Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Techno Conferences

Techno Conferences include two distinct conferences: Techno Security Conference and Techno Forensics Conference. The Annual International Techno Security Conference has become known as a world class training and networking event now having had attendees register from 40 different countries. If you attend just once, you will see why this conference has sold out in the exhibit hall for the past five years as well as exceeding our attendee expectation each of those years. We're not trying to be the biggest conference, just the best. Techno Forensics is hosted by the Institute of Computer Forensics Professionals (ICFP), the U.S. Secret Service ecTaskForce, Maryland InfraGard and NIST. The conference is founded on the principles of standardization in the field of digital evidence investigation. The conference will cover many of the general disciplines in the areas of digital evidence investigation to include some of the latest information on software and hardware solutions. Unlike other forensic conferences that are limited to law enforcement only or are vendor specific in nature, this conference will be open to everyone currently involved in computer forensics, digital evidence, or anyone having an interest in these rapidly growing fields. Conference agenda topics will cover a range of the digital disciplines which include: Fundamentals of acquisitions, Terabyte storage and preparing for it, Building a forensics lab, fly away kits, black bag forensics, e-discovery and special instructor lead focused classes on Basics of FAT, NTFS, macintosh, and linux file systems and dealing with their data. Other areas covered are intrusion detection, network level forensics, and cellular, handheld, and wireless forensics. Digital law and evidence handing will also be covered in break out sessions. Our Techno conferences have become known as a world class training and networking events now having had attendees register from 40 different countries.
Rating
0 vote
Favoured:
0

Listing Details

Vendor
Presented by TheTrainingCo.
Website
Visit the Product Site
Modified
Never
Owner
michelemjordan
Add'l Info
Various in the US / Not set Duration - 3 days
Created
-0001-11-30
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message