ISSWorld Latin America

Similar documents
Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering JULY 2016 JOHANNESBURG, ZA

ISSWorld Asia. Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering

Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering

How To Use The Internet For Intelligence

Cybersecurity Delivering Confidence in the Cyber Domain

Governmental Security Solutions. Elaman The bridge to Trust and Security

Advanced Threat Protection with Dell SecureWorks Security Services

Comprehensive real-time protection against Advanced Threats and data theft

t/erint en z en CD a: "'- c. ea Q) 0 ~ ~ Q) ea '(3 POWERING ACTIONABLE INTELLIGENCE ~~~> ~ - "'0 s:::: LL. ea (.) (ij.s:::: "'- :t: Q) ea 'E

WHITE PAPER. Gaining Total Visibility for Lawful Interception

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

McAfee Network Security Platform

EAGLE EYE Wi-Fi. 1. Introduction

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Content Security: Protect Your Network with Five Must-Haves

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

KEY TRENDS AND DRIVERS OF SECURITY

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

After the Attack. The Transformation of EMC Security Operations

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Defending Against Cyber Attacks with SessionLevel Network Security

Setting the Standard for Safe City Projects in the United States

A Model-based Methodology for Developing Secure VoIP Systems

KUDELSKI SECURITY DEFENSE.

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

QRadar SIEM and FireEye MPS Integration

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Big Data overview. Livio Ventura. SICS Software week, Sept Cloud and Big Data Day

Security strategies to stay off the Børsen front page

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Gregg Gerber. Strategic Engagement, Emerging Markets

Advanced Persistent Threats

Covert Operations: Kill Chain Actions using Security Analytics

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

TRITON APX. Websense TRITON APX

CYBER SECURITY, A GROWING CIO PRIORITY

Comprehensive Advanced Threat Defense

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

Update On Smart Grid Cyber Security

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

First Line of Defense

How To Choose Radisys

First Line of Defense

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Delivering Managed Services Using Next Generation Branch Architectures

Cisco Advanced Malware Protection for Endpoints

The Hillstone and Trend Micro Joint Solution

VERINT Company Introduction. Gabriel Horowitz VP Sales Europe

Global Security Academy

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Predictive Cyber Defense A Strategic Thought Paper

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Fighting Advanced Threats

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Advanced Threats: The New World Order

Address C-level Cybersecurity issues to enable and secure Digital transformation

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Ty Miller. Director, Threat Intelligence Pty Ltd

Cyber solutions for the fight against crime

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Cisco Advanced Malware Protection

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

How To Create An Insight Analysis For Cyber Security

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Cisco Advanced Malware Protection for Endpoints

Surveillance and Security Systems

Security Analytics for Smart Grid

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Security Intelligence Services.

IBM Technology in Public Safety

Data Center security trends

Perspectives on Cybersecurity in Healthcare June 2015

ENABLING FAST RESPONSES THREAT MONITORING

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

From Lawful to Massive Interception : Aggregation of sources. amesys - Prague ISS World Europe 2008

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Transcription:

ISSWorld Latin America Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Intelligence Gathering Where Law Enforcement, Public Safety, Telecoms and the Intelligence Community turn for Technical Training and Product Selection Lead Sponsor Associate Lead Sponsors Exhibitors and Sponsors For Registration and Hotel Information Go To www.issworldtraining.com

ISSWorld Latin America Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Intelligence Gathering ISS World Latin America is the world s largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic and Network Intelligence Gathering. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today s telecommunications network and the Internet. ISS World Latin America Program: Track 1 ISS for Lawful Interception and Criminal Track 2 Encrypted Traffic Monitoring and IT Intrusion Product Training Track 3 LEA and Intelligence Analyst Training and Product Demonstrations Track 4 Social Network Monitoring and Big Data Analytics Product Demonstrations Track 5 Mobile Location, Surveillance and Signal Intercept Product Demonstrations Pre-Conference Training Seminars Seminar 1 09:00-17:00 Online Social Media and Internet Presented by Charles Cohen, Cohen Training and Consulting, LLC Charles Cohen also holds the position of Commander, Cyber Crimes Investigative Section, Indiana State Police, USA 09:00-10:00 The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis OSINT and Criminal Metadata Exploitation in Criminal EXIF Tags and Geolocation of Devices for and Operational Security 14:45-15:45 Case Studies in Metadata Vulnerability Exploitation and Facial Recognition 16:00-17:00 What Investigators Need to Know about Emerging Used to Hide on the Internet Seminar 2 09:00-17:00 Practitioners Guide to Internet Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this. This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar. 09:00-10:00 The World Wide Web and the Internet Recognizing Traffic Data WIFI and Mobile Data Emerging, Masking Tech and Tools 14:45-15:45 Advanced Techniques in Tracing Suspects 16:00-17:00 Exhibits Open Source Intelligence Training (OSINT) 21 October 2015, 12:00-18:00 22 October 2015, 9:30-12:00 For Complete ISS World Conference Session Descriptions, Go To www.telestrategies.com

Welcoming Remarks 8:45-9:00 Tatiana Lucas, ISS World Program Director, TeleStrategies ISS World Keynote Addresses Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions Dr. Jerry Lucas, President, TeleStrategies Track 1: ISS for Lawful Interception This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure. 9:00-17:00 Online Social Media and Internet Presented by Charles Cohen, Cohen Training and Consulting, LLC Charles Cohen also holds the position of Commander, Cyber Crimes Investigative Section, Indiana State Police, USA Zero In On Your Target: Advanced Social Engineering Techniques Utimaco Umbrella A Case Study Presented by Utimaco LIMS 11:30-12:00 Scalable LI Solutions for dealing with LTE/VoLTE Roaming and OTT Encryption Michael Hammer, Principal Engineer, Yaana 14:00-14:30 Big Data for Agency s & Telco s; Benefits in a Segmented & Shared Architecture Luis Alves, Senior Director Business Development, AQSACOM 14:30-15:00 From the haystack to the needle: Metadata Gathering and Analysis Deep Packet Inspection in Clouds and NFV Curt Schwaderer, VP of Engineering, Yaana Track 2: Encrypted Traffic Monitoring and IT Intrusion Product Training Community Attendees Maximum Impact Evolution of IT Presented by FinFisher Out of the Dark and Into the Content: Gain Intelligence Value in Spite of Encryption and Other IP Challenges Solving the Impossible: A Live Demonstration of Unconventional Surveillance Tools from Hacking Team 15:15-16:15 Advanced tactical solution for target GPS monitoring Track 3: LEA and Intelligence Analyst Training and Product Demonstration Track Community Attendees. New Cutting-Edge Surveillance Tools from Hacking Team Analyzing Multiple Data Sources in One Application 9:30-10:00 Kidnapping Providing actionable insight from CDR data 10:00-10:30 Oil theft Suspect discovery based on CDR data Speeding up Criminal How to significantly decrease time necessary to identify targets Lawful Interception. Integrated solution for Massive Voice and Data Gathering, Correlation and Decryption Communications Insight: Identify Leaks, Threats, and Cyber Attacks More Quickly, Easily, and Cost- Effectively Second Phone discovery An event based analytical approach 16:15-16:45 Finding, Investigating, and Stopping Stealthy Persistent Threats 16:15-16:45 A versatile platform for Real time Monitoring 8:30-9:00 Kidnapping Providing actionable insight from CDR data Oil theft Suspect discovery based on CDR data A versatile platform for Real time Monitoring

Track 4: Social Network Monitoring and Big Data Analytics Product Demonstration Community Attendees 8:30-17:00 Practitioners Guide to Internet Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police Live Demonstration of SnapTrends: Real-Time Location-Based Social Intelligence Presented by Chenega International Building the Complete WEBINT picture: Leveraging Target-Centric Big Data with Virtual HUMINT Daniel Geifman, Sales Manager, WebintPro Ophylink Big Data Visibility Platform Flexible, Scalable Available for Intelligent Analytic System Presented by OPhylink Communication Technology The New Investigator Toolbox: from Tactical to Open Source Live Demonstration of SnapTrends: Real-Time Location-Based Social Intelligence Presented by Chenega International Virtual Human Intelligence: be inside, stealth, future and technology proof. Some use cases 14:00-14:30 Zero-in on Drug Cartels by fusing sources: Case Study 14:30-15:00 Extend Your Reach, Dominate Your Horizon: Use Airborne and Other Covert Tactical Methods to Monitor Hard to Reach and Inaccessible Areas 15:45-16:45 Big Data; Mass & Targeted Interception for National Security Julian Fellows, Executive Product Manager, AQSACOM Facebook, Gmail, Skype, WhatsApp... Communication goes encrypted! Use the power of massive IP monitoring to get access to secure content in minutes. A new approach to the investigation, beyond the Lawful Interception without Hacking Capabilities Person of Interest System: Automatic Mass Social Media Monitoring for Threat Detection and Early Warning Daniel Geifman, Sales Manager, WebintPro 8:30-9:00 Catch Me If You Can: Navigate the Deep and Dark Web to Follow Your Target s Every Move Cyber Security - The Last Line of Defense for Your Assets: Fighting Targeted and Well-Funded Advanced Cyber Attacks Launched by Criminals, Hacktivists, or Nation States 10:30-11:30 Mobile Monitoring Solution: Find the needle in the haystack. Use cases for Law Enforcement Agencies using location information and speaker identification. Presented by VASTech DPI and Social Media Analytics Curt Schwaderer, VP of Engineering, Yaana Comprehensive Solutions for Data Correlation and Analysis Integrated Interception System for Target Monitoring Track 5: Mobile Location, Surveillance and Signal Intercept Product Training This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees Satellite monitoring: All satellite data, one system. Play back of spectrum, analysis, interception and visualizing of data captured from a satellite. Presented by VASTech Miniature Video Surveillance Presented by WORLD SECURITY, SA DE CV 15:45-16:45 3i Tactical Interception System with Https, wifi and LAN Exploration with Expert Team Presented by Expert Team Nomadic equipment, wearable monitoring and field Command Centre 10:30-11:30 Audio, Video, GPS: tactical operations in a strategic vision For Registration and Hotel Information Go To www.issworldtraining.com

