Suche senden
Hochladen
Internal investigation traps
•
Als PPT, PDF herunterladen
•
0 gefällt mir
•
306 views
Dan Michaluk
Folgen
Melden
Teilen
Melden
Teilen
1 von 19
Jetzt herunterladen
Empfohlen
Lab safety
Lab safety
gdmay
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/MzwU50A59GD Database security is arguably the most important part of an information security program that many people aren’t paying attention to. Some might assume that network or server security controls are adequate to protect databases. They’re not. Furthermore, gaps in IT governance processes often lead to security policies that aren’t enforced which can directly impact database systems. This is not only creating tangible business risks but it’s also creating numerous compliance gaps. Join IDERA and Kevin Beaver as he walks through how you can be more proactive with database security. He’ll share specific database security oversights he’s finding in his work along with some tips on how to better integrate databases into your overall information risk management initiatives.
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
BYOD is all the rage, but our MD, Daragh O Brien, has a contrarian view. BYOD places the emphasis on the devices and technology. This is wrong. The focus needs to shift back to the reason we have this technology in the first place - accessing and processing information. By thinking "GATOR" (Give Access to Our Resources) we can broaden our thinking about the Who, How, Where, Why, and When of our information management regardless of how the device that is accessing it was procured. This presentation was prepared and delivered for an awareness event hosted by Netspeed (www.netspeed.ie) and Aruba
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?
Castlebridge Associates
Investigating computer system abuse power point final
Investigating computer system abuse power point final
Dan Michaluk
DomainTools Anomali Detect CFP 2019
Avoid Rolling a Critical Fail
Avoid Rolling a Critical Fail
DomainTools
Technical tips for OPSEC are all around. However, what to do in real life encounters? We provide some easy to follow tips to improve your chances in such situations.
Analogic Opsec 101
Analogic Opsec 101
vicenteDiaz_KL
Developing Software with Security in Mind
Developing Software with Security in Mind
sblom
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And Destruction
Dan Michaluk
Empfohlen
Lab safety
Lab safety
gdmay
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/MzwU50A59GD Database security is arguably the most important part of an information security program that many people aren’t paying attention to. Some might assume that network or server security controls are adequate to protect databases. They’re not. Furthermore, gaps in IT governance processes often lead to security policies that aren’t enforced which can directly impact database systems. This is not only creating tangible business risks but it’s also creating numerous compliance gaps. Join IDERA and Kevin Beaver as he walks through how you can be more proactive with database security. He’ll share specific database security oversights he’s finding in his work along with some tips on how to better integrate databases into your overall information risk management initiatives.
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
BYOD is all the rage, but our MD, Daragh O Brien, has a contrarian view. BYOD places the emphasis on the devices and technology. This is wrong. The focus needs to shift back to the reason we have this technology in the first place - accessing and processing information. By thinking "GATOR" (Give Access to Our Resources) we can broaden our thinking about the Who, How, Where, Why, and When of our information management regardless of how the device that is accessing it was procured. This presentation was prepared and delivered for an awareness event hosted by Netspeed (www.netspeed.ie) and Aruba
Bring Your Own Device - a Misnamed Concept?
Bring Your Own Device - a Misnamed Concept?
Castlebridge Associates
Investigating computer system abuse power point final
Investigating computer system abuse power point final
Dan Michaluk
DomainTools Anomali Detect CFP 2019
Avoid Rolling a Critical Fail
Avoid Rolling a Critical Fail
DomainTools
Technical tips for OPSEC are all around. However, what to do in real life encounters? We provide some easy to follow tips to improve your chances in such situations.
Analogic Opsec 101
Analogic Opsec 101
vicenteDiaz_KL
Developing Software with Security in Mind
Developing Software with Security in Mind
sblom
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And Destruction
Dan Michaluk
A 40 minute presentation to student affairs and senior university administrators, with information on Ontario's new workplace violence bill.
Students at Risk: Managing On-Campus Violence
Students at Risk: Managing On-Campus Violence
Dan Michaluk
A presentation to fraud investigators on managing privacy issues in investigations. Focus is on bridging the divide between legal and privacy officers and investigators.
Internal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
Dan Michaluk
a 1.5 hours presentation and q&a to an audience municipal councilors and administrators in Ontario
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
Dan Michaluk
This is an hour and a half presentation to Canadian lawyers on the privacy issues in civil litigation.
