Scientific program

October 27, 2021    Singapore city, Singapore

4th Webinar on

Digital Forensic

  • Home -
  • Scientific program

Keynote Forum

Divya Singh

Divya Singh

Birla Institute of Technology Science, Pilani- Dubai Campus Dubai, United Arab Emirates

Title: Digital Forensics & Incident Response (DFIR)

Abstract:

Title: Digital Forensics & Incident Response (DFIR)

The digital forensic investigation needs to be carried out thoughtfully to avoid that potential legal evidence is irreversibly destroyed or will be rejected in court. IT forensic analyses may be very complex and depend on expert know-how, as well as specialized soft- and hardware, in order to be able to meet legal requirements.

Examples of incidents which may trigger IT forensic investigations are: Malware infection, hacker attacks, data theft, data leakage, fraud, mobbing, intentional deletion of data, possession and provision of digital media with illegal content, etc.

Biography:

I am Divya Singh, Certified Ethical Hacker |CEH, Identified the Phishing and Malware Attacks,

I am working as a cyber security analyst, I'm an author and public speaker, and a member of the SmartCyber ISO standards committee. Divya is also a committee member of the Knowledge Management group of the North Cybersecurity addressing the role of AI and emergent technologies in IT security.

 Identify controls to ensure compliance with Information Security Policies and Standards and balancing security initiatives to external risks also Provide Consultancy on business requirements, evaluate potential products/services.

Keynote Forum

Title: Nation States, Gangsters and Cyber Criminals- A view of the aftermath using digital Forensics

Keynote Forum

Mr Ishtiaq Ahmed

Mr Ishtiaq Ahmed

North South University Bangladesh

Title: Monitoring Cryptocurrencies exchanges to trace Cybercrime activities

Biography:

Mr. Ishtiaq Ahmed is currently working as Assistant Commissioner of Police in Dhaka Metropolitan Police. He is supervising the Digital Forensic Team & E-fraud Team of Cybercrime Investigation Division & he is religiously practicing and leading cyber patrolling in cyber space to trace out IP criminals in different capacity such as covert operation in cyber space, analyzing digital evidences of different cases under the jurisdiction of Dhaka Metropolitan Police, providing expert opinions to the learned courts in proper channel. As In-Charge of Digital Forensic Lab, he has expertise to examine and analyze the digital evidences of different cases and also supervises other examiners and analyzers of the lab and restricted to maintain the “Standard Operating System” of a digital forensic lab. Terrorism is a global issue and as a member of Counter Terrorism & Transnational Crime Unit of Bangladesh Police, he is actively participating in technical trainings on periodic basis from Interpol, FBI on Counter Terrorism in online. Mr. Ahmed was nominated by UNODC as expert speaker at their training sessions with multi-stakeholders from national & international level. Mr. Ahmed also attended various trainings, workshops, seminar focused on cybercrime & regional assistance to address cybercrime. He obtained sophisticated technical training to identify criminals existing within dark web from Homeland Security, Secret Service, FBI. Mr. Ahmed directly engaged himself with NCA (National Crime Agency) of United Kingdom, Australian Federal Police & Federal Police of Bureau (FBI) regarding cases of online child abusement. He is also collaborating with ICMEC (International Centre for Missing & Exploited Children) for more than a year as a global LEA partner to identify and support child harassment cases. Mr. Ahmed attended series of training on online investigations provided by Antiterrorism Assistance, Bureau of Diplomatic Security U.S. Department of State and got certified as “Trainer”. As a member of national project to counter terrorism, he has been performing as regular trainer for different national and international level audience to convey the soft awareness among different stakeholders against online terrorism & cybercrimes. Mr. Ishtiaq has been awarded the prestigious “President’s Police Medal” from Bangladesh Police for his enormous contribution to tackle the challenges and eradicating threats of cybercrimes.

