Computer Crime and Forensics

From: Sally Gibbs (Sally.Gibbsat_private)
Date: Wed Aug 21 2002 - 04:26:37 PDT

  • Next message: Michael Legary: "Termlog - System terminal I/O and key logging program"

    If you are responsible for helping to prevent computer crime in your
    organisation then this autumn event on computer crime and forensics may be
    of interest to you ...
    
    Who's Minding the Shop?
    Computer Crime and Forensics 2002
    
    16-17 October 2002
    Billesley Manor, near Stratford Upon Avon
    
    This conference will reflect the current state of understanding of the
    Computer Crime and Forensics industry.  It will also provide a forum for the
    introduction of ground-breaking ideas.
    By combining lectures, experiential learning sessions, group discussion and
    networking this event will provide a powerful environment for inspiration
    and invention. 
    
    The world is becoming smaller as more and more organisations and individuals
    connect electronically. As a result we are witnessing an alarming increase
    in white-collar computer crime and abuse of internal systems. The financial
    losses of identified crimes are increasing year on year.
    
    Computer crime may hinge around one computer or whole networks.  After the
    proverbial horse has bolted computer forensic specialists come in and piece
    together what happened.  If spotted early enough forensics can actually
    enable you to catch the perpetrator red handed!
    
    This event is for
    Heads of IT
    Heads of Internal Audit and Risk
    Heads of Internal Investigation
    Law Specialists in Fraud, Computer Law and Commercial Litigation. 
    
    What we will cover
    Theft of Proprietary information (Trade secrets / Client information)
    Financial Fraud
    Economic Espionage
    Cyber Extortion
    Sabotage
    Insider Abuse
    Money Laundering
    
    You will learn
    Social engineering - people, the most prevalent threat.
    How to profile a perpetrator
    What is and is not admissible evidence - the legislative and jurisdictional
    framework is highly variable and requires a delicate understanding of the
    principles to avoid potentially embarrassing and costly mistakes.
    Data Protection, Regulation of Investigatory Powers Act (RIPA), Lawful
    Business Regulations, The Human Rights Act and Electronic Discovery
    Disclosure
    Run a real time 'whodunnit' - an interactive workshop developing
    investigation skills
    What technology there is and where forensic technology is going - ground
    breaking 
    How best to protect your company and it's information 
    
    The issue
    The threat from computer crime and other information security breaches
    continue unabated and the financial toll is mounting.
    
    	*	Technology alone cannot thwart cyber attacks
    	*	The threat from inside the organisation is far greater than
    the threat from outside
    	*	Security comes from understanding systems, goals and methods
    	*	Increased recognition that information has value
    	*	As the world becomes more electronically connected and
    integrated, attempts at committing financial fraud are only going to
    increase
    	*	Greed and revenge are not the only motives.  Some cyber
    crimes are crimes of passion
    
    Cases
    	*	July 2001 - Avant (software company) were ordered to pay
    $182million in restitution for stealing source code (proprietary
    information) from Cadence, one of their competitors.
    
    	*	In one case several years ago, involving Avery Dennison, one
    lost secret formula was quantified as being worth more than $40million.  In
    that case, Avery Dennison used only the cost of their investment.  If you
    were a large company, don't you think the loss of reputation alone due to a
    theft, say, of customer information entrusted to you would be worth more
    than $50million
    
    
    Professional Training
    
    Attendance at this conference will contribute towards your professional
    training development.
    
    	*	Foundation Certificate in 'Effective Criminal
    Investigations' - issued by a leading industry training company
    	*	CPD applied for
    
    
    Venue Features
    
    Listed in the Domesday Book Billesley Manor is set in eleven acres of
    grounds and has an indoor swimming pool, tennis courts and croquet lawn.
    There will be scheduled time for use of the hotel facilities.
    
    During the event there will be a chance to let your imagination and
    investigation skills come to the fore during our cyber murder mystery
    evening. To be played over a four course dinner with wine.
    
    
    Get more information
    
    Join the Who's Minding the Shop? email list and receive updates on events,
    advance programme information and details of offers.
    
    	Please add me to the Who's Minding the Shop? email list.
    
    	Please send me           copies of the programme when it becomes
    available.
    
    	Please provisionally book me          delegate places.  I enclose
    x£935 +vat
    		(Places are strictly limited. Delegate passes are issued on
    a first come first served basis)
    
    Return to;
    
    Sally Gibbs, Who's Minding the Shop?
    21 Presley Way, Crownhill
    Milton Keynes MK8 0ES
    
    Telephone: 0870 745 0029
    Fax: 01908 263301
    Email: sally.gibbsat_private
    
    
    ______________________________________________________________________
    Important Email Information
    
    The information in this email is confidential and may be legally privileged.
    It is intended solely for the addressee.  Access to this email by anyone
    else is unauthorized. If you  are not the intended recipient, any
    disclosure, copying,  distribution or any action taken or omitted to be
    taken in  reliance on it, is prohibited and may be unlawful. If you are  not
    the intended addressee please contact the sender and  dispose of this
    e-mail.
    
    
    
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Mon Aug 26 2002 - 03:37:45 PDT