Anthony Reyes. Curriculum Vitae
|
|
|
- Stuart Stone
- 10 years ago
- Views:
Transcription
1 Anthony Reyes Curriculum Vitae 44 Wall Street 12th Floor Telephone/Message: New York, N.Y Profile Internationally recognized practitioner, trainer, and lecturer in the area of computer crimes, fraud, and highly technical investigations. Topics include cyber crimes and fraud investigations, intellectual property theft, computer forensics, network forensics, electronic discovery, cyber terrorism, network security, data encryption, steganography, and malware detection. Practical Experience The ARC Group Chief Executive Officer (1998- Present) The ARC Group is an international security, computer consulting, and private investigation company with offices in New York and Brazil. ARC specializes in the investigation of highly technical crimes and complicated schemes to defraud. Its primary business is the implementation of computer and network security countermeasures, the investigation and detection of fraud, intellectual property theft, and computer related crimes. Consultant services for detecting computer and network security breaches are also preformed. Additional services include fraud prevention, computer forensics, litigation support, electronic discovery, investigations unit development, and risk assessments. The ARC Group provides consulting services for many fortune 100 companies, and government agencies globally. ARC also provides training and consultant services through its sister company (ARC Computer Technologies) for the following institutions; the US Department of Homeland Security, The University of Tennessee s Law Enforcement Innovation Center, Wetstone Technology, AccessData, Technology Pathways, Forensic Matter, and the Internet Parole and Probation Corporation. ARC performs consulting services in the United States, Latin America, Asia, and Europe. New York City Police Department- Detective Investigator ( ) As a Detective I was assigned to the Computer Crimes Squad of the NYPD, where I investigated computer intrusions, fraud, identity theft, intellectual property theft, child exploitation, and software piracy. I also lectured, trained, and provided technical assistance in the area of computer crimes and computer forensics for federal, state, and local law enforcement agencies. Academic and Teaching Positions AccessData Corporation- Instructor (2003- Present) Instruct and lecture extensively in the area of computer forensics. Courses taught on behalf of AccessData include basic and advanced computer forensics classes. Additional consultant
2 services provided to AccessData include software testing and development, curriculum review, and assistance in the development of their certification program. Technologies Pathways- Instructor (2003- Present) Instruct and lecture extensively in the area of computer forensics. Courses taught on behalf of Technologies Pathways include the ProDiscover Certification Course. Additional consultant services provided to Technologies Pathways include software testing and development, curriculum review, and assistance in the development of their certification program. Wetstone Technologies- Consultant/Instructor (2004-Present) Curriculum Advisor for Wetstone s LiveWire Computer Forensics Course. Provide instruction in the area of Steganography, and Malware detection on their behalf. Other consultant services provided to Wetstone Technologies include software testing and development, and research assistance in the area of electronic investigations. The Department of Homeland Security- Consultant/Instructor ( ) Instructor at the Federal Law Enforcement Training Center in Glynco, Georgia. Assisted in the development of the Cyber Terrorism Course and taught the investigations aspect of this course. Responsible for training members of State, Local, and Federal law enforcement in the area of high tech crimes investigations. The participating officers then utilized the techniques learned in their efforts to protect our nation from terrorists. Polytechnic University-Adjunct Professor ( ) Graduate lecturer in computer forensics. Pace University-Adjunct Professor ( ) Responsibilities include teaching the introduction to computer science course and the introduction to computer forensic course. Chief Advisor to the curriculum development board for a Computer Forensics curriculum. Courses Taught Computer Investigations Fraud investigations Tracing Protecting children online Introduction to cyber crime Criminal Investigations Fraud Identity Theft Intellectual Property Theft Insider Threats Risk Analysis Computer Forensics Data Recovery & Computer Forensic Methodology
