyber Security Programs Online Degrees & Certificates computerforensics.champlain.edu Introduction Champlain College...gives students career skills for the 21st Century...and once again shows Champlain
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
Mauro M. Wolfe Partner 1633 Broadway New York, New York 10019-6708 Phone: (212) 277-6726 firstname.lastname@example.org Mauro M. Wolfe is a Dickstein Shapiro partner in the White Collar Criminal Defense &
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
A REPORT FROM THE FINANCIAL INDUSTRY REGULATORY AUTHORITY Report on Cybersecurity Practices FEBRUARY 2015 Contents Executive Summary 1 Background 3 Governance and Risk Management for Cybersecurity 6 Cybersecurity
ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.
Cool Careers in Cybersecurity for Girls Workshop C34G November 12, 2014 10 a.m. to 1:00 p.m. Riggs Alumni Center at the University of Maryland - College Park, MD experience and a love of teaching to her
NATIONAL CYBER SECURITY STRATEGY GOVERNMENT OF JAMAICA TABLE OF CONTENTS ACKNOWLEDGEMENT 03 LIST OF ACRONYMS 04 EXECUTIVE SUMMARY 05 INTRODUCTION 07 National development and the role of ICT 09 The Threat
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 email@example.com Carrie Pifer
BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION, OR DISCUSSION TOPIC: University of Maryland Eastern Shore: Master of Science in Cybersecurity Engineering Technology COMMITTEE: Education Policy
Bill Aerts, CISSP, CISM Director, Information Risk Management Medtronic Bill Aerts is the Director of Information Risk Management at Medtronic. In this role, he oversees information security and is developing
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery