Every investigator needs the skills and knowledge to use OSINT competently in investigations. As online information continues to multiply in volume and complexity, the tools required to find, sift through, authenticate and preserve that information become more and more important for investigators. Failure to master these tools to tap into the rich resources of the web can hamper your investigations.
Learn the intricacies of online investigating from an expert in the field. Join Sandra Stibbards, owner and president of Camelot Investigations and a financial fraud investigator, speaker and trainer, for a free webinar on How to Use OSINT in Investigations.
Webinar attendees will learn:
-How to find information on the hidden web
-How to find publicly available information in government and private databases
-Dos and don’ts for searching social media effectively
-Tips for remaining anonymous while researching investigation subjects
-Accessing archived information
-How criminals hide, and how to find them
OSINT: Open Source Intelligence gathering 101
Slides from my talk on OSINT. I listed examples in the slides about tools, legal methods for both online and physical information security reconnaissance.
OSINT is defined by both the U.S. Director of National Intelligence and the U.S. Department of Defense (DoD), as "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.
SOURCE :https://en.wikipedia.org/wiki/Open-source_intelligence
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources.
https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html
OSINT: Open Source Intelligence gathering 101
Slides from my talk on OSINT. I listed examples in the slides about tools, legal methods for both online and physical information security reconnaissance.
OSINT is defined by both the U.S. Director of National Intelligence and the U.S. Department of Defense (DoD), as "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.
SOURCE :https://en.wikipedia.org/wiki/Open-source_intelligence
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources.
https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
www.fomada.com
Presented By Syed Amoz: CEO Fomada
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
A presentation about using Open Source Intelligence for proactive defense delivered at Rootconf 2019 Bangalore, India.
RedHunt Labs
https://redhuntlabs.com/
This is the slides of the online talk given at @NullBhopal. This introduces people to Open Source INTelligence and their uses in daily life and pentesting.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
As per Wiki - Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
There are lots of other ways to collect information from Public Source which may not provided in this document, This is just an Introductory Document for whose who are beginners and students.
Owasp osint presentation - by adam nurudiniAdam Nurudini
Open-Source Intelligence (OSINT) is intelligence collected from public available sources
“Open” refers overt, public available sources (as opposed to covert sources)
Its not related to open-source software or public intelligence
This information comes from a variety of sources, including the social media pages of your company and staff. These can be a goldmine of information, revealing information such as the design of ID badges, layout of the buildings and software used on internal systems.
Playbooks define the procedures for security event investigation and response. Phishing - Template allows you to perform a series of tasks designed to handle spear phishing emails on your network.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
www.fomada.com
Presented By Syed Amoz: CEO Fomada
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
A presentation about using Open Source Intelligence for proactive defense delivered at Rootconf 2019 Bangalore, India.
RedHunt Labs
https://redhuntlabs.com/
This is the slides of the online talk given at @NullBhopal. This introduces people to Open Source INTelligence and their uses in daily life and pentesting.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
As per Wiki - Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
There are lots of other ways to collect information from Public Source which may not provided in this document, This is just an Introductory Document for whose who are beginners and students.
Owasp osint presentation - by adam nurudiniAdam Nurudini
Open-Source Intelligence (OSINT) is intelligence collected from public available sources
“Open” refers overt, public available sources (as opposed to covert sources)
Its not related to open-source software or public intelligence
This information comes from a variety of sources, including the social media pages of your company and staff. These can be a goldmine of information, revealing information such as the design of ID badges, layout of the buildings and software used on internal systems.
Playbooks define the procedures for security event investigation and response. Phishing - Template allows you to perform a series of tasks designed to handle spear phishing emails on your network.
Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
Investigating online conducting pre-interview researchCase IQ
Going into an investigation interview with no knowledge of the interview subject is like going into a job interview with no knowledge about the company. You’re unlikely to get the information you need (or the job you want).
Before meeting an interview subject an investigator should do some online research on the interview subject. Background information can help the investigator establish rapport, identify areas of vulnerability and determine questioning strategies.
