Introduction to Digital Forensics

When:  Jul 31, 2019 from 8:00 AM to 9:00 AM (BO)

Presentation Overview 

Don’t be fooled and believe that you and your company are spared from being victims of cybercrime.

Cybercrime is vastly growing and is costing companies, countries and ordinary individuals billions of dollars annually; it is affecting each one of us in some way or the other. With the rapid growth and easy availability of computers and related technology, the environment is vulnerable for occurrences of cybercrimes.

The extensive accessibility of computers and Internet connections provide unprecedented opportunities to learn and communicate. Unfortunately, not all people use the Internet for these purposes - some criminals exploit the power of the Internet for criminal or terrorist purposes. The majority of terrorists’ financing occurs online via cyberpayments. Terrorists recruiting have evolved from the one-to-one meetings in caves to the one-to-many meetings in online chatrooms.

E-commerce is growing in Trinidad and Tobago where many purchases are being made online via credit cards and other electronic methods.  As such, due to the rapid increase of cybercrimes worldwide; education and training in digital forensics is imperative and should be continuous to educate stakeholders on how to investigate cybercrimes.

This session is a one (1) hour overview that introduces participants to the field of Digital Forensics and Cybercrime. Details can be found in the Presentation Content below.

 

Attendance Cost

  • ISACA Members -- FREE
  • Non-Members -- TT $200

 

Target Group

  • IT and Cybersecurity professionals
  • Audit, Risk and Compliance professionals
  • Anyone interested in getting into the field of digital forensics

 

Objectives

On completion of this presentation, participants will be able to:

  • Discuss the different types of Digital Forensics
  • Define the 4 Phases of Digital Forensics
  • Describe how each phase affects the other

  

Presentation Content 

  1. Different types of Digital Forensics
    • Computer Forensics
    • Mobile Forensics
    • Network Forensics
    • Live Forensics
    • Database Forensics
  2. Digital Forensics Process
    • Investigation preparation
    • Acquisition
    • Analysis of evidence
    • Presentation
  3. Evidence processing guidelines

Please click here to download the Cyber Security and Anti-Crime Service Ltd Company Profile

 
Breakfast is served from 7.00am.

past_event

Location

Arthur Lok Jack Global School of Business
Max Richards Drive, Uriah Butler Highway North West, Mount Hope, Trinidad, W.I.
Mount Hope
Event Image

Contact

Jo-Ann James-Leggard
868-687-3700
training@isaca-tt.org