The full agenda for track 2 is below. For information on any other track, please click the links below.
Track 1: ISS for Lawful Interception and Criminal Investigation
Track 2: ISS for Telecom Metadata Retention and NSA Access
Track 3: ISS for Cyber Threat Detection and Information Sharing
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
Track 7: ISS for Dark Web, TOR and Bitcoin Investigation
Advanced Hi-Tech, Cyber Crime Investigation Training (29 September - 1 October 2015)
31 classroom training hours, scheduled over 3 days, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors.
Wednesday, September 30, 2015
9:00-10:00 Zero in On Your Target: The critical need for lawful surveillance in the digital age
Hacking Team presenter to be announced11:30-12:30 Implementing The USA Freedom Act: What Telecoms Need To Do by Dec 2, 2015 and Beyond
Moderator:
Dr. Jerry Lucas, President, TeleStrategies
Panelists:
Tony Rutkowski, Senior VP Regulatory, Yaana Technologies
Adam Bowser, Associate, Arent Fox
Joshua Guyan, Partner, Kelley Drye & Warren LLP
Catharina Vandervoort, Vice President & Assistant General Counsel – Technology, Privacy & Security, Chief Privacy Officer, XO Communications1:30-2:30 PM Data Retention: Lessons Learned from Telecom Deployments in Europe
Panelists:
Dr. Cemal Dikmen, Chief Technology Officer, SS8
René Nitzinger, Utimaco TS GmbH
Tom Wood, Principal Consultant, CTG
David Cooke, VP Sales, BAE Systems Applied Intelligence
Michael Hammer, Principal Engineer, Yaana Technologies
Alex Leadbeater, Chairman, SA3 LI and EU Data Retention Compliance Manager, BT3:00-3:30 PM "Finding the Crown Jewels": An insight into how UK Law Enforcement obtain metadata held by the telcos
Tom Wood, Principal Consultant, CTG