High-Tech Crime Investigation Association (HTCIA)
Webinar Access and Registration

Welcome to the HTCIA Webinar Home. 
 
If you have already registered for the Webinars and have created a user, scroll down this page and click on "View Archive" to access the webinar of your choice.

If you have not yet registered to access the HTCIA Webinars, please fill out and submit the from directly below.


* First Name 
* Last Name 
* Company 
* Phone 
* E-mail 
* - Required Information
- check box if you don't mind receiving information or news from HTCIA speakers
 
 
Submit   Reset
 

Andrew Rosen



 


Using SMART and Linux for Data Forensics

Presenter:
Date:
Duration:
  Andrew Rosen
Originally aired September 28, 2005
Approx. 60 minutes plus Q&A
Description:
  As a Forensic Computer Scientist, Andrew Rosen offers unique
litigation support services to the Legal, Law Enforcement and
Investigative communities.

With over a decade of experience in the recovery of computer data and forensic examination (computer forensics), Rosen regularly provides expert testimony in federal and state courts.

Along with training attorneys and law enforcement officials in computer investigation techniques, Rosen frequently speaks and writes on emerging matters in the field.

In summary, Rosen has a worldwide reputation for developing cutting-edge computer crime investigative tools and is frequently consulted by other professionals in the industry.
Sponsors

HTCIA

Essentialtalk

                  Essentialtalk
                     Get on with
           The Business of Doing

On-topic advice improves organizational performance by encouraging people to learn where they learn best on the job.
JITr technology will allow you to cost effectively create expert instruction for pervasive distribution via any electronic media.

Do you have knowledge that others would value?
Call 1-866-444-5085

 


Troy Larson



 


Recovering Information from Deleted Security Event Logs

Presenter:
Date:
Duration:
  Troy Larson
Originally aired February 25, 2005
Approx. 60 minutes plus Q&A
Description:
  Synopsis: A too frequent occurrence in responding to computer intrusions is finding that the security event logs have been deleted or corrupted--either through the efforts of an intruder or the assistance of IT staff. Deleted security event logs, however, even partially overwritten ones, may still contain useful information. This presentation will show investigators or responders how to find and parse fragments of a deleted security event logs to extract potentially useful information.

Bio: Troy Larson is the Senior Forensic Investigator in Microsoft's IT Security Group. Prior to joining Microsoft, Mr. Larson worked as a private computer forensics consultant, including two years with the Ernst & Young National Computer Forensics and Incident Response Team. Mr. Larson is a graduate of the University of California, Berkeley, and Boalt Hall School of Law.
Sponsors

HTCIA

Essentialtalk

 

 

 


Christopher L. T. Brown



 


Benefits & Techniques for Live Investigations

Presenter:
Date:
Duration:
  Christopher L. T. Brown,   www.techpathways.com
Originally aired January 21, 2005
Approx. 60 minutes plus Q&A
Description:
  This topic covers the benefits for using live computer forensic investigation techniques such as the ability to capture encryption passwords, and outlines the situations where these techniques may be most appropriate. Attendees will be introduced to the components of a live computer forensic investigation, shown tools for identifying the machine state to help mitigate the “Trojan defense”, and allow for the collection of live physical memory contents as well as disks. Finally the topic will wrap up with information on applying "volatile-static differential state analysis" while forensically pre-viewing live systems.

Chris Brown is the founder and Chief Technology Officer of Technology Pathways. He has over 20 years of experience in computer security and holds numerous career certifications from UCSD, (ISC)2, Microsoft, CISCO, CompTIA and CITRIX including a CISSP certification. Mr. Brown retired from service after 17 years with the US Navy including working in the Fleet Information Warfare Center on information warfare and deception. He has also held key management positions in several successful startups. Mr. Brown has specific expertise related to computer forensics, software architecture, communications, security and program management.
Sponsors

Technology Pathways

Essentialtalk

Technology Pathways provides comprehensive, affordable computer forensic tools for Law Enforcement, Corporate and Government.  ProDiscover solutions include: investigations, incident response, computer forensics, and electronic discovery.  ProDiscover can forensically examine live systems over networks and has been accepted in criminal and civil proceedings

 


Cynthia Hetherington


Advanced Internet Research and Intelligence

Presenter:
Date:
Duration:
  Cynthia Hetherington, MLS, MSM,   www.Data2Know.com
Originally aired November 17th, 2004
Approx. 60 minutes plus Q&A
Description:
 

Cynthia Hetherington is principal of Hetherington Information Services, LLC, a New Jersey based Competitive Intelligence and Business Research consultancy. She has over 10 years of experience in conducting text based, Internet and online database research, including a specialization in training law enforcement and private industry professionals' online investigative skills. She holds a Master of Library Science from Rutgers University and a Master in Science for the Management of Information Systems from the New Jersey Institute of Technology.

Publisher of the Data2know.com: Online and Internet Intelligence Newsletter and reoccurring columnist for PI Magazine and the HTCIA Newsletter.

Licensed Private Detective in New Jersey. Member of the American Library Association, American Society for Industrial Security, Association of Independent Information Professionals, Cybercops, High Technology Crime Investigation Association, Intelnet, National Association of Legal Investigators, National Council of Investigation & Security Services, Inc., NJIT Alpha Epsilon Lambda Honor Society (Past President), New Jersey Licensed Private Investigators, Society of Professional Investigators

Sponsors

HTCIA would like to thank both


and

Essentialtalk

for sponsoring this event so that there is no cost to HTCIA members to attend the live training or to access
previous event archives.


Details on:

From e-mail to PDAs to hard drives, Paraben offers specialized computer forensic software for almost any scenario. Paraben Forensics is pleased to offer training classes that supply investigators with the knowledge they need to fight the latest computer related crimes.


Laura Chappell



The White Hat/Black Hat Toolbox

Presenter:
Date:
Duration:
  Laura Chappell, Founder of the Protocol Analysis Institute
Originally aired October 13th, 2004
Approx. 60 minutes plus Q&A
Description:
  From decoys to invasive track back tools, this session covers many of the tools that can be used to attack, protect, and perform reconnaissance on a target.

In this presentation, Laura lists key functions of sniffers, HTTP reconstruction tools, honeypots/honeynets, vulnerability scanners, recon tools, interception and decoy tools.

Sponsors

Essentialtalk

“Laura Chappell’s presentation was sponsored by Essentialtalk so that HTCIA members could access the live event and the archives at no cost.”.