ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER
|
|
- Timothy Wright
- 8 years ago
- Views:
Transcription
1 CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information Systems Auditor (CISA) by the Information Systems Audit & Control Association (ISACA) Certified Information Security Manager (CISM) by ISACA Certified in Risk & Information Systems Control (CRISC) by ISACA BACKGROUND Of her 20 years of professional experience, Angie Singer Keating has spent the past 10 years specializing in computer forensics, data recovery, data destruction, security incident response, information technology risk management, and system auditing. Angie has provided consultancy services related to e-discovery, forensic analysis, data breach response, and risk management within various types of industries, such as legal, financial services, healthcare, banking, insurance, government, and higher education. As the CEO and co-founder of Reclamere, Inc, Angie manages a team of Data Security Experts with over 75 years of combined expertise in complex projects and litigation services. Angie was also the chief architect in the proprietary development of the Reclamere data destruction process that guarantees 100% forensically-sound, quality control on all hard drives. The Reclamere on-site data recovery and forensic lab was designed by Angie to ensure maximum security and use of state-of-the-art industry tools. EXPERIENCE LEGAL FIRMS Litigation Support, Forensics, Data Recovery, and Non-Testifying Expert Services in the following decisions: Hodczak et al vs. Latrobe Specialty Steel Company Civil Action No (WD PA) AMG Resources Corporation vs. Trueblood et al Civil Action No (WD PA) United States vs. William Heiser Criminal Case 4:04-cr (WD PA)
2 PENNSYLVANIA PUBLIC SCHOOL DISTRICTS Project Management and Litigation Support Services related to employee misconduct investigations requiring expert computer forensics PENNSYLVANIA-BASED HEALTHCARE PROVIDERS Project Management for Risk Assessment and Policy Review & Development Services related to HIPPA / HITECH / ARRA Meaningful Use Initiatives PENNSYLVANIA PUBLIC ENTITIES Project Management and Computer Forensic Support Services to various PA county 911 centers, PA county courthouses, and PA higher education institutions PENNSYLVANIA-BASED BANKS & GLOBAL FINANCIAL SERVICE COMPANIES Project Management for Security Risk Assessment Projects on external network penetration utilizing ISO, NIST, and CoBIT security standards; Incident Response Assistance related to stolen confidential data PENNSYLVANIA-BASED INSURANCE COMPANIES Leader of a technical team assisting a PA-based law firm in the development of a company-wide e-discovery Preparedness Plan AFFILIATIONS National Association for Information Destruction (NAID) Certification Committee Chairperson NAID Electronic Media Destruction Subcommittee Co-Chairperson Ben Franklin Technology Partnership Board of Directors SPEAKING ENGAGEMENTS & PRESENTATIONS Computer Forensics & Compliant Employee Investigations Accredited by the Human Resource Certification Institute (HRCI) e-discovery by Geeks for Attorneys Accredited by the PA Continuing Legal Education Board (PA CLE) e-discovery & Computer Forensics What s the Difference? How to Increase Firm Revenue through e-discovery Preparedness Protecting your Identity & Brand in Social Media Five Things to Know about Acceptable Use Policies How to Handle an e-discovery Request
3 JULIUS BUD YOUNKE DATA & FORENSICS EXAMINER CERTIFICATIONS Certified Data Recovery Professional (CDRP) Microsoft Certified System Engineer (MCDE) Microsoft Certified Professional (MCP) Microsoft Certified Professional + Internet (MCP+I) COMPTIA A+ Technician Special Master in Data Recovery by the Federal District Court System Forensic Data Recovery Expert by the US District Court Middle PA BACKGROUND Julius Bud Younke is the lead Data Recovery Specialist for the Reclamere Data Security Team. Bud offers assistance in forensics and e-discovery fieldwork projects. His expertise includes recovery of forensically-sound images to be used as evidence in legal proceedings, as well as conducting Data Breach Risk and Vulnerability Assessments. Bud has been integral in the development and evaluation of Reclamere s custombuilt processes and applications related to data destruction and quality control procedures. He is also responsible for the implementation and review of Reclamere s internal security controls for physical and logical access of the IT infrastructure. Prior to joining Reclamere in 2008, Bud was the Director of Information Technology for a Pennsylvania Technical School. His responsibilities included the physical and intellectual security of a campus-wide system and served as the Project Coordinator for the development of the Network & Internet Security Program Administration.
