Class Schedule


Fake Watches – Authentic Quality Replica Watches at Affordable Prices

2007 ASIS-HTCIA Training Conference and Expo
Full Event-Class Schedule

Full Event-Class Schedule – Wednesday, 5/30/2007 thru Friday, 6/1/2007
Below is the Full 3 day Event-Class Schedule for your review.
Note: Classes listed below as Register are still available for registration, but classes listed as Closed are no longer available due to capacity constraints. Some classes are multiple session classes. They are identified with the starting session Class ID under the Event-Class, and you must register for the starting session Class ID to be registered for All sessions of that class. Changes, if any, to the original Schedule are identified by UPDATED below, (please check if any schedule changes affect Your selected Event-Class Schedule).

To sign up for sessions online, you MUST have already registered for the Conference, made your payment & received a confirmation email (EXPO only registrants may Only attend EXPO Events)

After receiving your email confirmation, you can then Login below and select the sessions you want to attend (you will require your your account number and password information from your online registration confirmation or the class email announcement).

As of Jun 1, 2007, the ONLINE Class Schedule System is CLOSED.
Final sign-ups @ the Conference.
The ONLINE Class Schedule System is CLOSED.
Return to Main Site

Return to Main Site

Full Event-Class Schedule

Class IDEvent-Class/InstructorStart TimeEnd TimeAvailable
100Breakfast
Eat Breakfast, a great opportunity to network and socialize.  
07:0008:00All
101Opening Ceremony – Keynote
Interesting Keynote Speaker  
08:0010:00All
102Break
Enjoy refreshments, a great opportunity to network and socialize.  
10:0010:15All
200Violence Risk Assessment
  James Caewood
This presentation will present a brief understanding of the behavioral basis of violence in organizational settings (workplaces, schools, etc.) and then explain a valid assessment process for determining a violence risk for any specific case.   
10:1512:15Register
201Holistic Investigation Techniques
  Larry Dietz
Complexity is the hallmark of today’s investigatory environment.   
10:1512:15Closed
202Kidnap & Ranson
  David Lattin
TBA  
10:1512:15Register
203Sniffing Network Traffic
  Laura Chappell
Network forensics is the science of digital communication evidence collection and analysis for the purpose of identifying the method of network attack and residual effects.   
10:1512:15Closed
103Lunch
Eat Lunch, a great opportunity to network and socialize.  
12:1513:15All
204Loss of Intellectual Property in the Global Market Place
  Chris Burgess
The speaker will address the global realities with respect to the threat of your Intellectual Property.  
13:1515:15Register
205How They Steal Proprietary Information
  John Mallery
Simple mechanisms exist to steal proprietary information even when the appropriate security measures are implemented.  
13:1515:15Closed
206Handheld Device Forensics
  Jeff Hunt
Project a Phone.  
13:1515:15Register
207Hands On Network Forensics Case
  Laura Chappell
Analyze trace files depicting security issues on the network.   
13:1515:15Register
104Break
Enjoy refreshments, a great opportunity to network and socialize.  
15:1515:30All
208
UPDATED!
CANCELLED – Replaced by #410
  CANCELLED
CANCELLED – Same Course is now offered only as #410  
15:3017:30Closed
209Anti Forensics
  John Mallery
This program is designed to examine the wide range of steps used to defeat a digital investigation.  
15:3017:30Closed
210Technical Analysis of Ecrimes
  CR Visveswaran
I will be discussing the technical background of various techniques used by hackers to steal identity, to perform espionage, send spam , and launch denial of service attacks.  
15:3017:30Register
211ProDiscover Basic Freeware Hands-on Lab
  Don Brister
Students will use the ProDiscover basic freeware tool and be provided the hands-on experience of capturing a device and using the tool to look at and analyze data.  
15:3017:30Register
212
UPDATED!
Security Convergence & Data Correlation
  James Connor
Security Convergence & Data Correlation  
15:3017:30Register

