lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <88A4F77FACA44BC3B3FAD778919A7D4A@p2e90gwm>
Date: Wed, 23 Sep 2009 21:11:22 -0400
From: "Trish M" <trish.morgan@...puterforensicshow.com>
To: "Trish M" <trish.morgan@...puterforensicshow.com>
Subject: CFS 09/October 5-6 Updated Speaker/Session List


       

      The Computer Forensics Show is the “Don't miss” event of the year for all Litigation, Accounting and IT Professionals!






      Register Now

      (Please see the bottom of this e-mail for a Discount Code to attend the conference.)



      Computer forensics is the collection, preservation, analysis, and presentation of computer related evidence. Far more information is retained on a computer than most people realize. Computer forensics is one of the fastest growing segments of the industry. A sophisticated computer forensics strategy can literally save a company millions in litigations costs and, in some instances, their hard-earned reputation.



      The special two-day event will include exhibits of the latest developments in the IT security marketplace, as well as a full conference schedule of top-flight guest speakers, discussion groups and training sessions to provide attendees with important information about the latest technological advancement, ideas and practical information available today.



      Every day brings changes to the IT security marketplace, and the Computer Forensics Show is specifically geared to showcasing the latest technological advances and trends. The show will feature exhibits as well as a comprehensive and engaging conference program with the involvement of leading edge companies: Kroll Ontrack Inc., McAfee Corporation, Symantec Corporation, Deloitte Financial Advisory Services LLP, Clearwell Systems Inc., HB Gary Inc., Guidance Software Inc. and EMC Corporation.



      WHEN: October 5-6, 2009

      WHERE: Santa Clara Convention Center, Santa Clara, CA



      CONFERENCE HOURS

      Monday October 5th: 9:00am–7:00pm

      Tuesday October 6th: 8:25am–6:20pm



      EXHIBIT HOURS

      Monday October 5th: 1:00pm–5:00pm

      Tuesday October 6th: 10:00am–4:00pm



      ATTENDEE TITLES INCLUDE:

      CIO’s, CSO’s, CTO’s

      CFO’s
      IT Managers 
      Law Firm Administrators 
      Lawyers 
      Legal Assistants
      Legal Marketing Directors 
      Legal Technology Consultants 
      Paralegals 
      General Counsel
      Accountants
      VP/Director/Manager of IT Security
      Chairman/CEO/COO/President/Owner
      IS/MIS/Systems/Service Administrators
      Sales & Marketing Professionals
      Consultants
      Judges 
      Engineer/Architect/Developer/Tech



      CONFERENCE TOPICS AND GUEST SPEAKERS INCLUDE:



      KEYNOTE PRESENTATION

      "When No One Else Can": Data Recovery from a completely overwritten hard drives. Sample Forensic recovery from over written drive from Turkish assassination case, 2007.



      PRESENTER

      Alfred Demirjian – CEO at TechFusion



      LEGAL (A) TRACK



      eDiscovery in the Cloud: Policy, Technology and Security Requirements for SaaS Email Archiving

      Rick Dales – Vice President of Product Management, Archiving, Proofpoint, Inc.



      Emerging Trend in Civil Litigation: Production of Forensically Sound Evidence

      Chad McManamy – Electronic Discovery Specialist, Guidance Software, Inc.



      "Forensic" vs. "Forensically Sound" Electronic Data Collections?

      Jake Frazier, Esq. – Director of Compliance and eDiscovery Practice, EMC Corp.



      Electronic Discovery: Don’t let it Byte You

      Kris Haworth – Managing Director at Evolver, Inc.



      Automated Data Mapping: The Future of Digital Forensics Analysis?

      Bobby Balachandran – President and CEO, Exterro, Inc.



      Bridging the Gap Between Computer Forensics and Electronic Discovery

      Julie Lewis – President, CEO and Founder, Digital Mountain



      Challenges to Digital Forensic Evidence

      Fred Cohen – CEO and President, Fred Cohen & Associates and California Sciences Institute



      Electronic Data is not Paper Data; Innovation in E-Discovery

      Sandra E. Serkes – President & CEO, Valora Technologies, Inc.



