Cryptocurrency Fraud and Blockchain Forensic Analysis

Bank information security

When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss: Cryptocurrency fraud schemes, including real stories from the trenches; AML issues with bankers, hidden assets, payments by drug lords and ransomware; Blockchains role in tracking the transactions - and its limits.
Watch Now

Spotlight

????????? ???????????????????????????????????????????????????????????????????????????????????????????????? ??????????????????????????? ???? eBook ????????????????????????????????????????????? ?????????? IT ?????????????????????????????????? ????????????????????????????? ????????????????????????????????????????? e-Book ??????????

OTHER ON-DEMAND WEBINARS

Practical Risk Management Steps for the Threat Hunter

Simplilearn

What is threat hunting and why is this field gaining popularity among security organizations? Threat hunting emphasizes on a proactive approach to security and encourages organizations to anticipate and manage potential security breaches and hacks. Join Dr. James Stanger, Sr Director of Products at CompTIA, in a live webinar as he walks us through the critical areas of threat hunting and how this can enhance current cyber security measures for organizations.
Watch Now

Cybersecurity in a Cloud-Based World

RedVector

Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure. Provide simple actions (ex. browser settings) that can be taken to protect against hacks.
Watch Now

Deploying Secure Modern Apps in Evolving Infrastructures

Security Boulevard

Software development is changing. It is now measured in days instead of months. Microservice architectures are preferred over monolithic centralized app architecture, and cloud is the preferred environment over hardware that must be owned and maintained. In this webinar, we examine how these new software development practices have changed web application security and review a new approach to protecting assets at the web application layer.
Watch Now

Critical Actions to Survive a Data Breach in 2019 & Beyond

BitSight

Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyber attacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Watch Now

Spotlight

????????? ???????????????????????????????????????????????????????????????????????????????????????????????? ??????????????????????????? ???? eBook ????????????????????????????????????????????? ?????????? IT ?????????????????????????????????? ????????????????????????????? ????????????????????????????????????????? e-Book ??????????

resources