2007 ASIS-HTCIA Training Conference and Expo
Full Event-Class Schedule
Full Event-Class Schedule – Wednesday, 5/30/2007 thru Friday, 6/1/2007
Below is the Full 3 day Event-Class Schedule for your review.
Note: Classes listed below as Register are still available for registration, but classes listed as Closed are no longer available due to capacity constraints. Some classes are multiple session classes. They are identified with the starting session Class ID under the Event-Class, and you must register for the starting session Class ID to be registered for All sessions of that class. Changes, if any, to the original Schedule are identified by UPDATED below, (please check if any schedule changes affect Your selected Event-Class Schedule).
To sign up for sessions online, you MUST have already registered for the Conference, made your payment & received a confirmation email (EXPO only registrants may Only attend EXPO Events)
After receiving your email confirmation, you can then Login below and select the sessions you want to attend (you will require your your account number and password information from your online registration confirmation or the class email announcement).
As of Jun 1, 2007, the ONLINE Class Schedule System is CLOSED.
Final sign-ups @ the Conference.
The ONLINE Class Schedule System is CLOSED.
Return to Main Site
Full Event-Class Schedule
Class ID | Event-Class/Instructor | Start Time | End Time | Available |
100 | Breakfast Eat Breakfast, a great opportunity to network and socialize. | 07:00 | 08:00 | All |
101 | Opening Ceremony – Keynote Interesting Keynote Speaker | 08:00 | 10:00 | All |
102 | Break Enjoy refreshments, a great opportunity to network and socialize. | 10:00 | 10:15 | All |
200 | Violence Risk Assessment James Caewood This presentation will present a brief understanding of the behavioral basis of violence in organizational settings (workplaces, schools, etc.) and then explain a valid assessment process for determining a violence risk for any specific case. | 10:15 | 12:15 | Register |
201 | Holistic Investigation Techniques Larry Dietz Complexity is the hallmark of today’s investigatory environment. | 10:15 | 12:15 | Closed |
202 | Kidnap & Ranson David Lattin TBA | 10:15 | 12:15 | Register |
203 | Sniffing Network Traffic Laura Chappell Network forensics is the science of digital communication evidence collection and analysis for the purpose of identifying the method of network attack and residual effects. | 10:15 | 12:15 | Closed |
103 | Lunch Eat Lunch, a great opportunity to network and socialize. | 12:15 | 13:15 | All |
204 | Loss of Intellectual Property in the Global Market Place Chris Burgess The speaker will address the global realities with respect to the threat of your Intellectual Property. | 13:15 | 15:15 | Register |
205 | How They Steal Proprietary Information John Mallery Simple mechanisms exist to steal proprietary information even when the appropriate security measures are implemented. | 13:15 | 15:15 | Closed |
206 | Handheld Device Forensics Jeff Hunt Project a Phone. | 13:15 | 15:15 | Register |
207 | Hands On Network Forensics Case Laura Chappell Analyze trace files depicting security issues on the network. | 13:15 | 15:15 | Register |
104 | Break Enjoy refreshments, a great opportunity to network and socialize. | 15:15 | 15:30 | All |
208 UPDATED! | CANCELLED – Replaced by #410 CANCELLED CANCELLED – Same Course is now offered only as #410 | 15:30 | 17:30 | Closed |
209 | Anti Forensics John Mallery This program is designed to examine the wide range of steps used to defeat a digital investigation. | 15:30 | 17:30 | Closed |
210 | Technical Analysis of Ecrimes CR Visveswaran I will be discussing the technical background of various techniques used by hackers to steal identity, to perform espionage, send spam , and launch denial of service attacks. | 15:30 | 17:30 | Register |
211 | ProDiscover Basic Freeware Hands-on Lab Don Brister Students will use the ProDiscover basic freeware tool and be provided the hands-on experience of capturing a device and using the tool to look at and analyze data. | 15:30 | 17:30 | Register |
212 UPDATED! | Security Convergence & Data Correlation James Connor Security Convergence & Data Correlation | 15:30 | 17:30 | Register |
2007 ASIS-HTCIA Training Conference and Expo Thursday, 5/31/2007
Class ID | Event-Class/Instructor | Start Time | End Time | Available |
105 | Breakfast Eat Breakfast, a great opportunity to network and socialize. | 07:00 | 08:00 | All |
106 | EXPO Visit The EXPO | 08:00 | 10:00 | All |
300 | Advanced Network Forensics Laura Chappell This session demonstrates forensic analysis of several compromised systems to determine the method of compromise and identify potential protection mechanisms to protect the corporate network. | 08:00 | 10:00 | Register |
301 | Cognitive Interviewing for Sensitive Investigations James Caewood None Provided | 08:00 | 10:00 | Closed |
302 | Lock Bumping Marc Tobias Learn about a new physical security penetration technique. | 08:00 | 10:00 | Register |
303 | Intro to Computer Forensics Keith Lockhart An introduction by Access Data in computer forensics. | 08:00 | 10:00 | Register |
107 | Break Enjoy refreshments, a great opportunity to network and socialize. | 10:00 | 10:15 | All |
