Scientific program

September 29, 2021    London, UK

4th Webinar on

Forensic Research and Technology

  • Home -
  • Scientific program

Speakers

Eric Barenzung

Eric Barenzung

National polytechnics institute of Grenoble Asia Pacific

Title: Monitoring cryptocurrencies exchanges to trace cybercrime activities

Abstract:

Cybercrime is a growing threat. No industry is safe from such threat, in particular ransomware that represented about a quarter of the cyberattacks in 2020 .With the exploding double-extortion ransomware attack, the attackers demand a ransom not just to decrypt the stolen data but to refrain from releasing it publicly.

Cybercriminals are more and more often asking for payment though bitcoins. With an increasing bitcoin price, the number of ransomware infections is expected to explode in 2021.

How to trace these payments to collect evidence on the cybercrime organizations behind these?

This presentation is providing an introduction to the topic:

  • The cryptocurrency market related to cybercrime activities
  • A technical overview on how cryptocurrencies exchange is working
  • How can investigators trace transactions?
  • The challenges
  • Some tools and companies providing such solutions and services.

Biography:

Over the last thirty years, Eric Bärenzung has worked across four continents on delivering large scale projects among other roles. From aeronautics to PayTV industry, including retail, he moved to the cybersecurity domain in 2014.

Eric Bärenzung participated to different International Telecommunication Union (ITU) cybersecurity related events, in particular on IoT security. He also spoked at events such Africacom (South Africa) and CyberSecure (Nigeria) on European GDPR.

Since 2018, Eric is a senior cybersecurity consultant in the financial services industry.

Divya Singh

Divya Singh

Birla Institute of Technology Science, Pilani- Dubai Campus Dubai, United Arab Emirates

Title: Title: Digital Forensics & Incident Response (DFIR)

Abstract:

 

The digital forensic investigation needs to be carried out thoughtfully to avoid that potential legal evidence is irreversibly destroyed or will be rejected in court. IT forensic analyses may be very complex and depend on expert know-how, as well as specialized soft- and hardware, in order to be able to meet legal requirements.

Examples of incidents which may trigger IT forensic investigations are: Malware infection, hacker attacks, data theft, data leakage, fraud, mobbing, intentional deletion of data, possession and provision of digital media with illegal content, etc.

Biography:

Divya Singh, Certified Ethical Hacker |CEH, Identified the Phishing and Malware Attacks,

She is working as a cyber security analyst, She is an author and public speaker, and a member of the SmartCyber ISO standards committee. Divya is also a committee member of the Knowledge Management group of the North Cybersecurity addressing the role of AI and emergent technologies in IT security.

 Identify controls to ensure compliance with Information Security Policies and Standards and balancing security initiatives to external risks also Provide Consultancy on business requirements, evaluate potential products/services.