About Track 5 - LEA, Defense and Intelligence Analyst Product Training
The full agenda for track 5 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Product Training
Track 6: Social Network Monitoring and Big Data Analytics Product Training
Track 7: Mobile Signal Intercept and Electronic Surveillance Product TrainingPre-Conference: Seminars and Tutorials (Monday, 16 March 2015)
Track 5: LEA, Defense and Intelligence Analyst Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Monday, 16 March 2015
9:00-17:00 | Practitioners Guide to Internet Investigations Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police |
10:15-11:15 | Clustering and Early Detection in Surveillance: New Trends in Voice Biometrics Presented by Agnitio |
Tuesday, 17 March 2015
9:00-10:00 Session A | Analyzing Multiple Data Sources in One Application Presented by SS8 |
11:30-12:00 Session A | Newest trends and technologies in Lawful Intelligence Presented by trovicor |
11:30-12:30 Session B | Comprehensive Solutions for Digital Surveillance and Data Correlation and Analysis Presented by RCS S.p.A |
12:00-12:30 Session A | Speeding up Criminal Investigations - Providing actionable insight from CDR data Presented by trovicor |
15:30-16:30 Session A | Lawful Interception. Integrated solution for Massive Voice and Data Gathering, Correlation and Decryption Presented by IPS |
15:30-16:00 Session B | Fusion System - Relation analysis based on LI & financial data Presented by trovicor |
Wednesday, 18 March 2015
9:00-10:00 Session A | Who, What, When, Where - getting answers with help of right mobile forensic tools Presentation of the market leading tools XRY and XAMN with powerful functionality to extract, present and visualize all type of data from all types of mobile devices. Presented by MicroSystemation |
9:00-9:30 Session B | Identifying Criminal Suspects - An event based analytical approach Presented by trovicor |
9:30-10:00 Session B | Fusion System - Relation analysis based on LI & financial data Presented by trovicor |
11:00-12:00 | Software Based Detected and Mitigation Against DDos Attack Presented by RCS S.p.A |
12:15-13:15 | Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police |