SlideShare a Scribd company logo
How to Use Open Source Intelligence
in Investigations
Sandra Stibbards, Camelot Investigations
Sandra Stibbards
Sandra Stibbards, is the owner and President of Camelot Investigations, a licensed private
investigation agency in California and Texas, since its inception in 1996. Ms. Stibbards is
regarded as a leading online investigations expert whose clients include Fortune 500
companies and international corporations over five continents. She specializes in Financial
Fraud Investigations, Internet Threat Investigations, Cybercrime, Competitive Intelligence,
Counterintelligence, Vulnerability and Threat Assessments, International IP/Counterfeiting
Investigations, and Pre-Investment & Due Diligence Investigations. Ms. Stibbards has been
responsible for assisting her clients in locating millions of dollars worth of assets from
financial fraud and international counterfeiting as well as identification of those utilizing the
internet, websites and other means to remain anonymous for high profile scams and threats.
She has become recognized for her presentations and trainings on Open Source
Intelligence providing expanded insight into the methods of obtaining and locating
information in public forums. These trainings are in demand by both the private and public
sectors including financial institutions, aerospace industry, pharmaceutical industry, all levels
of law enforcement, federal agencies, internal audit and regulators.
Sandra Stibbards, Camelot
Investigations © 2016
Always be sure to……
THINK
OUTSIDE
THE BOX
Sandra Stibbards, Camelot
Investigations © 2016
Security
and
Privacy
Sandra Stibbards, Camelot
Investigations © 2016
Sandra Stibbards, Camelot
Investigations © 2016
Secure/Encryted Email
Secure Browsers
Sandra Stibbards, Camelot
Investigations © 2016
VPN/proxy Servers
purevpn is One of Many
Sandra Stibbards, Camelot
Investigations © 2016
Other Ways to Secure Your Privacy
Sandra Stibbards, Camelot
Investigations © 2016
Malwarebytes
Sandra Stibbards, Camelot
Investigations © 2016
CCLEANER
Sandra Stibbards, Camelot
Investigations © 2016
Google.com/Trends
Sandra Stibbards, Camelot
Investigations © 2016
Google.com/Alerts
Sandra Stibbards, Camelot
Investigations © 2016
Exploit-DB.com/Google-
Hacking-Database/
Sandra Stibbards, Camelot
Investigations © 2016
Google Earth Pro – Free Mobile
Version Also
Sandra Stibbards, Camelot
Investigations © 2016
International
People
Searches
10/17/2016
SPOKEO.COM
Sandra Stibbards, Camelot
Investigations © 2016
INFOBEL.COM/EN/WORLD
Sandra Stibbards, Camelot
Investigations © 2016
HAVEIBEENPWNED.COM
Sandra Stibbards, Camelot
Investigations © 2016
International
Public Records
10/17/2016
WIPO.INT/pct/en
Sandra Stibbards, Camelot
Investigations © 2016
FAMILYSEARCH.ORG
Sandra Stibbards, Camelot
Investigations © 2016
International
Social Networks
& Media
10/17/2016
LINKEDIN.COM
Sandra Stibbards, Camelot
Investigations © 2016
Privacy Settings Come First
Sandra Stibbards, Camelot
Investigations © 2016
Open Search System
Sandra Stibbards, Camelot
Investigations © 2016
TWITTER.COM
Sandra Stibbards, Camelot
Investigations © 2016
APP.TEACHINGPRIVACY.COM
Sandra Stibbards, Camelot
Investigations © 2016
TALKWALKER.COM/ALERTS
Sandra Stibbards, Camelot
Investigations © 2016
FACEBOOK.COM
Sandra Stibbards, Camelot
Investigations © 2016
https://developers.facebook.com/docs/plugins/embedded-posts
Sandra Stibbards, Camelot
Investigations © 2016
Picture Mate Plug In
Sandra Stibbards, Camelot
Investigations © 2016
Others to Remember
VK.COM
WEIBO.COM
INSTAGRAM.COM
PANORAMIO.COM
FOURSQUARE.COM
YOUTUBE.COM
Sandra Stibbards, Camelot
Investigations © 2016
TinEye.com
Sandra Stibbards, Camelot
Investigations © 2016
Domains
&
Websites
10/17/2016
DOMAINTOOLS.COM
Sandra Stibbards, Camelot
Investigations © 2016
ARCHIVE.ORG/WEB/
Sandra Stibbards, Camelot
Investigations © 2016
StatsCrop.com
Sandra Stibbards, Camelot
Investigations © 2016
WhoIsMind.com
Sandra Stibbards, Camelot
Investigations © 2016
EmailSherlock.com
Sandra Stibbards, Camelot
Investigations © 2016
AddressSearch.com
Sandra Stibbards, Camelot
Investigations © 2016
READNOTIFY.COM
Sandra Stibbards, Camelot
Investigations © 2016
International
Business
Information
10/17/2016
GLASSDOOR.COM
Sandra Stibbards, Camelot
Investigations © 2016
SEC.gov/edgar.shmtl
Sandra Stibbards, Camelot
Investigations © 2016
FreeERISA.com
Sandra Stibbards, Camelot
Investigations © 2016
Pay Databases
10/17/2016
PACER.GOV
Sandra Stibbards, Camelot
Investigations © 2016
TLO.COM
Sandra Stibbards, Camelot
Investigations © 2016
Thank-you for participating
If you have any questions, please feel free
to email them to:
Sandra Stibbards, Owner / President of Camelot Investigations
sandra@camelotinvestigations.com
Questions about i-Sight:
info@i-sight.com
10/17/2016