Privacy and Litigation
Privacy and Litigation
Dan Michaluk
This was an hour long presentation to Ontario school board administrators on the privacy and security legal issues related to cloud computing.
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
This is a narrow look at two issues related to social media look by employees - monitoring workplace computers and employee publication and "off duty" conduct.
Social Media and Employee Privacy
Social Media and Employee Privacy
Dan Michaluk
A one hour presentation to Ontario municipal administrators.
Managing Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
Dan Michaluk
When Companies are hit by cyber security breaches, they and their directors may have legal liabilities to employees, customers, regulators and the authorities. This presentation gives special emphasis to Singapore law.
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Benjamin Ang
Evidence Identification Your initial task in an investigation is to identify the evidence you need for your case. Remember, without evidence you don't really have much more than an opinion. Every case is different, so you will likely need different types of evidence for each case. Knowing what evidence you will need is an integral part of a successful investigation. One rule of thumb is to "take everything." Unfortunately, there are substantial legal and logistical issues involved in this approach. More realistically, you should take anything and everything that could be remotely related to your case. Religiously adhere to the chain of custody guidelines and label everything as it is removed. Who Will Use the Evidence You Collect? Treat every computer forensic investigation as if the case you build will end up in court. The case in question does not need to involve criminal activity to warrant such care. You may be surprised that even simple investigations can end up as prime evidence for lawsuits in the future. Don't take chances. Protect your organization's assets by providing evidence that can be admitted into a court of law, if need be. The facts surrounding the target of the investigation will determine the methods you employ. An investigation into how a server was used in a distributed denial of service attack (DDoS) is different from gathering evidence of illegal images stored on a laptop. Always understand the purpose of your investigation before you start. distributed denial of service (DDoS) attack An attack that uses one or more systems to flood another system with so much traffic that the targeted system is unable to respond to legitimate requests for service or access. Suppose you were called to investigate possible stolen credit cards. The law enforcement officers working on this case expect to find incriminating evidence on the suspect's home computer. They have interviewed some of the suspect's coworkers and found that she talked about a "database of valuable information at home." When you arrive at the suspect's home, where should you start? What type of evidence should you look for? Try to answer these questions by looking at some common guidelines for investigations. site survey Notes, photographs, drawings, and any other documentation that describe the state and condition of a scene. When you enter a crime scene, look around carefully. Always document the scene by taking photographs, drawing sketches, and writing descriptions of what you see. The notes you take, together with photographs or drawings, form the initial site survey. As you progress in your investigation, you may find that looking back at the site survey gives you more contextual clues that show where or what to look at next. Tip Don't get too caught up in finding specific evidence. Rather, treat an investigation like a large puzzle. Avoid fixating on the picture (on the box cover); instead, look at the shapes and how the pieces fit together. Try to avoid ...
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
gitagrimston
From privilege waivers to data breach, the threat of legal malpractice related to discovery and data handling is real and, despite relative silence on the issue, pervasive. Smart litigators who have a firm grasp of their discovery obligations can protect themselves, their practices, and their clients.
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull.com
202-224-4774
Contacts1 copy.docx
Contacts1 copy.docx
matthewhughes86
Scenario Characters: You: Data Security Analyst, Allied Technology Systems (ATS) Randy Capisi: Information Security Director, Allied Technology Systems (Your supervisor) Devin Roberts: Human Resources Director, Allied Technology Systems Keith Jackson: (former) engineer, Product Development Division, Allied Technology Systems Jon Dewberry: Product Engineering Manager; Product Development Division, Allied Technology Systems (Keith Jackson’s Supervisor) **Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are/what roll you play in EACH project and in regards to specific questions. For the purposes of this project, imagine you are a Data Security Analyst, an employee of the Allied Technology Systems and assigned to the company’s Data Protection Team. In this case, you have been notified by Mr. Devin Roberts, Human Resources Director for Allied Technology Systems, that the company has just terminated Mr. Keith Jackson, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Roberts tells you that during Mr. Jackson’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from ATS, with ALL I have to offer.” Jackson’s statements made Mr. Roberts fear he might be taking Allied’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Roberts is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Roberts provides you a copy of the source code to use in your investigation. Lastly, Mr. Roberts tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. The 4th Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions. With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper). SECTION I In the course.