4 PROJECT EXPERIENCE Advanced Physical and Logical Data Recovery Operations on customer databases, server arrays, encrypted drives, and physical repair of damaged hard drives On-site evidence collection of electronically stored information from desktops, complex server drive arrays, and wireless communication devices Search and preservation of electronic data for defense counsel in a Class Action Age Discrimination Lawsuit Search and preservation of electronic data for defense counsel in an intellectual property and trade secret matter for an international firm Recovery of electronic evidence from hard drive equipment resulting in a favorable settlement on an employment contract matter Recovery of electronic evidence in the intentional destruction of data involving employee misconduct that resulted in an injunctive relief for the employer Cell phone forensic analysis to collect evidence related to a progressive disciplinary action of an employee of a national firm AFFILIATIONS US AIR FORCE Nuclear Weapons Maintenance Technician from 1983 to 1986
5 THOMAS LAINO FORENSICS SPECIALIST CERTIFICATIONS Certified Electronic Evidence Collection Specialist (CEECS) Certified Computer Forensic Examiner (CFCE) COMPTIA A+ Certified Profession (A+) COMPTIA Network + Certified Professional (Network +) Certified Hacking Forensic Investigator (CHFI) EnCase Certified Examiner (EnCE) BACKGROUND Thomas Laino spent over 25 years with the Pennsylvania State Police. He was promoted from a Trooper to a Corporal in 1987 and spent his police career as a Computer Crime Investigator. With over 600 hours of training in computer crime and forensics, Tom has successfully identified and prosecuted numerous individuals guilty of child pornography, child solicitation, identity theft, and fraud. Tom is recognized as a qualified expert witness in computer forensics in various Pennsylvania District Courts and Courts of Common Pleas. After retiring from the Pennsylvania State Police, Reclamere recruited Mr. Laino to provide his expertise as part of the Data Security Expert Team. As a Certified Forensic Examiner, Tom has served as an expert witness in several litigation cases on behalf of Reclamere, Inc. He has also provide forensic examination and analysis services on various types of hard drives in order to produce evidence of data wiping and altering, keyword searches of accounts, and server imaging. Along with his accredited certifications, Tom is a member of the International Association of Computer Investigative Specialist (IACIS) organization and authored several articles including Does Size Really Matter published for the 2011 Storage and Destruction Business Journal.
6 ADDITIONAL TRAINING Criminal Investigators Course by the Pennsylvania State Police Computer Crimes and the Internet by the Municipal Police Officers Education & Training Commission (MPOETC) Basic Data Recovery and Analysis (BDRA) by the National White Collar Crime Center Advanced Data Recovery and Analysis Microsoft Windows 9x Systems (ADRA-Win9x) by the National White Collar Crime Center Advanced Data Recovery and Analysis Inet (ADRA-Inet) by the National White Collar Crime Center Basic On-line Technical Skills (BOTS) by the National White Collar Crime Center Forensic Computer Examiner Training Program by the International Association of Computer Investigative Specialists (IACIS) Advanced Data Recovery and Analysis, I-Look (ADRA-ILook) by the National White Collar Crime Center Advanced Data Recovery and Analysis, (ADRA- ) by the National White Collar Crime Center Advanced Data Recovery and Analysis, NTx (ADRA-NTx) by the National White Collar Crime Center Cybercop 302 (Inet) Windows Internet Trace Evidence by the National White Collar Crime Center Protecting Children On-Line by the Office of Juvenile Justice & Delinquency Protection National Center for Missing and Exploited Children CORE IMPACT Certified Professional Training by Core Security Technologies
Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy
Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West
More informationHow To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
More informationJAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS
More informationCURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS AND
More informationRoy D. Rector CFCE EnCE
1803 West Avenue Austin, Texas 78701 (512) 895-9555 (512) 895-9555 www.r3forensics.com Roy D. Rector CFCE EnCE Operations Manager / Senior Forensic Examiner Roy D. Rector is a founder and the Senior Digital
More informationComputer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
More informationSensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS # 11-5605
More informationWILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM
WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
More informationSocial Media, E-Discovery, & Complex Computer Forensics
Social Media, E-Discovery, & Complex Computer Forensics 2009 Facebook Statistics Report: 276% Growth in 35-54 Year Old Users 60% of Mobile Internet Time is Spent on Social Networking SocialMediaAtWork.com
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationDigital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
More informationDigital Forensics & e-discovery Services
Digital Forensics & e-discovery Services Andrews International Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
More informationACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
More informationMARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More information2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
More informationHIPAA Audits and Compliance: What To Expect From Regulators and How to Comply
HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply October 18, 2013 ACEDS Membership Benefits Training, Resources and Networking for the ediscovery Community Exclusive News and
More informationCurriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner
Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationDISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT
SCHOOL POLICIES HOPKINS SCHOOL DISTRICT 270 1001 HIGHWAY 7 HOPKINS, MINNESOTA 55305 DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT I. PURPOSE
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationPII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
More informationModalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
More informationData Breaches, Credit Card Fraud, Front Page News Are You Next?