3 Reconstruction of Internet History Data Encryption Cracking Techniques Intrusion Detection Hacking Techniques Malware Discovery Security Log Analyst Network Forensics Network Acquisitions Anomaly Detection Network Wiretaps Network Design & Implementation Network Security Intrusion Detection Systems InfoSec Vulnerability Discovery Computer Repairs & Other Programs A+ certification Microsoft Office Education Graduate Certificate ( ) John Jay College of Criminal Justice, New York Police Leadership Certification Bachelor of Science in Criminal Justice (1989) John Jay College of Criminal Justice, New York Major Criminal Justice Minored in Sociology Professional Qualifications AccessData s FTK 2.0 Intermediate Computer Forensics Course (2008) Certified Systems Investigator Course (2007) Nuix s File Base Investigations Course (2007) Guidance s Encase Network Intrusion Investigations Phase I Course (2007) NSA Information Security Assessment Methodology Certification Course (2006) ProDiscover Certification Course (2006) LEIC Facilitator Development Workshop (2006) AccessData s Applied Decryption Course (2005) Dell s Implementing Enterprise Storage Solutions Course (2005) ASR Data s Smart Intermediate Computer Forensics Course (2005) Wetstone s LiveWire Investigator Certification Course (2005) AccessData s Advanced Internet Forensics Course (2004) Wetstone s Steganography Investigator Certification Course (2004) Guidance s Encase Intermediate Computer Forensic Course (2004) AccessData s Intermediate Computer Forensics Course (2003)
4 AccessData s Advanced Microsoft Windows Forensics Course (2003) The Search Investigation of Online Crimes Course (2003) The Foundstone Ultimate Hacking Course (2003) The Department of Homeland Security s Internet Forensics Investigations Course (2003) The SANS Institute Advanced Incident Handling and Hacker Exploits Course (2003) The SANS Institute Intrusion Detection In-Depth Course (2002) The National White Collar Crime s Advanced Data Recovery Course (2002) The Rockland County Sheriff s Advanced Computer Investigations Course (2002) IDT Network Investigations and Unix Course (2002) The National White Collar Crime s Basic Data Recovery Course (2001) Microsoft Certified System Engineer Course (2000) OEM Systems Builder Pre-installation of NT 4.0 Course (1999) Installation and Configuring Windows NT Server 4.0 Course (1999) A+ PC Technician Training (1998) Certifications A+ PC Technician AccessData Certified Instructor AccessData Certified Examiner University of Tennessee Certified Facilitator NSA Certification Information Security Assessment Methodology Wetstone Steganography Investigator Wetsone LiveWire Examiner Prodiscover Certified Examiner Professional Affiliations & Memberships The High Technology Crime Investigators Association (HTCIA) The New York State Electronic Crimes Task Force (ECTF) The New York State Internet Crimes Against Children Task Force (ICAC) The National Institute of Justice s Electronic Crime Partner Initiative (ECPI) International Association of Computer Investigative Specialists (IACIS) The New York Metro Infragard The Association of Certified Fraud Examiners (ACFE) The American Society for Industrial Security (ASIS) The Information Systems Audit and Control Association (ISACA) The Information Systems Security Association (ISSA) The Order of Lawyers for Brazil s, Sao Paulo Section (OAB SP) Significant Accomplishments Consulting Member to the Director of The Commission of Information Society, of the Order of Lawyers for Brazil s, Sao Paulo Section (2008) Certified System Investigator s (CSI) Association Co-Chairman (2008)