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
todd331
Computer forensics basics
Computer forensics basics
Computer forensics basics
Jarle Thorsen
How do you fit enterprise stories around the many other demands you face to write dailies, file web updates, tweet and shoot video? This session focuses on taking advantage of the plethora of local data available online to spot and develop quick-turnaround stories. Learn how to develop a data state of mind, find newsworthy data and begin to analyze data sets. Spot the enterprise stories in the numbers. Trainer Dave Umhoefer directs the O’Brien Fellowship in Public Service Journalism at Marquette University, where he teaches investigative reporting. @GovWatcher
Umhoefer: Finding and developing investigative stories on a beat
Umhoefer: Finding and developing investigative stories on a beat
News Leaders Association's NewsTrain
Shonka Webinar V3
Shonka Webinar V3
J. David Morris
Conducting Internal Investigations
Internal Investigation 20110315 1
Internal Investigation 20110315 1
Mayer Brown LLP
Internal Investigations
Internal Investigations
alberto0
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked. For more info, please visit: https://www.garlandtechnology.com
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Garland Technology
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked.
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Mark Fisher
▶ Topics Included: ⇒ Introduction ⇒ History ⇒ Forensics Vs Digital Forensics ⇒ Formal definition ⇒ Need and Importance ⇒ Steps Involved ⇒ Example ⇒ Types & Tools ⇒ Pros & Cons ⇒ Conclusion ⇒ References ⇒ Thanks Note
A brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
Opsec for families
Opsec for families
Lindy Kyzer
social engineering
L2 Slides – Cyber security- social engineering year 9.
L2 Slides – Cyber security- social engineering year 9.
kshahid3
Weitere ähnliche Inhalte
Andere mochten auch
A 40 minute presentation to student affairs and senior university administrators, with information on Ontario's new workplace violence bill.
Students at Risk: Managing On-Campus Violence
Students at Risk: Managing On-Campus Violence
Dan Michaluk
A presentation to fraud investigators on managing privacy issues in investigations. Focus is on bridging the divide between legal and privacy officers and investigators.
Internal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
Dan Michaluk
a 1.5 hours presentation and q&a to an audience municipal councilors and administrators in Ontario
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
Dan Michaluk
This is an hour and a half presentation to Canadian lawyers on the privacy issues in civil litigation.
Privacy and Litigation
Privacy and Litigation
Dan Michaluk
This was an hour long presentation to Ontario school board administrators on the privacy and security legal issues related to cloud computing.
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
This is a narrow look at two issues related to social media look by employees - monitoring workplace computers and employee publication and "off duty" conduct.
Social Media and Employee Privacy
Social Media and Employee Privacy
Dan Michaluk
A one hour presentation to Ontario municipal administrators.
Managing Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
Dan Michaluk
Andere mochten auch
(7)
Students at Risk: Managing On-Campus Violence
Students at Risk: Managing On-Campus Violence
Internal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
Privacy and Litigation
Privacy and Litigation
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Social Media and Employee Privacy
Social Media and Employee Privacy
Managing Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
Ähnlich wie Internal investigation traps
When Companies are hit by cyber security breaches, they and their directors may have legal liabilities to employees, customers, regulators and the authorities. This presentation gives special emphasis to Singapore law.
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Benjamin Ang
Evidence Identification Your initial task in an investigation is to identify the evidence you need for your case. Remember, without evidence you don't really have much more than an opinion. Every case is different, so you will likely need different types of evidence for each case. Knowing what evidence you will need is an integral part of a successful investigation. One rule of thumb is to "take everything." Unfortunately, there are substantial legal and logistical issues involved in this approach. More realistically, you should take anything and everything that could be remotely related to your case. Religiously adhere to the chain of custody guidelines and label everything as it is removed. Who Will Use the Evidence You Collect? Treat every computer forensic investigation as if the case you build will end up in court. The case in question does not need to involve criminal activity to warrant such care. You may be surprised that even simple investigations can end up as prime evidence for lawsuits in the future. Don't take chances. Protect your organization's assets by providing evidence that can be admitted into a court of law, if need be. The facts surrounding the target of the investigation will determine the methods you employ. An investigation into how a server was used in a distributed denial of service attack (DDoS) is different from gathering evidence of illegal images stored on a laptop. Always understand the purpose of your investigation before you start. distributed denial of service (DDoS) attack An attack that uses one or more systems to flood another system with so much traffic that the targeted system is unable to respond to legitimate requests for service or access. Suppose you were called to investigate possible stolen credit cards. The law enforcement officers working on this case expect to find incriminating evidence on the suspect's home computer. They have interviewed some of the suspect's coworkers and found that she talked about a "database of valuable information at home." When you arrive at the suspect's home, where should you start? What type of evidence should you look for? Try to answer these questions by looking at some common guidelines for investigations. site survey Notes, photographs, drawings, and any other documentation that describe the state and condition of a scene. When you enter a crime scene, look around carefully. Always document the scene by taking photographs, drawing sketches, and writing descriptions of what you see. The notes you take, together with photographs or drawings, form the initial site survey. As you progress in your investigation, you may find that looking back at the site survey gives you more contextual clues that show where or what to look at next. Tip Don't get too caught up in finding specific evidence. Rather, treat an investigation like a large puzzle. Avoid fixating on the picture (on the box cover); instead, look at the shapes and how the pieces fit together. Try to avoid ...