Data Breaches, Credit Card Fraud, Front Page News Are You Next? Calvin Weeks EnCE, CEDS, CRISC, CISSP, CISM Computer Forensics Manager 1 Home Depot Breach CBS News 2,200 stores compromised Up to 60 million
More informationDirector of Computer Forensic Services
www.orionforensics.com Call us:02-714-3801-3 Director of Computer Forensic Services I am a self-motivated person, with the ability to work unsupervised or as part of a team. As a Director and well-trained
More informationIT Auditing and. Discussion Topics. What is IT Auditing?
IT Auditing and Computer Forensics Kevin H. Doar, CISA Auditor Discussion Topics What is IT Auditing? IT Auditor Skillset IT Auditing Standards & Frameworks IT Controls with Case Examples The Direction
More informationHow To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationSocial Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
More informationComputer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationData Privacy and Cybersecurity Task Force
Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,
More informationCAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
More informationRobert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from
Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationSUMMARY SELECTED EXAMPLE ENGAGEMENTS. Jerry Hatchett
SUMMARY Mr. Hatchett consults in the areas of digital forensics and electronic providing assistance to law firms, businesses of all sizes, federal and state courts, and foreign and domestic governmental
More informationCareer Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88
Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat
More informationS. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:
S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.
More informationEduca&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan
Educa&onal Event Spring 2015 Cyber Security - Implications for Records Managers Art Ehuan Risk to Corporate Information The protection of mission dependent intellectual property, or proprietary data critical
More informationETHICS & THE NEW RULES
ETHICS & THE NEW RULES THOMAS H. WATKINS, Austin Brown McCarroll LLP State Bar of Texas 19 th ANNUAL TEXAS MINORITY COUNSEL PROGRAM September 7-9, 2011 Austin, Texas CHAPTER 15 Thomas Watkins Brown McCarroll,
More informationDIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
More informationState of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
More informationAll about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
More informationPiecing Digital Evidence Together. Company Information
Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the
More informationErnesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
More informationTable of Contents 2014-15 Revised Budget - Public Defense Board
Table of Contents 2014-15 Revised Budget - Public Defense Board Agency Profile - Board of Public Defense... 1 Current, Base and Governor's Recommended Expenditures - Rev... 3 Sources and Uses... 4 Governor's
More informationCLERK OF THE COURT OF COMMON PLEAS/ PUBLIC DEFENDER S OFFICE/JUVENILE SERVICES DIVISION
CLERK OF THE COURT OF COMMON PLEAS/ PUBLIC DEFENDER S OFFICE/JUVENILE SERVICES DIVISION EXAMINATION REPORT CONTENTS Independent Auditor s Report... 1 Financial Section: Statement Of Receipts And Disbursements...
More informationJUVENILE JUSTICE SYSTEM
JUVENILE JUSTICE SYSTEM A delinquency petition is a court document alleging that a juvenile, between ages 10-16, has violated a law which would be a criminal offense if committed by an adult. Disposition
More informationCase Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
More informationAGENDA Morning Session
AGENDA Morning Session 8:00 8:30 Breakfast and Social Networking 8:30 8:45 Welcome & Introduc@ons, Bill Sieglein, Founder CSO Breakfast Club 8:45 9:30 Keynote: Benita Kahn Partner, Vorys Sater Seymour
More informationCybersecurity. Threats to Nonprofits. Chris Debo Senior Manager, IT Audit. August 14, 2014
Cybersecurity Threats to Nonprofits Chris Debo Senior Manager, IT Audit August 14, 2014 What is Cybersecurity? NIST definition: The process of protecting information by preventing, detecting, and responding
More informationFaith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member
e-discovery Mitigating Security Impacts Faith M. Heikkila, ABD, CIPP Regional Security Services Manager MI InfraGard Board Member Credentials Information security consultant Pivot Group Michigan InfraGard
More informationCase 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Federal Trade Commission, Plaintiff, v. Wyndham Worldwide
More informationEnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
More informationForensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
More informationOverview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
More informationHOW SECURE IS YOUR PAYMENT CARD DATA?