108 | EXPO Visit The EXPO | 10:15 | 12:15 | All |
304 | Selling Security at the C Level Spike Speicher & Panel Learn how to sell your security program and budget. | 10:15 | 12:15 | Register |
305 | History of Islam / Terrorism Rick Lack A look into the history of Islam and terrorism. | 10:15 | 12:15 | Closed |
306 | Intelligent Video Surveillance Frank Molina ObjectVideo will explain video analytics technology; what is it, how it works, and how it is fast becoming a vital technology for physical security, homeland security, community surveillance, and operational intelligence. | 10:15 | 12:15 | Register |
307 | Encryption Solutions Keith Lockhart Possible solutions when encountering encryption. | 10:15 | 12:15 | Closed |
109 UPDATED! | Lunch / Speaker – Kathleen Baty Eat Lunch, listen to keynote speaker Kathleen Baty, a great opportunity to network and socialize. | 12:15 | 14:15 | All |
110 | EXPO Visit The EXPO | 12:15 | 14:15 | All |
111 | EXPO Visit The EXPO | 14:15 | 15:15 | All |
112 | Break Enjoy refreshments, a great opportunity to network and socialize. | 15:15 | 15:30 | All |
113 | EXPO Visit The EXPO | 15:30 | 17:30 | All |
308 | How to Bring a Case to Law Enforcement Tom Quilty Learn what steps are necessary to complete prior to presenting a case to Law Enforcement. | 15:30 | 17:30 | Register |
309 | OPEN – TBA TBA TBA | 15:30 | 17:30 | Register |
310 | OPEN – TBA TBA TBA | 15:30 | 17:30 | Register |
311 | Vista Artifact Analysis Keith Lockhart Discover areas Vista artifacts can be found. | 15:30 | 17:30 | Closed |
114 | Cocktail Hour Cocktail Hour. Enjoy refreshments, a great opportunity to network and socialize. | 17:30 | 19:00 |
2007 ASIS-HTCIA Training Conference and Expo Friday, 6/1/2007
Class ID | Event-Class/Instructor | Start Time | End Time | Available |
115 | Breakfast Eat Breakfast, a great opportunity to network and socialize. | 07:00 | 08:00 | All |
400 | Intro to Cell Phone Forensics Chris Sanft An introduction to properly handling, and analyzing cell phones as a piece of evidence. | 08:00 | 10:00 | Register |
401 | Holistic Investigation Techniques Larry Dietz Complexity is the hallmark of today’s investigatory environment. | 08:00 | 10:00 | Register |
402 | Technical Analysis of Ecrimes CR Visveswaran I will be discussing the technical background of various techniques used by hackers to steal identity, to perform espionage, send spam , and launch denial of service attacks. | 08:00 | 10:00 | Register |
403 | Mac Forensics Derrick Donnelly / Ryan Chapin A Look into the Macintosh to identify, analyze and report findings. | 08:00 | 10:00 | Register |
116 | Break Enjoy refreshments, a great opportunity to network and socialize. | 10:00 | 10:15 | All |
404 | Nessus Penetration Laura Chappell This session provides an overview of Nessus with an overview of the penetration testing process and progresses through the Nessus configuration options and plug-in definitions. | 10:15 | 12:15 | Register |
405 | Lock Picking Sandy Sanderson This class will provide students with an introductory look at Lock Picking. | 10:15 | 12:15 | Register |
406 | Online Investigations 101 Cynthia Navarro An overview of conducting investigations online. | 10:15 | 12:15 | Closed |
407 | Mac Forensics Derrick Donnelly / Ryan Chapin Continuation of Class 403 – 4 Hr Course * Register for Class 403 | 10:15 | 12:15 | See 403 |
117 | Lunch Eat Lunch, a great opportunity to network and socialize. | 12:15 | 13:15 | All |
408 | ProDiscover Incident Response and Ver. 5 Overview Don Brister Students will receive a presentation of the ProDiscover Incident Response tool, demonstrating a network acquisition of volatile data, to include a hard drive, removable media and memory of a networked computer. Discussion will take place to determine under what circumstances this type of acquisition could be desired, what type of information can be acquired and how to best describe this acquisition in court. A demonstration of the soon to be released Ver. 5 will also take place. | 13:15 | 15:15 | Register |
409 | Lock Picking Sandy Sanderson This class will provide students with an introductory look at Lock Picking. | 13:15 | 15:15 | Register |
410 | Behind the Scenes of Software Piracy Zach Tocz Includes an overview of how to identify legitimate products. | 13:15 | 15:15 | Closed |
411 | Mac Forensics Derrick Donnelly / Ryan Chapin A Look into the Macintosh to identify, analyze and report findings. | 13:15 | 15:30 | Register |
118 | Break Enjoy refreshments, a great opportunity to network and socialize. | 15:15 | 15:30 | All |
412 | Online Investigations 101 Cynthia Navarro An overview of conducting investigations online. | 15:30 | 17:30 | Register |
413 | Lock Picking Sandy Sanderson This class will provide students with an introductory look at Lock Picking. | 15:30 | 17:30 | Register |
414 | Microsoft Anti-Piracy Basic Counterfeit ID Steve Studhalter Presentation will cover Microsoft’s anti-piracy program, basic counterfeit identification, emerging piracy trends and partnering between industry and law enforcement. | 15:30 | 17:30 | Register |
415 | Mac Forensics Derrick Donnelly / Ryan Chapin Continuation of Class 411 – 4 Hr Course * Register for Class 411 | 15:30 | 17:30 | See 411 |