5 President of the High Technology Crime Investigation Association s (HTCIA) International Executives Committee (2007) Member of the editorial board for The International Journal of Forensic Computer Science (IJoFCS), published by the Brazilian Federal Police (2006) Developed an Advanced Online Investigator s Data Preservation Course which debut at the 2006 International Association of Computer Investigative Specialists (IACIS) Conference Member of the editorial board for the Journal of Digital Forensic Practice, published by Taylor & Francis (2006) 1st Vice President of the HTCIA International Executives Committee (2006) Participated in curriculum and development review of the Computer Crime Investigation Course, for the University of Tennessee s Law Enforcement Innovation Center (2006) Training and Education Working Group Chairman for The National Institute of Justice s Electronic Crime Partner Initiative (2006-Present) Participated in the review and revision of The National Institute of Justice Guide, Electronic Crime Scene Investigation: A Guide for First Responders 2nd Edition (2005) Acting Director and Planer for the 2005 HTCIA Northeast Regional Conference Northeast Chapter President of HTCIA (2005) Recipient of the High Technology Crimes Investigation Association s Case of the Year Award (2004) Participated in the Law Enforcement Cyber Attack Technology Gap Analysis Prioritization Working Group for the Institute for Security Technology Studies at Dartmouth College (2003) Participated in the SANS Institute Interfacing with Law Enforcement FAQ for Incident Handlers and Other Information Security Professionals Project (2003) Served as an alternate member of New York Governor George E. Pataki's Cyber-Security Task Force (2002) Publications Contributing Author for the book titled The Best Damn Cybercrime and Digital Forensics Book Period (2007, Syngress Publishing) Author and Technical Editor for the book titled Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (2007, Syngress Publishing)
6 Forward contributor on the book titled How to Own an Identity (2005, Syngress Publishing) Selected Publications & Presentations & Events Attended the 13th Annual Congressional Breakfast for The National Center for Missing and Exploited Children s (NCMEC), Washington, DC (2008). Presented at the 2008 Army Counter Intelligence Conference, Reston, Virginia. Presentation topic: Network Forensics Interviewed and Quoted in The Washington Post, article titled Online Banking: Do You Know Your Rights? (4/10/2008) Presented at the 2007 HTCIA Asia Pacific Chapter Conference, Hong Kong, China. Presentation topic: Network Forensics Presented at the 2007 CSI World Conference, Kuala Lumpur, Malaysia. Presentation topic: Fighting Crime Internationally Interviewed and Quoted in American Airline s Americanway Magazine article titled I Spy; Corporate espionage has the business world shaken, not stirred. (November 2007) Presented at Techno Forensics 2007, Gaithersburg, Maryland. Presentation topic: The Beginning of the End - The Forensics Practice Collision Course Presented at The 2007 European Network Forensic and Security Conference. Heerlen Netherlands. Presentation topic: Fighting Crime Internationally Presented at The IV Conferencia Internacional de Pericias em Crimes Ciberneticos, Sao Paulo, Brazil. Presentation topic: The Future of Forensics Presented at the High Technology Crimes Investigation Association International Conference, California. Presentation topic: Enterprises Investigations and Data Correlation. Presented at the 2007 Infosecurity Conference East and Exhibition, New York, NY. Presentation topic: IT Security, Protecting Our Nation: Whose job is it anyway? Presented at the 2007 China International Conference on Gaming and Intellectual Property Theft, Shanghai, China. Presentation topic: Combating International Property Theft. Presented at the 2007 China International Digital Forensics Technology Forum, Beijing China. Presentation topic: International Exchange of Criminal Investigation Information. Presented at the New York State Bar Association s Information and Technology Law Committee Spring Meeting, New York, NY. Presentation topic: on Metadata titled Hidden Data: Its Dangers and Traps for the Unwary