HOW SECURE IS YOUR PAYMENT CARD DATA? October 27, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director PCI Practice Leader Kevin Villanueva,, CISSP,
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationHealthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
More informationKeeping watch over your best business interests.
Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation
More informationCRIMINAL JUSTICE TECHNOLOGY
CRIMINAL JUSTICE TECHNOLOGY UNDERGRADUATE DEGREE PROGRAM 2009-2010 FEBRUARY 2010 REVISION CRIMINAL JUSTICE TECHNOLOGY UNDERGRADUATE DEGREE PROGRAM The Criminal Justice Technology Undergraduate Degree program
More informationKeith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
More informationAbout the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action
Governance, Risk Management, Compliance, & Audit An Overview of Cloud Security Alliance s Security Guidance for Critical Areas of Focus in Cloud Computing July 23, 2009 Agenda About the Presenter About
More informationThe Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches
The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl Information Systems Security Management
More informationHITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment
More informationComputer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
More informationProsecuting Attorneys Council of Georgia Transition Into Prosecution Program
Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program Office: Name of Beginning Lawyer: Bar No. Name of Mentor: Bar No. MODEL MENTORING PLAN OF ACTIVITIES AND EXPERIENCES FOR STATE
More informationTable of Contents 2016-17 Biennial Budget Attorney General
Table of Contents 2016-17 Biennial Budget Attorney General Agency Profile Attorney General... 1 Administrative Law Section... 2 State Services Section... 3 Public Services Section... 4 Regulatory Law Section...
More informationDEALING WITH POLICE MISCONDUCT OR EXCESSIVE FORCE IN WISCONSIN
DEALING WITH POLICE MISCONDUCT OR EXCESSIVE FORCE IN WISCONSIN Written by: Jonathan S. Safran This guide attempts to answer some of the most common questions and provides a basic understanding of the steps
More informationChecklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
More informationField of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
More informationSierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
More informationInformation Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
More informationCybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013
Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not
More informationTo do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
More informationComputer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008
Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach
More informationWhat s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue
What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue Healthcare Advisors The # of data breaches is climbing The
More informationPROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
More informationCURRICULUM VITAE. Edward H. Pappas
CURRICULUM VITAE Edward H. Pappas PROFESSION: Attorney EMPLOYMENT: Chairman and Client Service Director, Dickinson Wright PLLC, 38525 Woodward Avenue, P.O. Box 509, Bloomfield Hills, Michigan 48304 Partner
More informationDigital Forensics Services
Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together
More informationROBERT J. BRASS, Esq. ALOIA LAW FIRM LLC 2 Broad Street, Suite 407 Bloomfield, NJ 07003 (973)337-6626 rbrass@aloialawfirm.
ROBERT J. BRASS, Esq. ALOIA LAW FIRM LLC 2 Broad Street, Suite 407 Bloomfield, NJ 07003 (973)337-6626 rbrass@aloialawfirm.com RESUME ADMITTED TO THE BAR OF THE STATE OF NEW JERSEY AND THE BAR OF THE UNITED
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationCURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
More informationConviction Integrity Unit Best Practices October 15, 2015
Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against
More informationCloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
More informationJoe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
More informationInformation retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
More informationDigital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
More informationMOBILE DEVICE FORENSICS 101: A GENERAL OVERVIEW OF SMARTPHONE INVESTIGATIONS
MOBILE DEVICE FORENSICS 101: A GENERAL OVERVIEW OF SMARTPHONE INVESTIGATIONS Course Description, Objectives, Agenda and Presenters Mobile Device Forensics is the extraction, processing and analysis of
More informationDEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES
DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES STUDENT HANDBOOK FOR CRIMINOLOGY MAJORS 2015-2016 SEPTEMBER 2015 REVISION DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES UNDERGRADUATE PROGRAM
More informationInformation Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
More information