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
gitagrimston
From privilege waivers to data breach, the threat of legal malpractice related to discovery and data handling is real and, despite relative silence on the issue, pervasive. Smart litigators who have a firm grasp of their discovery obligations can protect themselves, their practices, and their clients.
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull.com
202-224-4774
Contacts1 copy.docx
Contacts1 copy.docx
matthewhughes86
Scenario Characters: You: Data Security Analyst, Allied Technology Systems (ATS) Randy Capisi: Information Security Director, Allied Technology Systems (Your supervisor) Devin Roberts: Human Resources Director, Allied Technology Systems Keith Jackson: (former) engineer, Product Development Division, Allied Technology Systems Jon Dewberry: Product Engineering Manager; Product Development Division, Allied Technology Systems (Keith Jackson’s Supervisor) **Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are/what roll you play in EACH project and in regards to specific questions. For the purposes of this project, imagine you are a Data Security Analyst, an employee of the Allied Technology Systems and assigned to the company’s Data Protection Team. In this case, you have been notified by Mr. Devin Roberts, Human Resources Director for Allied Technology Systems, that the company has just terminated Mr. Keith Jackson, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Roberts tells you that during Mr. Jackson’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from ATS, with ALL I have to offer.” Jackson’s statements made Mr. Roberts fear he might be taking Allied’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Roberts is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Roberts provides you a copy of the source code to use in your investigation. Lastly, Mr. Roberts tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. The 4th Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions. With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper). SECTION I In the course.
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
todd331
Computer forensics basics
Computer forensics basics
Computer forensics basics
Jarle Thorsen
How do you fit enterprise stories around the many other demands you face to write dailies, file web updates, tweet and shoot video? This session focuses on taking advantage of the plethora of local data available online to spot and develop quick-turnaround stories. Learn how to develop a data state of mind, find newsworthy data and begin to analyze data sets. Spot the enterprise stories in the numbers. Trainer Dave Umhoefer directs the O’Brien Fellowship in Public Service Journalism at Marquette University, where he teaches investigative reporting. @GovWatcher
Umhoefer: Finding and developing investigative stories on a beat
Umhoefer: Finding and developing investigative stories on a beat
News Leaders Association's NewsTrain
Shonka Webinar V3
Shonka Webinar V3
J. David Morris
Conducting Internal Investigations
Internal Investigation 20110315 1
Internal Investigation 20110315 1
Mayer Brown LLP
Internal Investigations
Internal Investigations
alberto0
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked. For more info, please visit: https://www.garlandtechnology.com
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Garland Technology
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked.
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Mark Fisher
▶ Topics Included: ⇒ Introduction ⇒ History ⇒ Forensics Vs Digital Forensics ⇒ Formal definition ⇒ Need and Importance ⇒ Steps Involved ⇒ Example ⇒ Types & Tools ⇒ Pros & Cons ⇒ Conclusion ⇒ References ⇒ Thanks Note
A brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
Opsec for families
Opsec for families
Lindy Kyzer
social engineering
L2 Slides – Cyber security- social engineering year 9.
