Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
x

Cybercrime: Identification, Investigation, and Response

Highly respected leaders in the area of cybercrime and forensics will share knowledge in the current types of cybercrimes and data breach events; how to respond and how to investigate breaches to comply with privacy law.

Registration End Date: Thu, 30 May, 02:30 PM

Completed
  • where

  • ACS/River City Labs - TC Beirne Building
    Level 3/ 315 Brunswick St
    Fortitude Valley QLD 4000
  • when

  • Event Start: Thu, 30 May, 05:30 PM
    Event Finish: Thu, 30 May, 07:30 PM
  • event price

  • -

<span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">In this session, presenters <a href="https://www.linkedin.com/in/darren-hopkins-5844469/" target="_blank">Darren Hopkins</a> (forensic technology expert and Partner at McGrath Nicol); and <span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;"><a href="https://www.linkedin.com/in/graeme-edwards-cfe-0405872b/" target="_blank">Graeme Edwards</a> (Senior Lecturer at the Institute of Cyber Investigations and Forensics at USC, consultant at IDCare, and formerly of the QPS Financial and Cyber Crime Group)</span></span></span></span></span></span> will discuss... <ul><li><span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">the types of cyber crimes and data breach events that are being seen and reported (e.g. social engineering, email hacks, fraudulent invoicing and bank account detail changes, personal data breaches, etc.;</span></span></span></li><li><span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">the IT response necessary to lock down all necessary systems and data; and</span></span></span></li><li><span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">understanding the appropriate investigations that need to be made to remedy the breach, prevent future breaches, and comply with any other obligations (e.g. under privacy law).</span></span></span></li></ul> <span style="color: black;"><span style="font-family: arial,sans-serif;"><span style="font-size: 10.0pt;">5:30pm registration/networking<br>6:00pm-7:00pm presentation<br>7:00pm-7:30pm networking<br>Light refreshments provided</span></span></span>

Contact Details

Share this event:

CPD HOURS

2

SFIA Category

Business risk management (BURM) - 4

Speaker

Darren Hopkins

Darren Hopkins

Darren is a Partner of McGrathNicol Forensic who specialises in the proactive and reactive use of technology in business in the areas of cyber-security, privacy, digital forensics and technology-led investigations.A qualified investigator and forensic technology practitioner with over 20 years specialist forensic experience and over five years as a foundation member of the Forensic Computer Examination Unit with the Queensland Police, Darren has undertaken complex computer forensic examinations for both criminal and civil litigation in Australia and overseas.Darren works regularly with Boards, Executives and senior business leaders in large and small enterprise, to consider and set technology strategies for cyber, privacy, data protection and information risk management.Darren is also called upon regularly to apply his digital forensic and investigative expertise, and help resolve often time critical and highly sensitive issues as they arise. These matters range from large scale data breaches or theft, through to employee misconduct or intellectual property matters. 

Show More

Speaker

Graeme Edwards

Graeme Edwards

Experienced Investigator with a demonstrated history of working in law enforcement. Skilled in Crisis Management, Corporate Fraud Investigations, Law Enforcement, Computer/Cyber investigations and Public Speaking. I combine professional experience with academic studies obtaining a Doctorate of Information Technology focused in "Investigating cybercrime in a cloud computing environment” from the Queensland University of Technology as well as a Masters and Bachelors degrees inInformation Technology.

Show More
Level 3/ 315 Brunswick St,Fortitude Valley,QLD,Australia

Recommended Events