Technology Explosion and Future of Investigations Case IQ
Technology is exploding at an exponential rate and is already creating challenges for investigators of all types, from human resources to law enforcement. Cloud computing and the pervasive use of mobile devices have made it harder for investigators to identify and preserve digital evidence. New encrypted phone apps and virtual private networks have made it easier for people to hide and to cover their tracks.
We also need to think about how technology can produce new types of crime that have never been seen before. Join Walt Manning, President of Investigations MD and the Techno-Crime Institute as well as a speaker and trainer, as he discusses strategies for preparing for the future of investigations.
The webinar will cover:
• How technology is already changing the rules for investigators
• Avenues new technologies will open up for fraud and other misconduct
• Examples of technology-enabled crimes of the future
What investigators should be thinking about today to prepare for the investigation strategies of tomorrow
How OSINT will play an important role in the future, helping to predict, prevent and react against incidents that threaten the Global security.
The presentation will delve into the tools and techniques that enable OSINT practitioners to measure the Global security signals conveyed by the Internet. Multiple facets of information dissemination, collection, analysis and interpretation will be examined, with a focus on the security dimension of the information.
Investigation Report Writing: A Nuts and Bolts ApproachCase IQ
Many investigation reports are written poorly because investigators simply don’t know what to include. Poorly written reports provide little value and may even increase a company’s legal risk. A well written investigation report presents the right information, includes careful analysis and reaches a conclusion.
Meric Bloch, author, trainer, speaker and Principal of Winter Compliance, as he outlines the fundamentals of writing investigation reports.
You will learn:
-What information to include and how to include it
-How to assess witness credibility
-Strategies for evaluating proof
-How to present findings
-How to avoid the most common report writing mistakes
The ability to write clear, concise, accurate and informative investigation reports is a valuable skill for investigators of all kinds. A well-written investigation report provides a complete picture of the incident or event and leaves no questions unanswered about who did what, when and how and is written in language that can be understood by anyone reading it.
Unfortunately, many investigators see writing effective investigation reports as a chore, and that’s why so many reports are rushed, poorly written and incomplete.
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Outline for "Soft Skills, No Bullshit" conference contribution.
Strongly inspired by Richards Heuer, introducing the method of intelligence analysis from incomplete data to high school and university students.
Seminario su come eseguire attività di Open Source Intelligence su siti web, domini, indirizzi IP ed email scoprendo talvolta chi si nasconde dietro siti protetti da whois privacy o gestione anonima tramite TOR o VPN.
J Simon Design assisted Readi Response by providing an updated pitch deck. Readi Response is a combination of mobile app and investigative network that can provide trucking companies sound of mind when tracking and reporting traffic incidents.
I pericoli dell'Internet of Things in ambito sanitario, industriale e privatoDanilo De Rogatis
Slide relative al talk nell'ambito del Seminario "(in)sicurezza informatica: nuovi scenari di attacco" tenutosi all'Università degli Studi di Foggia per l'European Cyber Security Month 2015.
Advanced Resources and Tools for Online InvestigationsCase IQ
Sandra Stibbards shares tips for mining online sources for intelligence gathering when conducting investigations.
To watch the webinar recording, visit http://i-sight.com/webinar-advanced-resources-and-tools-for-online-investigations
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
Learn about phishing, the internet's top cyberthreat, in this slide deck. To view the corresponding on-demand webinar, click here: http://bit.ly/2jowgvt
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
With online fraud cases on the rise, ClearScore's very first Darkpaper explores the UK's attitudes to the dark web and delves into consumers' experiences of online fraud.
Key findings
- A third (33%) of people in the UK have been victims of online fraud.
- Banking details were compromised in 58% of online fraud cases in the UK.
- Online fraud is most likely to cost to individuals between £101 and £500, with 8% of people surveyed losing more than £1,001.
- People in the UK are most likely to only rotate two to three passwords for their online accounts - although nearly a third (29%) have five to ten passwords.
- A quarter of UK residents think some of their data could be for sale on the dark web, although over 55s are most likely not to know (53%).
