If you cannot read this properly, please go to this site:

https://www.cbs.com.sg/workshops/081107-the-black-arts-of-it-security.htm
This email is an advertisement. You are currently subscribed to our mailing list.
We sincerely apologize if you find this email an intrusion of your privacy or a source of inconvenience to you.
If you no longer wish to receive our email advertisements - please reply "unsubscribe" Thank you.

TRAINING WORKSHOPS
Quick Links
» Understanding Digital Forensics
» Course Outline
» Who Should Attend
» Internationally Renowned
   Master Trainer
Course Information
Date:07 Nov 08 (Fri)
Time: 9am to 5pm
Venue: Concorde Hotel, Orchard
Fee: S$800 Nett
Register and pay *S$680 (NETT) before 24th Oct 08 to qualify for the Early Bird Discounts

Registration is on a 1st come 1st serve basis. Register early to avoid disappointment.
Click here for registration form

For more information, please contact Jez @ 9767 9686 or enquiry@cbsgroup.com.sg
  1 Day The Black Arts of IT Security and Digital Forensics for IT Managers and Professionals

Your Opportunity to learn from Internationally Renowned CEO for one of Australasia's leading computer forensic and computer investigation business CIA Solutions, Phillip A Russo.

Understanding Digital Forensics

Digital forensics put simply, is the collection, preservation, analysis and presentation of evidence gathered from a digital environment, which may provide actual or supporting admissible evidence for a criminal proceeding, civil disputes or human resources or employment proceedings. There are a number of well-established procedures, which must be applied to computer investigations, which involve the collection, preservation and analysis processes.

In currently society, computers are of great importance, as majority organizations use it to store large capacity of confidential information that would greatly affect the organizations operation. Due to the increase in the influence of computers in organizations, therefore it is important for companies to equip their systems with stringent security systems to prevent any misuse, unauthorized access and stealing of confidential information.

Course Outline

Start with IT Security Basics
  • The common threats - Malware (viruses, worms, Trojans and rootkits)
  • External threats
  • The internal threat - fact or fiction
  • Your Privacy act
  • Monitoring Network Traffic - The good the bad and the useless
  • Policies Procedures - where to get them from
  • Wireless Networks Security
  • Phising and Pharming scams same game different media
  • Take down a Phising site ( Discussion on experiences)
Who's in Control
  • IT Governance does it help you control your business or does it control your business
  • A fresh approach - Welcome to the zoo
Keeping your company secrets ... secret
  • Formatting Vs Forensic data Wiping
  • Unwanted recovery of data
  • Recovery of passwords, banking and internet details and history
  • Encryption .. What is and what is not protection
  • Laptops cameras and other security worries
  • Mobile phone forensics
  • Intellectual Property Leakage
  • Identity theft
  • A look at Email analysis
Demonstration - covering various scenario

E-Discovery
  • What is it
  • Do you need it
  • Does it need to be so expensive
  • Tools
Computer forensic the basic ingredient
  • Either you are or your not - no half way
  • Why do we need Forensics?
  • Investigations Vs Forensic Analysis
Forensic Capabilities - why the expense
  • Developing in-house Vs Contractors
  • All computer experts are not equal
  • Forensics means giving evidence
  • Qualifications and experience is a must
  • Image Vs Analysis
  • Forensic Images and courts
  • What legal responsibilities exist
  • Who makes a good witness
Company regulatory requirements - do they exist
  • Local regulations and obligations
  • Reporting obligations and law enforcement requirements
Case studies - Forensics a Reactive Response

Computer Imaging Software
  • Pros and cons between the two different types
  • Ghosts that haunt you (the pros and cons of Symantec ghost)
  • Have a Forensic plan and image now not later
Case studies - Forensics as Proactive

Courtroom Scenarios

Where to from here
  • Introduction to the Imaging course
  • Introduction to hardware / Imaging course
  • Introduction to Analysis
  • Other courses available
  • Introduce CIA Solutions analysis services

Who Should Attend:
  • Senior officers from government & not-for- profit sector
  • Non-IT executives who need to understand digital forensics
  • GMs, Profit-Centre Managers who have assumed Security/IT security responsibilities
  • Sales & Marketing Managers
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • Product & Marketing Managers
  • Project Managers
  • IT Managers
  • Security Supervisor
 
Internationally Renowned Master Trainer:

Phillip A Russo
CEO for one of Australasia's leading computer forensic and computer investigation business CIA Solutions

Phillip A Russo is a qualified Certified Fraud Examiner CFE an AccessData Certified Examiner (ACE) and an AccessData Certified Instructor (ACI). He is also the CEO for one of Australasia's leading computer forensic and computer investigation business CIA Solutions.

Phillip is an ex law enforcement officer within the Western Australian Police Service with almost 17 years of experience , including being a forensic investigator and training officer within the Computer Crime Squad. During this time he has had joint papers published within international computer security forums including Moscow and New York, and recently presented at the Information Security Summit in Hong Kong in November 2006.

He has since moved onto being responsible for building one of Australia's first banking forensic capabilities for Halifax Bank of Scotland Australia HBOSA and chaired the incident response team within one of Australia's leading banks "Bankwest", dealing with issues pertaining to online fraud including phishing and trojan attacks aimed at the Australian banking communities.

For over 5 years now Phillip has been instructing many It Professionals in the art of computer forensics , and has been employed by Guidance software :Encase and the Accessdata Forensic Tool Kit.

Due to his training experience with AccessData his Australian training qualifications and experiences as a police academy instructor, he has been called upon by the Australian High-tech Crime Unit AHTCU, Australian federal and state police, Australian Defense, world leading banks and multinational companies including the big four to train and develop their staff within the area of computer forensics.

In Nov 2006 he played an integral part of a nationally significant case involving the first person charged under the new cyber crime legislation. The Australian Federal Police and the Commonwealth Department of Public Prosecutions engaged Phillip as their computer forensic expert witness. The defence had initially entered a plea of not guilty to 16 charges however after the evidence from Phillip's investigations was presented to the court the defense changed their plea to guilty to all 16 charges.

July 2007 Phillip has just completed a 7 week extended tour of the UK , USA and Australia , delivering training and expert advice to companies and law enforcement agencies including Scotland Yard, US Homeland Security , Boeing AFP and many other agencies and corporate entities. Phillip was also given the honor of delivering training at a number of the FBI's RCFL (Regional Computer Forensics Labs) duringthe USA trip.

Phillip consults from his computer investigation company CIA Solutions based in Perth Western Australia where he delivers computer security, investigation and forensic solutions to clients worldwide.