More Related Content

What's hot

Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
Adam Compton
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
Christian Martorella
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
SyedAmoz
 
OSINT
OSINTOSINT
Osint
OsintOsint
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
RedHunt Labs
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
Chandrapal Badshah
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
Deepak Kumar (D3)
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
balakumaran779
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
Adam Nurudini
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
Naushad CEH, CHFI, MTA, ITIL
 

What's hot (20)

Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
OSINT
OSINTOSINT
OSINT
 
Osint
OsintOsint
Osint
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 

Viewers also liked

Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
Sudhanshu Chauhan
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
Jerod Brennen
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python37point2
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
Mats Björe
 
Tactical Information Gathering
Tactical Information GatheringTactical Information Gathering
Tactical Information Gathering
Christian Martorella
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
Tom Eston
 
Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview research
Case IQ
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
Case IQ
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
Christian Martorella
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
Case IQ
 
2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)
Robert David Steele Vivas
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation Reports
Case IQ
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Open source intelligence analysis
Open source intelligence analysisOpen source intelligence analysis
Open source intelligence analysis
zapp0
 
OSINT su siti web
OSINT su siti webOSINT su siti web
OSINT su siti web
dalchecco
 
Readi Response Service Offering
Readi Response Service OfferingReadi Response Service Offering
Readi Response Service Offering
Jake Simon
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
Case IQ
 
I pericoli dell'Internet of Things in ambito sanitario, industriale e privato
I pericoli dell'Internet of Things in ambito sanitario, industriale e privatoI pericoli dell'Internet of Things in ambito sanitario, industriale e privato
I pericoli dell'Internet of Things in ambito sanitario, industriale e privato
Danilo De Rogatis
 

Viewers also liked (18)

Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
Tactical Information Gathering
Tactical Information GatheringTactical Information Gathering
Tactical Information Gathering
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview research
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Investigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts ApproachInvestigation Report Writing: A Nuts and Bolts Approach
Investigation Report Writing: A Nuts and Bolts Approach
 
2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)
 
Writing Effective Investigation Reports
Writing Effective Investigation ReportsWriting Effective Investigation Reports
Writing Effective Investigation Reports
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Open source intelligence analysis
Open source intelligence analysisOpen source intelligence analysis
Open source intelligence analysis
 
OSINT su siti web
OSINT su siti webOSINT su siti web
OSINT su siti web
 
Readi Response Service Offering
Readi Response Service OfferingReadi Response Service Offering
Readi Response Service Offering
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
I pericoli dell'Internet of Things in ambito sanitario, industriale e privato
I pericoli dell'Internet of Things in ambito sanitario, industriale e privatoI pericoli dell'Internet of Things in ambito sanitario, industriale e privato
I pericoli dell'Internet of Things in ambito sanitario, industriale e privato
 

Similar to How to Use Open Source Intelligence (OSINT) in Investigations

Advanced Resources and Tools for Online Investigations
Advanced Resources and Tools for Online InvestigationsAdvanced Resources and Tools for Online Investigations
Advanced Resources and Tools for Online Investigations
Case IQ
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
Cyren, Inc
 
About Zero Point Risk Research Llc
About Zero Point Risk Research LlcAbout Zero Point Risk Research Llc
About Zero Point Risk Research Llclrschade
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Badgujar
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
Vivendi Content
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
FourthAsAService
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016Cameron Brown
 
CrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary ProblemCrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary Problem
CrowdStrike
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
Goutama Bachtiar
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
Marlabs
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
Rui Miguel Feio
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
Tomppa Järvinen
 
Could you find the fix and control the crisis?
Could you find the fix and control the crisis?Could you find the fix and control the crisis?
Could you find the fix and control the crisis?
Imogen Pickering
 
Preventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudPreventing Corporate and Governmental Fraud
Preventing Corporate and Governmental Fraud
Compliance Global Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Cyren, Inc
 

Similar to How to Use Open Source Intelligence (OSINT) in Investigations (20)

Advanced Resources and Tools for Online Investigations
Advanced Resources and Tools for Online InvestigationsAdvanced Resources and Tools for Online Investigations
Advanced Resources and Tools for Online Investigations
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
About Zero Point Risk Research Llc
About Zero Point Risk Research LlcAbout Zero Point Risk Research Llc
About Zero Point Risk Research Llc
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
 
CrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary ProblemCrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary Problem
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Could you find the fix and control the crisis?
Could you find the fix and control the crisis?Could you find the fix and control the crisis?
Could you find the fix and control the crisis?
 
Preventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudPreventing Corporate and Governmental Fraud
Preventing Corporate and Governmental Fraud
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 

More from Case IQ

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
Case IQ
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
Case IQ
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Case IQ
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
Case IQ
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
Case IQ
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
Case IQ
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
Case IQ
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Case IQ
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
Case IQ
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Case IQ
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Case IQ
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
Case IQ
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
Case IQ
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Case IQ
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
Case IQ
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
Case IQ
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
Case IQ
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Case IQ
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Case IQ
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
Case IQ
 

More from Case IQ (20)

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

How to Use Open Source Intelligence (OSINT) in Investigations