



Cyber Threat Intelligence CPD online workshops 24 and 25 March 2022
• New exclusive two-part CPD series aimed at showcasing latest knowledge and best practice in cyber threat intelligence
• Collaboration between The Investigator and the University College Dublin School of Computer Science
• Speakers from across the world will share their expertise and lead the debate
• Online via MS Teams
The Investigator and the University College Dublin School of Computer Science are teaming up to host a series of educational workshops that look at contemporary issues around cyber threat intelligence.
Our workshops are aimed at cyber-crime investigators from police forces, ROCUs and other law enforcement agencies who want to enhance and develop their understanding of the current cyber threat intelligence landscape.
Expert speakers will look at current issues, challenges and best practice that will help inform work on the frontline and showcase latest innovation and thinking to inspire and enhance knowledge.
Current attacks and threat actors
The workshops will highlight some of the current attacks and threat actors behind the crimes as well as provide a forum for delegates to engage with our experts and share their own experiences.
There will also be the opportunity to find out more about opportunities to study with University College Dublin, from Rupert Bowen who head up International Post-graduate liaison at the university. Rupert will be joined by some past students who are now successfully working in law enforcement, industry and academia across the world.
• Each event will run from 9.30am till 3pm GMT (approximate time)
• Certificates of CPD will be available for each session.
• Sessions, topics and speaker details
March 24 Session One: The current cyber threat intelligence landscape; latest trends, and threat actors behind current attacks; how they operate and how to pre-empt their attacks
9.10am-9.20am: Welcome and introduction, Carol Jenkins, The Investigator
9.20am-10.10am: An introduction to the current cyber threat landscape, key threats and trends, Peter Yapp, one of the founders of the UK National Cyber Security Centre and now Partner for Cyber and Information Security at Schillings
10.10am-10.25am: Break
10.25am-11.15am: Common causes and trends of data breaches. How is data obtained when there is a data breach? Tom Hudson, ethical hacker and cyber crime expert speaker and trainer
11.15am-noon: A lawyer’s perspective: common cyber-attacks and how organisations are addressing these attacks, David Cook, Threat Intelligence Working Group Lead, Cyber Expert Working Group and solicitor and a Legal Director specialising in cyber security at global law firm DLA Piper
Noon-12.20pm: Break
12.20pm-1pm: Opportunities for continuous professional development at University College Dublin, Rupert Bowen, International Post Graduate Liaison, School of Computer Science
1pm-1.50pm: The work of the cyber and business resilience centres and their impact, DI Martin Wilson, Northeast Regional Cyber Programme, Northeast Business Resilience Centre
1.50pm-2.05pm: Break
2.05pm-2.45pm: Current trends, attacks and threat actors in Argentina including the growth in ‘aftermath or residue’ attacks and how they link to the rest of the world, Rodrigo Cárdenas Holik, Cyber Crime Consultant, Argentina
2.45pm: Workshop finishes
March 25 Session Two: Common attacks and trends that have hit the headlines; how are they carried out and what is their long-term impact?
9.20am-9.30am: Welcome and introduction, Carol Jenkins, The Investigator
9.30am-10.30am: Elephant Beetle attacks, new research into an international organised financial theft operation, Dan Saunders, Incident Response Expert, Sygnia and Amnon Kushnir, Incident Response Tech Lead, Sygnia
10.30am-10.50am: Break
10.50am-11.40am: Early warning systems to respond to Stealthy Attacks, Liliana Pasquale and Mazen Azzam, School of Computer Science, University College Dublin
11.40am-12.20pm: Opportunities for continuous professional development at University College Dublin, Rupert Bowen, International Post Graduate Liaison, School of Computer Science
12.20pm-12.50pm: Break
12.50pm-1.40pm: Common attacks and trends: Live demonstration: Ron Austin, Associate Professor, School of Computing and Digital Technology, Birmingham City University
1.40pm-2.20pm: Ongoing Linux Malware attacks to Network Attached Storage (NAS) devices, Fernando Merces, Senior Threat Researcher, Trend Micro
2.30pm-3.20pm: Latest trends in Advanced Persistent Threats (APTs) Dr Darren Hayes, Associate Professor, Department of Computer Science, Pace University, New York
3.20pm: workshop closes.
HOW TO BOOK
Single workshop: £189.99 + VAT (GBP) per delegate
Book both for £340.00 + VAT (GBP) per delegate
Booking: Please send the delegates name(s), email address(es) and purchase order (made out to The Investigator) to booking@the-investigator.co.uk or telephone +44(0)844 660 8707 for further information.
Under no circumstances will a delegate be able to register using a free webmail address (ie: gmail, Yahoo, Outlook, Hotmail, AOL etc) but you can use one to login into Teams once your work email has been verified.
Payment can be made by PayPal/debit/credit card (corporate card fees apply + 3%).
The meeting link will be sent out 7 days before the event.