News Archive

IT Course

by msecadm4921

Investigating Computer Misuse is one of the upcoming ARC Training coruses, on November 12 to 13.

"The gravest potential risks to business continuity reside within the firewall"<br><br>Information Risk and Security by Ed Wilding<br>&#160;<br>IT crime is something&#160;that you, as&#160;a loss prevention manager, security manager, profit protection manager, HR Manager, investigator, IT manager or&#160;line manager&#160;may potentially&#160;have to deal with&#160;and you need to ensure you have the necessary skills and information to handle such incidents in a professional and confident manner.<br><br>For the perpetrator the computer is the tool.&#160; For you it is the scene of&#160;crime.&#160; Regular scenes of&#160;crime are relatively straightforward to process, but how do you secure a computer scene of crime, what evidence can you expect to find&#160;on a computer,&#160;how should it be processed in order to achieve a&#160;successful&#160;outcome and what are the legal issues surrounding disclosure of electronically stored data?&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;<br><br>The answers are contained within the Investigating Computer Misuse course (formerly IT Security &amp; incident Response), presented by Ed Wilding – broadcaster and&#160;author and Noel&#160;Bonczoszek,&#160;both specialists in workplace computer investigation. <br><br>Irrespective of your existing level of IT literacy, this two-day programme will provide you with an understanding of the value of effective response measures in handling incidents of IT-misuse.&#160; Combining theory-based lectures and discussions with a one-day investigative simulation. <br>&#160;<br>CONTENT<br><br>IT Threats to the Organisation<br>Approaching an Allegation of IT Misuse<br>Legal Issues Relating to IT Crime and Misuse<br>Analysing the IT Scene of Crime<br>Utilising the Power of the Courts in Cases of IT Misuse<br>Investigative Resources <br><br>- &#163;1200&#160;plus VAT to include two nights full board accommodation and a copy of &quot;Information Risk and Security&quot;<br>For more information or to reserve a place&#160;contact Janet at: &#160;&#160;&#160;&#160; [email protected]&#160;or call +44 (0)118 984 1040<br>&#160;<br>For details of all ARC courses visit:&#160;&#160;&#160;

Related News

  • News Archive

    Projects Protected

    by msecadm4921

    Raytec’s RAYMAX Infra-Red and RAYLUX White-Light LED illuminators are proving a lighting solution for demanding construction site projects thanks to their toughness,…

  • News Archive

    Connecting Cameras

    by msecadm4921

    With the Unity Video product, a user can quickly and easily upgrade existing fibre-based security networks with additional hard-wired CCTV cameras without…

  • News Archive

    About Zotob

    by msecadm4921

    A computer security topic: businesses will continue to leave their networks open to attack if they rely on patching alone, according to…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing