Cyber Florida invites state and local law enforcement personnel across the Sunshine State to attend this free, one-day workshop presenting the latest insights, methodologies, and updates related to cybercrime. Funded by a grant from the Federal Emergency Management Agency, this event offers an impressive lineup of experts in various domains of cyber investigations, providing a valuable knowledge-sharing platform for officers and officials keen on enhancing their investigative capabilities in an increasingly digital world.
Note: Please select ONE date/location—we are offering the same event at multiple locations for ease of travel.
Dr. Jordan Howell dives into the world of publicly available data and how it can be harnessed to aid in cyber investigations. Dr. Howell will discuss key tools, techniques, and resources available in the realm of OSINT.
10:15 - 11:15 am: Cybercrime Legal Update
Assistant U.S. Attorney Greg Schiller will provide attendees with the latest updates in the legal landscape surrounding cybercrime, providing a clearer picture of the challenges and opportunities facing law enforcement.
11:45 am - 12:45 pm: Current Forensics Challenges
In this session, veteran criminal investigator Chris Gastardi will address the ongoing challenges forensic experts face in digital investigations and cutting-edge techniques to overcome them.
12:45 - 1:45 pm: Networking Lunch (lunch provided, value less than $50)
1:45 - 2:45 pm: Cryptocurrency Investigations and the Blockchain
Cryptocurrencies present unique challenges in the world of cyber investigations. Larry Nielson, CFE, CTCE, CRC, Financial Crimes Detective at the Palm Beach County Sheriff’s Office, will delve deep into the world of blockchain and shed light on techniques to trace, track, and investigate cryptocurrency-related crimes.
3:00 - 3:45 pm: Dark Web Investigations
The Dark Web remains a mystery to many. Jeff Burke, special agent with the Defense Criminal Investigative Service, will uncover the layers of the Dark Web, providing insights into how to navigate, investigate, and track criminal activities on this hidden part of the internet.
4:00 - 5:00 pm: Cyber Investigations
Retired FBI Supervisory Special Agent Chuck Esposito gives a comprehensive look into the realm of cyber investigations, discussing everything from current threats to mitigation strategies.
Join Cyber Florida Senior Fellow Stacy Arruda, Founder and CEO of the Arruda Group and former FBI Supervisory Special Agent, for an eye-opening experience that will help you better understand how to prevent and recover from cyberattacks. The event starts with Network Noise, a three-hour tabletop exercise where real-world cyberattack scenarios illustrate the far-reaching effects a cyberattack can inflict on your organization. Bring your leadership team to learn how cyberattacks impact not only IT but also legal, finance, operations, human resources, public relations, and other departments.
Once you understand the threat, move on to preparation with a session on creating a comprehensive cyber incident response plan specific to your organization. You’ll leave equipped with a template and foundational plan you can take back to complete and test with your organization.
The International Association of Certified ISAOs (IACI) and Cyber Florida jointly present this session of Cybersecurity Education.
In today's world, almost all activities take place over the internet, such as banking, homework assignments, television programs, phone conversations, and more. While the internet has positively impacted the way we work, learn, and communicate, it is also used by those with malicious intentions.
During this hands-on webinar, experts from Stamus Networks will demonstrate what bad actors do, how malware operates, and how to detect and catch these intrusions. We will also walk through the basic principles of network threat hunting and will demonstrate how to uncover ransomware and Advanced Persistent Threats.
Attendees will learn how to:
Use Suricata as a monitoring tool
Chase APTs and malware actors, known and unknown
Hunt and investigate using open-source tools
Recognize types of malware, behaviors, and current trends
Experience/feedback in malware IR/hunting/investigations
Goal of Network Forensics – purpose and how it’s collected & analyzed
Overview of Suricata as a monitoring tool
Pyramid of pain (chasing APTs and malware actors, knowns and unknowns)
Overview of Ransomware (types of malware, behaviors, current trends)
Case-study: walk through an example of APT case
Hunting and investigation: Easiest way to spin up a complete network monitoring distro
with Suricata for Hunting, teaching and investigations comprised of only open-source tools (docker-based, runs on Linux: Ubuntu/Debian etc)
Case-study (hands-on): live example of Ransomware malware network traffic
Free and OSS Resources for malware training , data and investigations