L2 Slides – Cyber security- social engineering year 9.
kshahid3
Ähnlich wie Internal investigation traps
(15)
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Contacts1 copy.docx
Contacts1 copy.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Scenario CharactersYou Data Security Analyst, Allied Technolog.docx
Computer forensics basics
Computer forensics basics
Umhoefer: Finding and developing investigative stories on a beat
Umhoefer: Finding and developing investigative stories on a beat
Shonka Webinar V3
Shonka Webinar V3
Internal Investigation 20110315 1
Internal Investigation 20110315 1
Internal Investigations
Internal Investigations
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
A brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Opsec for families
Opsec for families
L2 Slides – Cyber security- social engineering year 9.
L2 Slides – Cyber security- social engineering year 9.
Mehr von Dan Michaluk
One hour presentation to IT professionals at Ontario school boards. Covers labour issues in MFA rollout, threat information sharing and business e-mail compromises and PHIPA.
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Dan Michaluk
An hour presentation to school board officials in Ontario on cyber security issues, covering the threat environment, defense, incident response, threat information sharing and vendor issues.
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
Dan Michaluk
On hour presentation to lawyers on the Freedom of Information and, more broadly, "the law of information" in Canada.
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
Dan Michaluk
A one hour presentation on sexual violence law policy for Canadian higher education institutions.
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
Dan Michaluk
Presentation to Canadian insurance defence counsel and insurance professionals and adjusters.
Cyber class action claims at an inflection point
Cyber class action claims at an inflection point
Dan Michaluk
One hour presentation to Ontario public sector institutions that looks at the privacy and security implications the main information flows associated with COVID-19 workplace health and safety.
The pandemic and privacy
The pandemic and privacy
Dan Michaluk
45 minute presentation to regulatory agencies in Ontario on cyber risks, prevention and response.
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Dan Michaluk
Here's a one hour presentation to Canadian municipal lawyers on the union right of access to information that arises under labour law and how it has fared against employee privacy claims.
Union access to information
Union access to information
Dan Michaluk
A short presentation to public sector board governors on cybersecurity oversight.
Cybersecurity Risk Governance
Cybersecurity Risk Governance
Dan Michaluk
cyber incident response basics presentation to non-technical audiences in Canada
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
Dan Michaluk
One hour presentation to cyber and privacy professionals on freedom of information and how it is responding to the internet and the cyber threat.
The Current State of FOI
The Current State of FOI
Dan Michaluk
1 hours presentation to IT security and law enforcement audience on how access to information legislation and related pressures affect public bodies in Canada.
Cyber, secrecy and the public body
Cyber, secrecy and the public body
Dan Michaluk
presentation to human resources professional on canadian law and policy issues related to ai...
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
Dan Michaluk
A 20 minute presentation on two privacy issues for Ontario civil litigators
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Dan Michaluk
45 min prez to compliance professionals at Canadian financial institutions. A survey presentation covering privacy, data security and anti-spam (CASL).
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Dan Michaluk
Cyber incident scenario and questions designed for lawyers, insurance adjusters and claims managers and risk managers.
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
Dan Michaluk
I hate the term "breach" - please call it a "security incident" - but the term "breach coach" is certainly ingrained. Posting today's presentation on the role of the coach as I step out the door to an insurance sector event.
Role of a breach coach
Role of a breach coach
Dan Michaluk
Who is the "health information custodian" when an institution with an educational mandate provides health care? PHIPA gives institutions choice. Here's a presentation i gave yesterday in which I argue that the institution (and not its practitioners) should assume the role of the HIC.
PHIPA for school boards
PHIPA for school boards
Dan Michaluk
40 minute presentation to compliance pros at Canadian financial services firms.
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Dan Michaluk
15 Minute Presentation to Ontario Lawyers
Finding internet evidence
Finding internet evidence
Dan Michaluk
Mehr von Dan Michaluk
(20)
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
Cyber class action claims at an inflection point
Cyber class action claims at an inflection point
The pandemic and privacy
The pandemic and privacy
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Union access to information
Union access to information
Cybersecurity Risk Governance
Cybersecurity Risk Governance
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
The Current State of FOI
The Current State of FOI
Cyber, secrecy and the public body
Cyber, secrecy and the public body
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
Role of a breach coach
Role of a breach coach
PHIPA for school boards
PHIPA for school boards
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
Finding internet evidence
Finding internet evidence
Internal investigation traps
1.
Management Counsel’s Perspective:
Eight Investigation Traps and What to do About Them Dan Michaluk 17 August 2010
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Management Counsel’s Perspective:
Eight Investigation Traps and What to do About Them Dan Michaluk 17 August 2010
Jetzt herunterladen