Title: Monitoring cryptocurrencies exchanges to trace cybercrime activities
Abstract:
Cybercrime is a growing threat. No industry is safe from such threat, in particular ransomware that represented about a quarter of the cyberattacks in 2020 .With the exploding double-extortion ransomware attack, the attackers demand a ransom not just to decrypt the stolen data but to refrain from releasing it publicly.
Cybercriminals are more and more often asking for payment though bitcoins. With an increasing bitcoin price, the number of ransomware infections is expected to explode in 2021.
How to trace these payments to collect evidence on the cybercrime organizations behind these?
This presentation is providing an introduction to the topic:
Biography:
Over the last thirty years, Eric Bärenzung has worked across four continents on delivering large scale projects among other roles. From aeronautics to PayTV industry, including retail, he moved to the cybersecurity domain in 2014.
Eric Bärenzung participated to different International Telecommunication Union (ITU) cybersecurity related events, in particular on IoT security. He also spoked at events such Africacom (South Africa) and CyberSecure (Nigeria) on European GDPR.
Since 2018, Eric is a senior cybersecurity consultant in the financial services industry.
Title: Title: Digital Forensics & Incident Response (DFIR)
Abstract:
The digital forensic investigation needs to be carried out thoughtfully to avoid that potential legal evidence is irreversibly destroyed or will be rejected in court. IT forensic analyses may be very complex and depend on expert know-how, as well as specialized soft- and hardware, in order to be able to meet legal requirements.
Examples of incidents which may trigger IT forensic investigations are: Malware infection, hacker attacks, data theft, data leakage, fraud, mobbing, intentional deletion of data, possession and provision of digital media with illegal content, etc.
Biography:
Divya Singh, Certified Ethical Hacker |CEH, Identified the Phishing and Malware Attacks,
She is working as a cyber security analyst, She is an author and public speaker, and a member of the SmartCyber ISO standards committee. Divya is also a committee member of the Knowledge Management group of the North Cybersecurity addressing the role of AI and emergent technologies in IT security.
Identify controls to ensure compliance with Information Security Policies and Standards and balancing security initiatives to external risks also Provide Consultancy on business requirements, evaluate potential products/services.