Fourth Amendment as a Service - Workshop - 2-21-17FourthAsAService
Slides from the Fourth Amendment as a Service Workshop held at the University of Central Florida on January 21st, 2017. Find more at www.fourthamendmentasaservice.org or @4thasaservice
Cyber Security Extortion: Defending Against Digital Shakedowns CrowdStrike
Real world lessons from CrowdStrike Services experts investigating complex cyber extortion attacks
The criminal act of theft is as old as civilization itself, but in the cyber realm new ways to steal your organization's data or profit by holding it hostage, continue to evolve. With each advancement in security technology, adversaries work tirelessly on new techniques to bypass your defenses. This webcast, "Cyber Extortion: Digital Shakedowns and How to Stop Them" examines the evolution of cyber extortion techniques, including the latest "datanapping" exploits. Whether it's an attack on a major movie studio, a massive healthcare system, or a global entertainment platform, recent extortion attempts demonstrate how critical it is to understand today's threat landscape so you can ensure that your organization mounts the best defense possible.
Download this presentation to learn what security experts from the cyber defense frontlines are discussing. Learn about:
•The range of extortion techniques being used today, including commonalities and differences in approaches
•Commodity type ransomware/datanapping vs. hands-on attacks — how are they alike and what are their differences?
•Potential outcomes of paying vs. not paying when attempting to recover data after an attack
•Real world examples of successful attacks and those that were thwarted or mitigated
•Strategies for keeping your organization from being targeted and what to do if you become the victim of a cyber shakedown
CrowdCasts Monthly: You Have an Adversary ProblemCrowdStrike
You Have an Adversary Problem. Who's Targeting You and Why?
Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy.
During this CrowdCast, you will learn how to:
Incorporate Actionable Intelligence into your existing enterprise security infrastructure
Quickly understand the capabilities and artifacts of targeted attacked tradecraft
Gain insight into the motivations and intentions of targeted attackers
Make informed decisions based off of specific threat intelligence
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA)
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself.
The Dark Web consists of World Wide Web content existing on darknets, which are overlay networks that use the Internet, but require specific software, configurations, or authorization to access. The Dark Web forms a small part of the Deep Web - the part of the web not indexed by search engines - although sometimes the term, Deep Web, is mistakenly used to refer specifically to the Dark Web. Credit: Marlabs Inc
In this session Rui will discuss the importance and relevance of cibersecurity in the modern world. From the evolution of the online world, to data privacy and criminal organisations. The internet; the "online" world that can bring down individuals, companies, and even nation states. An entertaining approach of the online dangers and what to do to avoid them.
-“Facts” about NSA/Snowden/Prism
-data classification
-guideline to Safe use of “Cloud”:
-choosing and using Cloud
-open source, alternative cloud services
A selection of case studies which demonstrate how our intelligence, legal, cyber security and advisory experts work as one team to defend reputations and demand privacy for our clients.
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskCase IQ
With recent announcements of increasingly stringent federal policies around record-keeping and due diligence, compliance and investigation professionals are feeling the pressure to demonstrate consistency and rigor in their case management processes.
Planning your investigation, having the right team members involved and reporting on outcomes of an investigation can all be difficult phases of the process.
However, being able to demonstrate that you are quickly, consistently and accurately triaging incidents is even more important now.
The key is to establish decision-making approaches and plan out your entire protocol before the matter comes to your attention through hotline reporting or other mechanism. This ensures structure and success as you triage, investigate, staff the investigation properly and meet the inevitable challenges of reporting and addressing the root causes of incidents.
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...Case IQ
In order to avoid risk while running a successful organization, today’s leaders need to do more than react to cases of harassment, misconduct and employee fraud. They need to prevent these issues. Purpose-built case management software provides data-driven reports that help companies manage risk, spot trends and protect employees and the organization by preventing incidents, as well as fines and reputation damage.
But home-grown or dated solutions come with many challenges. For instance, managing incidents and investigations using manual methods leads to duplication of effort and information silos, resulting in inefficiency. Using these solutions also comes with security risks and inconsistent documentation, opening the company up to fines and lawsuits.
i-Sight’s powerful case management platform streamlines your investigative process and provides the data you need to analyze results, prevent incidents and protect your employees. You’ll save time and money, ensure compliance, and reduce risk, all with one tool.
