Originally posted by: DanC
The Cassie Schansman memorial institute for advanced computer forensics?
She's still active as well as arresting GBI Agent. Cassie was the featured "expert" on Computer Trespassing.
Agenda: Cybercrime Summit Agenda PDF
Abstracts: Cybercrime Summit Abstracts PDF
Presenter Bios: Cybercrime Summit Bio's PDF (large)
Conference Overview
Speakers | Demos & Labs | Mock Trial | Hacking & Response Demo | Executive Brunch Keynote Address
Howard Schmidt, Vice Chair President's Critical Infrastructure Protection Board
Keynote Address
Mark Gage, Vice Chair, National White Collar Crime Center
Keynote Address
Phyllis Schneck, Co-Chair National InfraGard Board of Directors
Technology & the Internet: 1st and 4th Amendments
Dr. Marjie Britz, Police Science Instructor, Citadel
NIST Software Validation
Dr. James Lyle, National Institute of Standards and Technology
Hacker Interview Techniques
Dr. Bob Wynn, CISO of Georgia Technology Authority
Identity Theft
James Piercy, Georgia Bureau of Investigation
The Feds Are Coming
Atlanta FBI
Homeland Security
Atlanta FBI
Wireless Insecurity
Matthew Caldwell, Guarded.Net
Network Forensics
Matthew Caldwell, Guarded.Net
Modern Super Computers
Joe Mykytyn, Aegis Elite
Log Analysis
James Moore, Information Systems Forensic Association
Computer Incident Response
James Moore, Information Systems Forensic Association
Online Investigation Techniques
Sandra Putnam, Special Agent, GBI
Patriot Act
Cassandra Schansman, GA Assistant Attorney General
Computer Trespassing
Cassandra Schansman, GA Assistant Attorney General
Managing a Computer Forensics Program
Steve Edwards, Georgia Bureau of Investigation
Internet Safety
Steve Edwards, Georgia Bureau of Investigation
Expert Testimony--Defense
Steve Miller, Data Forensics Labs
When Technology Breaks
Steve Miller, Data Forensics Labs
CALEA Compliance for BellSouth
Ron Weaver, Security Manager, BellSouth
Network Analyzers in Incident Resonse
Kevin Beaver, President, Principle Logic, LLC
Forensic Cryptography: Working with Microsoft EFS
Eric Thompson, President, AccessData
Starting a Cybercrime Unit
David Benton, Forensic Computer Specialist, GBI
The Computer that Went Boom!
Joel Chriswell, SA Bomb Technician, GBI
Advanced Email Investigations
Thomas Akin, Director, Southeast Cybercrime Institute
Cybercrime Case Studies
Thomas Akin, Director, Southeast Cybercrime Institute
Emerging Malicious Code Threats
Roger Thompson, Director of Malicious Code, TruSecure
Privacy: Graham-Leech-Bliley Act, you, & your Company
Patrick Enyart, ISS Manager Distributed Computing, SunTrust
Mathew Haper, Information Security Officer, BankCard, SunTrust
Assessing Your Security
Tanya Bacam, Information Assurance Manger, Vigilar
Electronic Evidence & Civil Litigation
Troy Larson, Digital Evidence Specialist, Larson Gallivan, & Gallivan
Windows 2000/XP Command Line
Troy Larson, Digital Evidence Specialist, Larson Gallivan, & Gallivan
Encryption
Eric Thompson, AccessData
Case Management
Dan Mares, Mares & Company
Into to Computer Forensics
Jeff Crabtree, ISO Kennesaw State University
Cisco Router Forensics
Thomas Akin, Director, Southeast Cybercrime Institute
Managing Sex Offender's Computer Use
Jim Tanner, President KB Solutions, Inc.
Know Your Enemy: Patterns in Adult Web Sites
Jim Tanner, President KB Solutions, Inc.
