2024 Boston CyberSecurity Conference

Provider: FutureCon Events

Topic Area: Cyber Security, IT Security

Event Type: Conference

Delivery Method: Conference, Online

When: Nov 21, 2024

Where: In Person | Virtual | Hybrid

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

 » Read more


Click here for more information

DF091 Encryption

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, High Tech Crimes, Investigations, IT Security

Event Type: Training

Delivery Method: Online

ENC2-WB

This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

 » Read more


Click here for more information

CS103 Digital Trust

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, High Tech Crimes, Investigations, IT Security

Event Type: Training

Delivery Method: Online

DT-WB

Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, today’s climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people’s level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important. This course will provide an overview of factors that contribute to public trust in law enforcement’s use of current and emerging digital technologies.

 » Read more


Click here for more information

CI132 OSINT Module 1: Advanced Search Engine Techniques

Provider: National White Collar Crime Center (NW3C)

Target Audience: Chiefs, Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, High Tech Crimes, Investigations, IT Security, Training

Event Type: Training

Delivery Method: Online

ASET-WB

This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.

 » Read more


Click here for more information

CI106 Ransomware: An Introduction

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, High Tech Crimes, Investigations, IT Security

Event Type: Training

Delivery Method: Online

ITR-WB

According to the FBI’s Internet Crime Complaint Center (IC3), ransomware attacks lead to several billion dollars lost each year. Law enforcement officers should know how to respond to and protect their agencies and communities from these attacks. This interactive module teaches participants how to recognize and respond to a ransomware attack and discusses how ransomware can affect devices and networks and how to prevent ransomware attacks.

 » Read more


Click here for more information

IACP Conference