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Case IQ
When investigating a “he said/she said” case of sexual harassment or other alleged misconduct, are you using scientifically validated methods to interview witnesses, assess their credibility, and reach a defensible conclusion?
Over the past 15 years, scientists have found that much of the conventional wisdom on how to effectively interview witnesses and determine truthfulness is wrong. At the same time, courts have found companies liable for using scientifically unproven interviewing techniques in workplace investigations.
In this webinar you will learn about the hundreds of research studies that scientists have conducted on how to best interview witnesses and assess credibility. You will learn how to apply these scientifically validated methods to your investigations.
Join the i-Sight team and former U.S. Department of Justice attorney Michael Johnson as they discuss how to apply these scientifically validated methods to your investigations.
Protecting the Mental Wellbeing of Corporate InvestigatorsCase IQ
Vicarious trauma is a type of second-hand psychological response most often associated with first responders and front-line crisis workers. Although corporate incident investigators and HR and compliance professionals are usually not the first on the scene, they frequently find themselves listening to both victims and accused people who recount what could be the worst days of their professional lives.
There is no doubt that the case management process can be stressful and sometimes triggering for those who are managing it. The personal and organizational impacts can include compromised risk assessment and investigations, investigator burnout and absenteeism, and a less healthy workplace overall.
Join expert workplace investigator Ken McCarthy as he shares his experience with vicarious trauma and compassion fatigue resulting from his involvement in workplace investigations.
As an investigator, you don’t define your value to the organization; leadership does. What are you doing to be a better business advisor and contribute to the organization’s goals? In other words, why should the bosses listen to you?
Because misconduct doesn’t happen in a vacuum! It results from a perfect storm of factors like employee ignorance, a failure to see the larger implications, a lack of training and procedures, or a failure of internal controls. And you have a view to all of this in your cases.
This webinar outlines how you can become a better strategic advisor, how to think like a business leader, and what keeps executives awake at night. You’ll learn how case management can drive a culture of prevention, and how you can prove the bottom-line ROI of investigations.
Join Meric Bloch, Strategic Advisor at Winter Investigations as he discusses how investigators can become business advisors to the C-suite using their knowledge of case management and risk assessment.
In this webinar, you will learn:
Goals of a strategic business advisor.
-What advice does a strategic advisor give?
-What should a strategic advisor not do?
-How an investigator can become a strategic advisor.
-How stellar case management positions investigators as strategic advisors.
5 Steps to Creating an Ethical Work CultureCase IQ
You get it. Being an ethical organization matters. A lot.
But ethics isn’t just a quarterly HR campaign or a glossy conduct guide; in order to really have a bottom-line business impact, organizational ethics must function as an integral pillar of company culture over time.
So, what are the best practices to make sure your organization is regularly thinking about ethics and including it in everyday decision making? What are some creative ways to bring focus to this vital but often overlooked function? And how can you most effectively deal with and investigate an incident or a breach when it occurs?
How to Assess, Level Up, and Leverage Your Culture of ComplianceCase IQ
Compliance officers know that a strong culture of compliance is indispensable to risk management and better business performance in the modern world. So how, exactly, can you capture insights into the current state of your corporate culture, and then use that information to (1) shore up weak spots in ethics and compliance operations; and (2) leverage a strong culture of compliance for better operations across the enterprise?
Join Matt Kelly, Editor and CEO of RadicalCompliance.com, as he discusses how and why compliance leaders need to use data to improve their investigations and corporate culture.
Everything You Need to Get E&C Investigations Right (According to the DOJ)Case IQ
Internal investigations have long been a part of every ethics & compliance program and every E&C professional’s tool kit. However, the US Department of Justice has made clear that internal investigations are more important than ever.
In October 2021, Deputy Attorney General Lisa Monaco reinstituted the substance of the Yates Memo, requiring companies to turn over all information on any culpable individuals. Recent criminal enforcement actions by the DOJ have thrown new and increasing scrutiny on internal investigations. Now, CCOs and CECOs must certify compliance in any FCPA settlement.