Expert Testimony--Prosecution
David McLaughlin, GA Attorney General's Office
Search & Seizure
James Pace, Army Crime Lab
Forensics on Non-Windows systems
Andrew Rosen, ASR Data Acquisition & Analysis, LLC
Software Piracy
Zachary Toczynski, Interactive Digital Software Association
Handheld Storage Media
Thomas Rude, CISSP, Independent Consultant
AOL Forensics
Wade Grant, NW3C
Internet Explorer Forensics
Wade Grant, NW3C
Hard Drive Partition Tables & Recovery
Wade Grant, NW3C
Examining the Windows 9x Registry
Wade Grant, NW3C
Examining the Windows NTx Registry
Wade Grant, NW3C
Gaining Access to Windows NTx
Wade Grant, NW3C
Court Ordered Electronic Surveillance & Subpoenas
Herb Blanchard, Law Enforcement Liaison, BellSouth
The Internet: What's really going on out there.
Patrick Gray, X-Force Director, Internet Security Systems
The Network that Never, Ever goes down
Phyllis Schneck, Ph.D., Co-Chair National InfraGard Board
Homeland Security: Protecting Critical Infrastructures
David Ford, Supervisory Special Agent, FBI
The Feds are coming: Joint Efforts in Computer Crime
David Ford, Supervisory Special Agent, FBI
Basic Email Investigations
Steve Steelman, Network Security Engineer, Bellsouth.net
Basic Email Investigations
Chris Smith, Aegis Elite
Response to Cybercrime & Cyber Terrorism
Jerry Becknell, Special Agent, FBI
Common Courtroom Problems for Experts
Dr. Kris Sperry, Chief Medical Examiner, GBI
Security Your Server Room--Locksmithing 101
John Elliott, Certified Lock Smith
The Red Team (How we broke into buildings)
Jask Wiles, President, The Training Co.
Exploiting Web Applications
Caleb Sima, Founder & CTO, SPI Dynamics
Basics of PDA Forensics
Amber Schroder, Paraben
How to read partition tables
John Mellon, Key Computer Inc.
DOS/Windows Logical Structures
John Mellon, Key Computer Inc.
Demos & Labs
Booby Trapped Computer Demo
The Georgia Bureau of Investigation Bomb Squad
NeuSecure Demonstration
Chris Gutierrez, Guarded.Net
Blackberry Forensics
Michael Burnette, Rogers & Hardin
Using Linux for Forensics
Thomas Rude, CISSP, Independent Consultant
SMART for Linux Forensics Lab
Andrew Rosen, ASR Data Acquisition & Analysis, LLC
Blackberry Forensics Lab
Michael Burnette, Rogers & Hardin
AccessData Forensic Toolkit Lab
Eric Thompson & David Benton, AccessData & GBI
Introduction to AccessData Forensic Toolkit
Eric Thompson, AccessData
Encase v4.0 Lab
Gary Lowe, Cobb County PD
Introduction to Encase v4.0 Lab
Gary Lowe, Cobb County PD
I-Look Investigator Lab
Kelly Rhodes & Mike Toto, US Army Criminal Investigations Lab
Mock Trial
Judge:
Chief Engineer & Counsel:
Prosecutor:
Forensic Expert:
Forensic Image Creator: Steve Boswell, Clayton County Superior Court Judge
Steve Miller, Data Forensics Labs
Cassandra Schansman, GA Assistant Attorney General
Andy Rosen, ASR Data Acquisition & Analysis, LLC
John Mellon, Key Computer Services, Inc.
Hacking & Response Demo
Created by James Moores, Information Systems Forensic Association founder and president... Details coming soon...
Executive Bruch
An Invitation only Executive brunch that includes the following presentations:
Protecting Critical Infrastructure
Howard Schmidt, Vice Chair, President Critical Infrastructure Protection Board
Setting up a Cybercrime Unit
Steve Edwards, Supervisory Special Agent, GBI
InfraGard
Jerry Becknell, Special Agent, FBI
Hosted by the Atlanta High Tech Crime Investigation Association and the Southeast Cybercrime Institute