      E-Discovery: Why Most Enterprise Implementations Fail To Make The Grade

      Kon Leong – President & CEO, ZL Technologies, Inc.



      EDD, including Litigation and Best Practice Issues

      Brooke Cunningham – Clearwell Systems



      Project Management: Leaning Electronic Discovery. Enhancing the chance of keeping the critical, critical

      Dr. Eric Samuelson – Principal, Eric J. Samuelson Consulting Services



      LEGAL (B) TRACK



      PANEL DISCUSSION: Navigating Complex Litigation and Investigations: Automate, Collaborate & Centralize with Project Management Software

      Julian Ackert – Director; Karen Schuler – Director at Intelligent Discovery Solutions, Inc.



      PANEL DISCUSSION: Approach, trends and cost saving related to Discovery and Litigation

      Tomas Castrejon – Computer Forensics Practice Specialist, Meredith Klemmer – Sr. Manager, Satish Lalchand – Sr. Manager, Forensic & Dispute Services at Deloitte Financial Services, LLP and Deloitte Services, LLP



      PANEL DISCUSSION: eDiscovery: Creating a defensible, repeatable and cost effective approach

      Frank Wu – Managing Director, Protiviti & Brent Botta – Director of eDiscovery Solutions for Guidance Software, Inc.



      Computer Forensics Solutions in Trade Secret Matters

      Don Vilfer, JD, CFE – President, Califorensics



      Identity Theft – From Stolen Records to Stolen Lives

      Rob Douglas – Editor and InfoSec Consultant, www .IdentityTheft.info



      Ethics: Why the High Road Really is Better

      Jon Berryhill – President and COO, Berryhill Computer Forensics, Inc.



      A Document State is not Constant Throughout the Litigation Process

      Aaron Goodisman – CTO & COO, Valora Technologies, Inc.



      Preemptive archiving of ESI enables Early Case Assessment

      Bill Tolson – Director of Legal and Regulatory Solutions Marketing, Mimosa Systems



      Mobile Forensics

      Samuel Rubin – Director Digital Forensics, Stroz Friedberg, LLC



      PANEL DISCUSSION: 10 Biggest Mistakes of a Data Breach

      Christopher Hague – IT Consultant, VeriSIgn, Inc; M. Peter Adler, Esq – Partner, Pepper Hamilton, LLP; Anne Buchanan – APR, Buchanan Public Relations, LLP



      FORENSIC ACCOUNTING TRACK



      PANEL DISCUSSION: Don’t forget about the Structure in the EDRM

      Liam Ferguson – Managing Director; Courtney Fletcher – Managing Director at Mesirow Financial Consulting, LLC



      Forensic Accounting – How to Uncover Fraud

      Richard C. Hermerding, MBA, MA, MSIS, CMA, CFM, CFE, CFS – Senior Principal, OLIVO-CPA



      Understanding Credit Card Theft – A Practical Approach

      Harshul Joshi – Director Information Technology Security, CBIZ MHM, LLC



      Insurance E&O Risk Management

      Vicki L Boser – President, Director of Association Insurance, Programs, National Insurance Broker at InsuranceTek, Inc.



      Use of Computer Forensics and Electronic Discovery in Forensic Accounting

      Julie Lewis – President, CEO and Founder, Digital Mountain



      Fraud is Everywhere

      Keith S. Balla, CPA, PSA, CFF – Director, MarcumRosenfarb, LLC



      Trusted to Busted

      Robert N. Brown, Jr., CPA, CFE – Founding Partner, The CPA Solution, LLC



      Data Information maps for E-Discovery: A Strategic and Executable System of Generally Accepted E-Discovery Principles