2007 ASIS-HTCIA Training Conference and Expo Thursday, 5/31/2007

Class IDEvent-Class/InstructorStart TimeEnd TimeAvailable
105Breakfast
Eat Breakfast, a great opportunity to network and socialize.  
07:0008:00All
106EXPO
Visit The EXPO  
08:0010:00All
300Advanced Network Forensics
  Laura Chappell
This session demonstrates forensic analysis of several compromised systems to determine the method of compromise and identify potential protection mechanisms to protect the corporate network.  
08:0010:00Register
301Cognitive Interviewing for Sensitive Investigations
  James Caewood
None Provided  
08:0010:00Closed
302Lock Bumping
  Marc Tobias
Learn about a new physical security penetration technique.  
08:0010:00Register
303Intro to Computer Forensics
  Keith Lockhart
An introduction by Access Data in computer forensics.  
08:0010:00Register
107Break
Enjoy refreshments, a great opportunity to network and socialize.  
10:0010:15All
108EXPO
Visit The EXPO  
10:1512:15All
304Selling Security at the C Level
  Spike Speicher & Panel
Learn how to sell your security program and budget.  
10:1512:15Register
305History of Islam / Terrorism
  Rick Lack
A look into the history of Islam and terrorism.  
10:1512:15Closed
306Intelligent Video Surveillance
  Frank Molina
ObjectVideo will explain video analytics technology; what is it, how it works, and how it is fast becoming a vital technology for physical security, homeland security, community surveillance, and operational intelligence.  
10:1512:15Register
307Encryption Solutions
  Keith Lockhart
Possible solutions when encountering encryption.  
10:1512:15Closed
109
UPDATED!
Lunch / Speaker – Kathleen Baty
Eat Lunch, listen to keynote speaker Kathleen Baty, a great opportunity to network and socialize.  
12:1514:15All
110EXPO
Visit The EXPO  
12:1514:15All
111EXPO
Visit The EXPO  
14:1515:15All
112Break
Enjoy refreshments, a great opportunity to network and socialize.  
15:1515:30All
113EXPO
Visit The EXPO  
15:3017:30All
308How to Bring a Case to Law Enforcement
  Tom Quilty
Learn what steps are necessary to complete prior to presenting a case to Law Enforcement.  
15:3017:30Register
309OPEN – TBA
  TBA
TBA  
15:3017:30Register
310OPEN – TBA
  TBA
TBA  
15:3017:30Register
311Vista Artifact Analysis
  Keith Lockhart
Discover areas Vista artifacts can be found.  
15:3017:30Closed
114Cocktail Hour
Cocktail Hour. Enjoy refreshments, a great opportunity to network and socialize.  
17:3019:00

2007 ASIS-HTCIA Training Conference and Expo Friday, 6/1/2007

Class IDEvent-Class/InstructorStart TimeEnd TimeAvailable
115Breakfast
Eat Breakfast, a great opportunity to network and socialize.  
07:0008:00All
400Intro to Cell Phone Forensics
  Chris Sanft
An introduction to properly handling, and analyzing cell phones as a piece of evidence.  
08:0010:00Register
401Holistic Investigation Techniques
  Larry Dietz
Complexity is the hallmark of today’s investigatory environment.   
08:0010:00Register
402Technical Analysis of Ecrimes
  CR Visveswaran
I will be discussing the technical background of various techniques used by hackers to steal identity, to perform espionage, send spam , and launch denial of service attacks.  
08:0010:00Register
403Mac Forensics
  Derrick Donnelly / Ryan Chapin
A Look into the Macintosh to identify, analyze and report findings.  
08:0010:00Register
116Break
Enjoy refreshments, a great opportunity to network and socialize.  
10:0010:15All
404Nessus Penetration
  Laura Chappell
This session provides an overview of Nessus with an overview of the penetration testing process and progresses through the Nessus configuration options and plug-in definitions.  
10:1512:15Register
405Lock Picking
  Sandy Sanderson
This class will provide students with an introductory look at Lock Picking.  
10:1512:15Register
406Online Investigations 101
  Cynthia Navarro
An overview of conducting investigations online.  
10:1512:15Closed
407Mac Forensics
  Derrick Donnelly / Ryan Chapin
Continuation of Class 403 – 4 Hr Course  * Register for Class 403 
10:1512:15See 403
117Lunch
Eat Lunch, a great opportunity to network and socialize.  
12:1513:15All
408ProDiscover Incident Response and Ver. 5 Overview
  Don Brister
Students will receive a presentation of the ProDiscover Incident Response tool, demonstrating a network acquisition of volatile data, to include a hard drive, removable media and memory of a networked computer. Discussion will take place to determine under what circumstances this type of acquisition could be desired, what type of information can be acquired and how to best describe this acquisition in court. A demonstration of the soon to be released Ver. 5 will also take place.  
13:1515:15Register
409Lock Picking
  Sandy Sanderson
This class will provide students with an introductory look at Lock Picking.  
13:1515:15Register
410Behind the Scenes of Software Piracy
  Zach Tocz
Includes an overview of how to identify legitimate products.  
13:1515:15Closed
411Mac Forensics
  Derrick Donnelly / Ryan Chapin
A Look into the Macintosh to identify, analyze and report findings.  
13:1515:30Register
118Break
Enjoy refreshments, a great opportunity to network and socialize.  
15:1515:30All
412Online Investigations 101
  Cynthia Navarro
An overview of conducting investigations online.  
15:3017:30Register
413Lock Picking
  Sandy Sanderson
This class will provide students with an introductory look at Lock Picking.  
15:3017:30Register
414Microsoft Anti-Piracy Basic Counterfeit ID
  Steve Studhalter
Presentation will cover Microsoft’s anti-piracy program, basic counterfeit identification, emerging piracy trends and partnering between industry and law enforcement.  
15:3017:30Register
415Mac Forensics
  Derrick Donnelly / Ryan Chapin
Continuation of Class 411 – 4 Hr Course  * Register for Class 411 
15:3017:30See 411