Event Calendar
Prev MonthPrev Month Next MonthNext Month
HTCIA Silicon Valley Chapter Training Conference
Yaana
542 Gibraltar Drive
Milpitas, CA 95035
USA
Tuesday, May 08, 2018, 7:30 AM to Thursday, May 10, 2018, 5:00 PM PDT
Category: Chapter Meeting

Overview

Come and join investigators, prosecutors, and security specialists at our 3-day annual training conference.  Each day will be packed with eight hours of training.  Breakfast, lunch, and snacks will be provided on site in order to make the most or your time.  There will be plenty of free parking available.  The training will be eligible for CFE and CPE credits.

Time   

7:30 AM – 5:30 PM – Breakfast will be served from 7:30 AM, and classes will begin at 8:30 AM.
Lunch and snacks are included too.

Registration Pricing       

Full Conference

  • $250 – HTCIA member and Law Enforcement
  • $350 – Non-HTCIA member
  • $150 – Student

Single Day

  • $100 - HTCIA Member
  • $125 - Non-member

Agenda

*Subject to change*

Tuesday, May 8

Speaker:  William Tarkington, Principal, Authoripaw Consulting
Topic: Social Engineering

Speaker: Cynthia Navarro, Principal, Finnegan’s Way
Topic: Open Source Intelligence (OSINT)

Speaker: Bryan Lee, Unit 42, Palo Alto Networks
Topic: Cyber Threat Hunting - Chasing the White Rabbit

Wednesday, May 9 - DarkNet Investigations Day

Speaker: Andrew Lewman, Managing Director, Laxdeala Technology
Topic: Introduction to DarkNet Technologies and Forensics

Speaker: Dr. Sarah Lewis Cortes, Cybersecurity PostDoctoral Researcher, Inman Technology
Topic: DarkNet Investigations and Techniques

Thursday, May 10

Speaker: Julie Lewis, President and CEO, Digital Mountain, Inc.
Topic: Digital Evidence Capture from Leading Social Networking Sites & Smartphone App Goodies

Speaker: Derrick Donnelly, Chief Scientist, BlackBag Technologies
Topic: Apple Search Warrants and APFS (Apple’s New File System)

Speaker: Todd Shipley
Topic: Following the Cryptocurrency

Speaker: Tom Flattery, Deputy District Attorney, Santa Clara County
Topic: Legal Updates

Speaker Bios

Andrew Lewman

Andrew has more than 30 years of global technology experience in a variety of domains including information security, systems administration, and data management.  His interest lies in the intersection of technology and humans.  He has been a co-founder and top executive at many high-growth, start-up companies such as TechTarget, The Tor Project, Farsight Security, and DarkOwl.  He is an advisor to military and intelligence agencies in the U.S. and its Allies, having worked on SAFER Warfighter, MEMEX, SHARKSEER, CRISP, and others.

Julie Lewis

Julie is President, CEO, and Founder of Digital Mountain.  She has over 20 years of experience working in the high technology industry and has been a long-time user of social media.  One of the key focus areas of her company is on social media preservation and monitoring.  Prior to founding Digital Mountain, Julie worked at Veritas Software with next-generation storage, security, and search companies.  At Veritas, she managed operations for new product releases across sales, marketing, product management, legal, engineering, and customer support.  Before joining Veritas, Julie worked in the venture capital and investment banking industries in both the Silicon Valley and Boston areas focusing on the Internet Infrastructure, security and software sectors.  In addition, Julie worked for two of the Big 4 accounting firms doing financial and IT auditing, as well as M&A due diligence as a CPA.  She also worked for Applied Magnetics, a publicly traded provider of disk and tape drive components.  Julie earned an MBA under fellowship from the F. W. Olin Graduate School of Business at Babson College and a BA in both Business Economics and Sociology from the University of California at Santa Barbara.  She is a member of HTCIA, American Bar Association, National Association of Litigation Support Managers (NALSM), Sedona Conference’s Working Group on E-mail Management and Archiving, Cloud Security Alliance and has received her EnCE (Encase Certification in Computer Forensics).  Julie is the founding Co-Chair of the Silicon Valley Chapter of Women in eDiscovery.

Cynthia Navarro

Ms. Navarro has worked in the area of investigations for over 30 years and is currently the President of Finnegan’s Way, an investigative consulting and training firm located in California. Cynthia manages civil and criminal investigations and consults worldwide, specializing in anti-piracy, business and intelligence backgrounds.  Prior to Finnegan’s Way, Ms. Navarro held various management positions at several Silicon Valley firms.  In these positions, she was responsible for managing business intelligence gathering, intellectual property theft investigations, interviews, cyber investigations, background investigations and training.  She has taught using the internet as an investigative tool to law enforcement and corporate investigators worldwide.

Course Descriptions

Andrew Lewman/Introduction to DarkNets – The objective of this course is to provide students with a working knowledge of darknets, their underlying protocols, and practical forensics of darknet technologies both on the wire and on devices.  Darknets are often considered to be equivalent to advanced cryptography and are sold as requiring a Ph.D.-level understanding of complex mathematics to understand.  The common practitioner can understand the common background technologies shared by most darknets without the complexities of advanced mathematics.  Conducting forensic analysis on devices or network traffic can reveal a wealth of information about the darknet technology chosen and attributes around its use.  Upon conclusion of the class, students will have a knowledge, even if just conceptual and/or working, of the technologies used by the darknets.

Julie Lewis/Digital Evidence Capture – With the continued explosion of social networking and use across both businesses and consumers, it is imperative that 3-discovery professionals and computer forensic examiners understand the most optimal commercially available tools for data preservation and investigations.  A key objective of this class is to understand what other types of communication may be available to an examiner outside of the data that resides on the laptop or desktop of a computer being analyzed.  This course will focus on the social networking and blog sites that have the leading market share and strength and drawbacks of different approaches of data collection.  We will primarily examine what social media apps are storing on smartphones compared to data that be accessed from the cloud.