Presented by C-T Watch
You may be eligible for up to 7 CPE
May 18th – 8:45am to 12:30pm
Open Source Intelligence (OSINT)
C-T Watch, Inc. provides specialized open source (OSINT) training. Let us teach you to become OSINT experts. We will train you in the art and science of digital investigations by guiding you to the hidden doors of social media and illuminating the dark corners of the web. Gain the competitive advantage and experience the C-T Watch, Inc. training curriculum, designed to empower all levels of technical aptitude. No coding, no hacking, just the latest in open source intelligence techniques. Knowing and understanding how to effectively access the largest source of archived information of all time is our specialty, let us pass it on to you. Understanding open source intelligence is more vital than ever, making our training a necessity for law enforcement, educators, businesses, leaders and security professionals alike.
The Exploitation & Weaponization of Your
Personal Data By Criminal Actors—Digital Exhaust
This course identifies possible adversaries and the techniques that they use against us to learn more about us in an effort to use our own data as a weapon. Through this course, we will discuss possible adversaries, motives, and basic techniques used. The journey then moves to a discussion about leveraging false, partially false, and truthful data on social media and the internet at-large. Here, the participants will learn about data minimization in addition to the use of disinformation and deception in an effort to reduce their attack surface. The participants will then be taken on a survey of social media and accounts across the internet with a specific emphasis on how an adversary may identify them on more than social media, possibly leading to more accounts being compromised. The session will conclude with the participants learning how to be more secure online from the lens of an Open-Source Intelligence investigator and considerations when choosing secure technologies. Topics: 1). High level OSINT discussion to understand adversaries and their normal techniques. 2). Disinformation and Deception on a personal level. 3). OPSEC Techniques – Social Media and Internet Accounts. 4). OPSEC Techniques – Leveraging secure technologies.
May 19th – 8:45am to 12:00pm
Insider Threat Awareness
This introductory course is designed for corporations and critical infrastructure and key resources (CIKR). This course is an introduction to how to best assess the needs of your organization, and the general first steps to form an insider threat program. Discussions will center around building something with minimal or no budget. Definitions, scope, industry standards, best practices, factors to consider before you start, planning and implementations tips are included. Additionally, we will cover why there is no “one-size-fits-all” approach for insider threat programs, and why you need to factor in your organization’s culture. This course covers the following: -Case studies -Strategy and Planning -Use of an Insider Threat Steering Committee -Program definitions and scope -How to start a program without a budget.