7 Appeared on CNN s Pipeline on Demand (2007) Appeared on WTBQ Radio Station, The Self-Defense for Life Show (2007) Presented at the ICCYBER 2006 III Conferencia Internacional de Pericias em Crimes Ciberneticos, Brazil. Presentation topic: Computer Forensics in the USA Presented at the High Technology Crimes Investigation Association International Conference, Ohio. Presentation topic: The Future of Forensics Presented at The U.S. Department of Justice (DOJ) National Institute of Justice (NIJ), in association with CTC, Inc.-Public Safety Technology Center (CTC), 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition, Atlanta. Presentation topic: Cyber Terrorism. Presented at the Conferencia Internacional Situación Actual del Fraude Informático en América Una Perspectiva Forense, 2006, Bogota, Colombia. Presentation Topic: Combatiendo el Delito Informático y Cooperación Inter-Agencias Presented at the Congreso Internacional La Cibercriminalidad Hoy for the Procuraduría General de la República (PGR), 2006, Mexico City. Presentation topic: Bridging the International Gaps in the Fight Against Cyber Crime. Interviewed and Quoted in Popular Mechanics Magazine, article titled Who s Stealing your Identity? (February 2006 Issue) Presented at Infosecurity 2005, New York City, Presentation topic: Wireless and Mobile Security. Quoted in the CSOonline.com article titled Cops and Crooks Find New Uses for Mobile Phones (2005, Presented at the International Security Conference 2005, Las Vegas, Presentation topic: Bridging the Gaps Between the Public and Private Sector. Presented at the South Carolina Secret Service ECTF Quarterly meeting 2005, Presentation topic: Bridging the Gaps Between the Public and Private Sector. Featured in the Government Computer News for the article titled The Invisible War on Terrorism (2005, Served as a discussant, on a panel for Research and Development Directions for Cyber Attacks Investigative Technologies, at the 2003 National Institute of Justice Annual Conference on Criminal Justice Research and Evaluation. Quoted extensively in the GovExec.com article titled Security officials discuss efforts to combat computer crime (2003, News worthy arrested published in the New York Post (2002,
8 News worthy arrest published in the Times News Weekly Internet Paper for fraud (2001,
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS AND
CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy
Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West
THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY
, CISSP, CPP, CISA, CISM, CFI, CHS-III [email protected] SUMMARY Mr. Welch has over twenty years in the Security and Information Systems business, twelve of which he was directly responsible for
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner
Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:
S. Robert Radus, CPA CFE PI Curricula Vitae Catalogue of Forensic Accounting and Computer Services Examination of plaintiff, respondent, and defendant books and records to determine: 1. Violations of Law.
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC
Digital Forensics Academy, LLC Chief Scientist, April 2012 Present Williamsburg, VA Terrance Maguire Chief Scientist Digital Forensics Academy, LLC PO Box 5033 Williamsburg, VA 23188 202-630-7094 [email protected]
Keith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
Director of Computer Forensic Services
www.orionforensics.com Call us:02-714-3801-3 Director of Computer Forensic Services I am a self-motivated person, with the ability to work unsupervised or as part of a team. As a Director and well-trained
Maryland Leaders Raise Concerns about Computer Forensic Shortages IN THIS ISSUE. School of Graduate and Professional Studies Issue:
stevenson university US FORENSIC FOCUS FOREN Collected By: School of Graduate and Professional Studies Issue: Fall 2015 IN THIS ISSUE Maryland Leaders Raise Concerns about Computer Forensic Shortages A
Name of presentation Company name
Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA
Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN 46556 [email protected]
Curriculum Vitae Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN 46556 [email protected] EDUCATION University of Notre Dame, Notre Dame, IN Graduate Student Cognition, Brain, and Behavior 08/2012 to Present
WILLIAM M. MICHAELSON, C.P.A., C.F.E., M.A.E., D.A.B.F.A., C.F.F. CURRICULUM VITAE
CURRICULUM VITAE EDUCATION Bachelor of Business Administration, Accounting Major, January 1967 Selected for Beta Alpha Psi, National Accounting Honor Society University of Miami CERTIFICATIONS Certified
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Cyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)
Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Jibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Marjorie E. Harris 2545 Bellwood Road Richmond, Virginia 23237 margie@integrity-forensics.