Speakers

Robert Gaines

Robert Gaines

California State University-Stanislaus United States

Title: Nation States, Gangsters and Cyber Criminals- A view of the aftermath using digital Forensics

Abstract:

Nation States, Gangsters and Cyber Criminals – A view of the aftermath using digital forensics

Most organizations are aware of the risks posed by the various threat actors that are making the headlines, but they don’t know what their attacks look like once it has happened.  In this presentation I will cover the following digital forensic elements:

  1. The threat landscape
  2. Finding Patient Zero
  3. The bright light before the “detonation”
  4. Indicators of compromise
  5. Don’t forget the memory
  6. Timeline generation
  7. Determining the full scope
  8. Remediation

Biography:

Bob Gaines is the Director of cyber security for HKA.  Bob brings 25 years of experience working in the information technology field, and is a subject matter expert for incident response and digital forensics.

 Nicola Chemello

Nicola Chemello

Università degli Studi di Padova Italy

Title: An Invitation. The opportunities of modern mobile forensics.

Abstract:

An invitation. The opportunities of modern mobile forensics. 

The responsibility of criminal investigation today is linked to the analysis of the digital environment, coexisting with the real physical world through our electronic devices and mobile phones. Solving crime is never an easy task. This invitation stands in sharing the development of a system that has run hand in hand with the expansion of smartphones and the mobile network as a whole. The first building block of this system is the Call Detail Record, data registered for all telecommunication exchanges and details between our devices and cell towers. The design of an effective and modern mobile forensics tool has also to take into consideration one fundamental and additional objective: Data Validation. This is obtained by cross-referencing third-party CDR information with other evidence streams and opportunities created by smartphones. The natural evolution of a well-performed mobile and digital investigation is to move forward in processing and combining evidence and knowledge with as many other sources as possible. Today, thanks to artificial intelligence and software development this is possible both quickly and efficiently. All with one tool specifically designed for this purpose: analytically mining mobile communication data stored in phone records and cell site installation and traffic data, and real coverage survey and statistical mapping. Our invitation is meant to share more than 15 years of work and experience in the world of mobile forensics, and to present explain this tool: PhoneLog and BTS Tracker Technology.

Biography:

CEO of Securcube srl, an Italian digital forensics company specialized in call detail records analytics and cell site real coverage surveys and mapping. Certified with EnCE, CCO-CCPA-CCME, Oxygen, XRY, has been working forensic investigations since 2007. Registered at the Italian Courts as an Expert Witness, consulting for several Prosecutors’ offices. His experience includes computer fraud; unauthorized access to computer systems; credit card cloning; violation of copyright; fraudulent bankruptcy; scams; document falsification; digital identity theft; stalking; murder; suicide; drug trafficking. Active in training Law Enforcement globally in digital investigative techniques, has published articles sharing experiences in criminal investigations and court proceedings.

Eric Barenzung

Eric Barenzung

National polytechnics institute of Grenoble Asia Pacific

Title: Incident Response of Combat Terrorism.

Abstract:

Cybercrime is a growing threat. No industry is safe from such threat, in particular ransomware that represented about a quarter of the cyberattacks in 2020 .With the exploding double-extortion ransomware attack, the attackers demand a ransom not just to decrypt the stolen data but to refrain from releasing it publicly.

Cybercriminals are more and more often asking for payment though bitcoins. With an increasing bitcoin price, the number of ransomware infections is expected to explode in 2021.

How to trace these payments to collect evidence on the cybercrime organizations behind these?

This presentation is providing an introduction to the topic:

  • The cryptocurrency market related to cybercrime activities
  • A technical overview on how cryptocurrencies exchange is working
  • How can investigators trace transactions?
  • The challenges
  • Some tools and companies providing such solutions and services.

Biography:

Over the last thirty years, Eric Bärenzung has worked across four continents on delivering large scale projects among other roles. From aeronautics to PayTV industry, including retail, he moved to the cybersecurity domain in 2014.

Eric Bärenzung participated to different International Telecommunication Union (ITU) cybersecurity related events, in particular on IoT security. He also spoked at events such Africacom (South Africa) and CyberSecure (Nigeria) on European GDPR.

Since 2018, Eric is a senior cybersecurity consultant in the financial services industry.