      Dr. Eric Samuelson – Principal, Eric J. Samuelson Consulting Services



      Must Have Tools for the Forensic Accountant

      James C. Bourke, CPA.CITP – Partner, WithumSmith+Brown



      IT SECURITY TRACK



      The Security Data Dilemma: A Data Warehouse Approach to Improve Security

      Bruno Kurtic – Vice President Product Management, SenSage



      E-banking Fraud Schemes: Attack Trends and Defenses

      Kevin Donovan – Vice President of North American Sales & Business Development, VASCO Data Security



      Encryption in the Age of Compliance and Economic Downturn

      Matt Sergeant – Senior Anti-Spam Technologist, MessageLabs, now part of Symantec



      PANEL DISCUSSION: The State of the Hack

      Jerrold Smith – Principal Consultant, Scott J. Roberts – Security Consultant; MANDIANT



      Detecting Zero-day and Polymorphic Malware in the Enterprise

      Greg Hoglund – CEO and Founder, HBGary, Inc.



      Cell Phone Forensics

      Brian Farnsworth – State of California Department of Insurance Fraud Division



      Red-Meat Key Word Proximity Searching with Mercury (Part I&II)

      Dale Rogers – Owner, Rogers Computer Forensics



      IT Security and Compliance

      Ed King – Vice President, Marketing, Agiliance



      Hacking 101

      Lars Ewe – CTO and VP of Engineering, Cenzic, Inc.



      Live Forensics using Helix3 Pro

      Andrew Fahey – CTO, E-fense, Inc.



      The Transformation from Remote Access to All Access

      Charles Goldberg – Director, Enterprise Line Management, Juniper Networks, Inc.



      What’s on Your Network? Technology Options for Application Visibility and Control

      Julie Starr – Technical Marketing Engineer at Palo Alto Networks



      IT SECURITY (ADVANCED) TRACK



      Gaining a Deeper Level of Network Intelligence with Deep Packet Inspection

      Joel Ebrahimi – Solutions Engineer, Bivio Networks



      Key Steps to Securing Your Organization Using the OSI Layers

      Michael G. Spohn - Senior Consultant, Foundstone Professional Services (a division of McAfee)



      Combating Insider Threats: New technologies and techniques to reveal the insider

      Cary Moore, EnCE – Senior Enterprise Consultant, Professional Services Division, Guidance Software, Inc.



      How to Keep Your Web Applications Safe from Cyber Attacks

      Alan White – Professional Services Team, SecureWorks



      Network Forensic Investigations: Establishing Probable Cause

      Eric Knight – Senior Knowledge Engineer, LogRhythm, Inc.



      Securing Against Industrial Espionage in the Digital Age

      Lee Kelly, CISSP - Senior Security Consultant, Patriot Technologies



      Red-Meat Key Word Proximity Searching with Mercury (Part I&II)

      Dale Rogers – Owner, Rogers Computer Forensics



      Don’t Forget Your Security Umbrella in the Cloud

      Punit Minocha – VP Corporate Development, VP Software-as-a-Service, Trend Micro, Inc.



      Why a Network Security Ecosystem Is Necessary to Protect Against Today’s Threats

      Ken Pappas – Vice President of Marketing and Security Strategist, Top Layer Security



      Gone Without a Trace? Finding Evidence of ESI Destruction Software to Support a Claim of Wrongdoing

      Christopher Andrews – Computer Forensics Specialist, Ontrack® Forensics, Kroll Ontrack



      PANEL DISCUSSION: How “NAC” Has Changed; Options for Today’s Access Control

      Santhosh Cheeniyil – Founder & VP of Engineering at Avenda Systems; Rich Campagna – Sr. Product Line Manager at Juniper Networks, Inc.



      # # #



      For more information regarding this exciting and important event, contact (203) 661-4312 or info@...puterforensicshow.com or visit www.computerforensicshow.com. When registering, please enter VIP50 for a 50% off on a Full Conference pass or VIP51 for a 50% off on a One-day pass. The conference pass includes an exhibit hall pass; you can also register for a free exhibit hall pass at www.computerforensicshow.com by October 1, 2009.



      To be removed from the mailing list please send us an e-mail to: remove@...puterforensicshow.com.




     




Content of type "text/html" skipped

Content of type "image/jpeg" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