Marjorie E. Harris 2545 Bellwood Road Richmond, Virginia 23237 [email protected] My career began in forensics as a criminalist with the Independence, Missouri, Police Department Crime Laboratory
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor
New Hampshire Cyber Crime Initiative Overview Briefing NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor Background: Cyber Crime Many traditional crimes now have a cyber component
Network Engineering Technology
Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Roy D. Rector CFCE EnCE
1803 West Avenue Austin, Texas 78701 (512) 895-9555 (512) 895-9555 www.r3forensics.com Roy D. Rector CFCE EnCE Operations Manager / Senior Forensic Examiner Roy D. Rector is a founder and the Senior Digital
CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE
CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 [email protected]
Cyber Security, Cyber Crimes and Cyber Laws
Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information
Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015
Alvarez & Marsal Global Forensic and Dispute Services 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
Services. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio, Video & Image Forensics & Forensic Photography
Stutchman Forensic Laboratory Audio, Video & Image Forensics, Forensic Photography 421 Walnut Street, Suite 120 707 257-0828 Fax 707 257-3240 www.stutchmanforensic.com email: [email protected] Curriculum
A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
ICT Barriers, High Tech Crime, and Police
ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College
Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio & Video Forensics Forensic Photography
Stutchman Forensic Laboratory Audio & Video Forensics. Forensic Photography 421 Walnut Street, Suite 120. 707 257-0828. Fax 707 257-3240 www.stutchmanforensic.com email: [email protected] Curriculum
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
Professional Experience
Professional Experience IT Operations & Cyber Security Manager Contractor United States Federal Government, National Security 09/2015 PRESENT Adjunct Faculty Public College Information Technology Department
How To Write A Crash Reconstruction
Curriculum Vitae C. Dean Brewer Traffic Collision Reconstruction And Computer Animation Specialist ACTAR #1225 EDUCATION: Associate of Arts (Admin of Justice) San Bernardino Valley College Bachelor of
WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
LESLIE G. WISER, JR. CURRICULUM VITA. Education. Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh, Pennsylvania
LESLIE G. WISER, JR. University of South Carolina 115 Currell College 1305 Green Street Columbia, SC 29208 CURRICULUM VITA Education Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh,
SECURITY CAREERS. Defining Jobs, Compensation, Qualifications. by Jerry Brennan and Steve Walker
SECURITY CAREERS Defining Jobs, Compensation, Qualifications by Jerry Brennan and Steve Walker SECURITY CAREERS DEFINING JOBS, COMPENSATION, QUALIFICATION Table of Contents Chapter 1: Helping the Industry
The Massachusetts Strategic Plan for Cyber Crime
The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,
Digital War in e-business
Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce
IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
Presentation Presented By FORENSIC INVESTIGATIVE TEAM
Presentation Presented By FORENSIC INVESTIGATIVE TEAM Proud of our Past - Focused on your Future! Our investigative team has received extensive training by the American Institute of CPA's, Association
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
Certification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
William F. Leo Forensic Identification Consultant www.fingerprintidentification.net. Credentials
William F. Leo Forensic Identification Consultant www.fingerprintidentification.net [email protected] Credentials Master of Science Degree Criminology Indiana State University Emphasis
THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS
THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS DAY ONE Fraud Trends 2012 AND PRESENT OUR 5th ANNUAL TRAINING SEMINAR DATE:
Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS
Reynaldo Anzaldua EDUCATION University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS University of Texas Pan American, Edinburg, TX MBA/MIS GPA:
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
Kim Basinger RN, CA-CP SANE, SANE-A, SANE-P, CFN, CFC, DABFN, DABLEE, FACFEI
Kim Basinger RN, CA-CP SANE, SANE-A, SANE-P, CFN, CFC, DABFN, DABLEE, FACFEI P.O. Box 377 Mt. Vernon, TX 75457 903-355-3633 [email protected] Experience 2001-Present S.A.F.E. Solutions Mt. Vernon,
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
Global Security Program Overview
STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA UNITED STATES OF AMERICA CASE NO. 14-80031-CR-MARRA(s)(s) vs.