ISSWorld Latin America Lead Sponsors Lead Sponsor trovicor is a worldwide leader providing turnkey lawful interception monitoring and intelligence solutions. Governments and law enforcement agencies around the globe turn to trovicor for advanced monitoring and analytical fusion systems to prevent crime and enhance safety and national security in accordance with their local laws. Leveraging our sophisticated knowledge of network technologies and operations, databases, call and IP data flows and ever-changing communication protocols and applications, our customers rely on our experience in the most advanced communication networks and environments. Using our extensive knowledge of the telecommunications and IT industry, we have designed the next generation Monitoring Center capable of recording and evaluating all target related communications in one central place, which can be linked to our advanced Intelligence Platform, enabling our customers to generate and analyse data and access valuable insights and reports. The result, actionable intelligence. Associate Lead Sponsors AQSACOM is a global leader in Telecommunications Security Solutions, providing real-time Lawful Interception, Data Retention, Mobility Tracking and Surveillance Solutions. AQSACOM s core business focuses upon end-to end, turnkey systems for fulfilling Lawful Interception requirements and specializes in work involving highly heterogeneous networking and service environments. AQSACOM s diverse customer portfolio includes clients from more than 35 countries spanning 5 continents. Regional offices are located in Paris, Dubai, Hyderabad, Melbourne, Florianopolis, and New York City AREA, is the Italian leading technology Industry and provider of Unconventional Communication and IP Info-Intelligence solutions.area provides an end to end Dual Use Info-Intelligence CC forhls/hld scenarios; satisfying Government Agencies need to securely and effectively gather precious information to contrast menaces to Citizen s security and prevent digital attacks. ELTA Systems Ltd., a group and subsidiary of Israel Aerospace Industries, is one of Israel s leading defense electronics companies and a global leader in the field of Intelligence, Surveillance, Target Acquisition and Reconnaissance (ISTAR), Early Warning and Control, Homeland Security (HLS), and Cyber technology. ELTA offers comprehensive solutions, primarily based on in-house developed advanced sensors including Radar, Electronic Warfare, Communication & Cyber Systems. FinFisher solutions help government law enforcement and intelligence agencies to identify, locate and convict serious criminals. With innovative products, tailor-made solutions and end-to-end services FinFisher closes the gap in traditional investigative methods. Its portfolio allows governments to gain access to protected, offline information and relevant web-based communication channels For 10 years Hacking Team has been helping law enforcement stop crime and terrorism. In an age of universal encryption, our technology gives government agencies the ability to see communications of suspects in the clear. The latest version, Galileo enables examination of the contents of endpoint devices and offers the widest selection of infection vectors available, all without protection systems being able to detect the investigation in progress. Find out more at www.hackingteam.com IPS is a leading global provider of Communication Intelligence solutions.the company develops the most complete Monitoring Centre and Network Monitoring platform for the LI market. After 25 years of market presence and more than 10 years in active fight against cybercrime, IPS can offer state-of-the-art technology for massive Interception enhanced with in-line features facing the HTTPS challenge in the Big Data environment. Established in the year of 2010, OPhylink Communication Technology Ltd. is one of the leading one-stop solution providers of network visibility system, OEO transportation and connectivity subsystem and wireless communication products used in enterprises, data center, and service providers around China and other countries. It is a high-tech enterprise focusing on design, manufacture and marketing based on a broad portfolio of visibility and connectivity products. SS8 is a leading communications insight and network forensics company serving a global install base in three markets: intelligence and LEAs for communications analytics and investigations; enterprise security enabling threat detection across the largest networks; and compliance for CSPs and web-based application service providers facing existing and emerging lawful intercept requirements. Verint (NASDAQ: VRNT) Communications and Cyber Intelligence solutions help law enforcement, national security and other government agencies to fight terror and crime and to detect and thwart cyber-attacks.using Verint solutions, organizations can efficiently collect, monitor and analyze data from virtually any communication network or data source and turn it into valuable intelligence Exhibitors and Sponsors Exhibits 21 October 2015, 12:00-18:00 22 October 2015, 9:30-12:00