In short, getting E&C internal investigations right has taken on a new importance.
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
Over the past few months, we’ve seen employees quit in record numbers. While there are many reasons for “The Great Resignation”, a standout is employee trust. A study from Gallup suggests that only one in three employees strongly agree that they trust the leadership of their organization.
Employees want to trust the companies they work at and the people they work with. They want to feel comfortable coming to HR with their complaints and concerns. But building trust takes time, and effort. As organizations are planning their post-pandemic strategies, now is a perfect time to place an intentional emphasis on building trust.
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Case IQ
In today’s “new world of work,” many organizations run on a hybrid model, with some employees working remotely and others in the physical office. While this set-up is convenient, it can cause unique interpersonal issues between employees.
Reduced face-to-face communication makes it harder for teams to bond, while making it easier for harassers to get away with bad behavior. To reduce harassment incidents in your hybrid workplace, you need to foster a culture of openness, willingness to learn, and compassion.
Join workplace investigation and executive management expert Kenneth McCarthy as he outlines how to address and prevent hybrid workplace harassment incidents.
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Case IQ
The topic of workplace diversity, equity, and inclusion is at an all-time high right now. It has been proven that there is a direct correlation between inclusive workforces, productivity, and revenue. According to the McKinsey & Company diversity report, “companies in the top-quartile for ethnic and cultural diversity on executive teams were 33% more likely to have industry-leading profitability.”
Without a strong DEI program, though, your organization could face internal harassment incidents, discrimination lawsuits, high employee churn, and a poor corporate reputation, leading to lost customers and clients.
Join inclusive marketing consultant, speaker, and author Michelle Ngome as she outlines DEI best practices that will increase your organization’s revenue, as well as prevent workplace incidents.
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...Case IQ
More and more, disgruntled employees have been taking to TikTok, Twitter, and other social media sites to share videos and posts of their bad work experiences. These stories are more likely than ever to go viral, which can lead to lost business, reputational damage, employee churn, and lawsuits, just to name a few unwelcome consequences for employers.
While some people might be acting in bad faith, employees have been finding tried traditional HR channels less than satisfactory. They feel un-heard and undervalued, and they turn to the internet to tell their stories, and receive fast responses.
You can’t build a brand or accomplish your mission statement without your employees. To avoid the repercussions of viral incidents and strengthen your brand, you have to repair your employer/employee relationship and work culture—or better yet, create a healthy, ethical culture from the start.
Join employment lawyer Janette Levey as she breaks down major viral incidents including Better.com, Starbucks, and Amazon, their consequences, and what to do to avoid them.
What is Psychological Safety in the Workplace?Case IQ
Catherine Mattice discusses how workplace concepts such as incivility, harassment, and inequity are intertwined, and how organizations can address them more proactively to create psychological safety for all workers.
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Case IQ
Case management is an integral component of any institution’s overall compliance program, let alone those with suspicious activity report (“SAR”) filing responsibilities. However, misconduct is often reported through multiple channels such as whistleblower complaints, HR, and even through a company’s legal department. If misconduct requires SAR filing, input from HR, and advice from legal, but comes in through possibly siloed teams, how can a company feel confident that they are accurately capturing and consistently dispositioning these cases?
The answer boils down to an often-overlooked area – case management systems.
Join financial crime compliance advisory and training specialist Michael Schidlow, as he explains best and worst practices in the field, gives tips on what case management tools should always and shouldn’t ever do, and describes how to utilize metrics from those systems to get an accurate snapshot of their company’s risk profile.
Building Effective Sexual Harassment Prevention Policies and TrainingCase IQ
There’s no place for sexual harassment in today’s workplace, and employers have a responsibility to investigate every allegation. But reacting after a complaint is made doesn’t fix a culture that allows sexual harassment to occur. A proactive approach, incorporating a strong policy, backed by training and commitment at all levels, is key to building an organizational culture that discourages sexual harassment.
Join Philip Miles, employment lawyer, McQuaide Blasko, as he outlines the steps for building policies and training plans to prevent sexual harassment in the workplace.
How to recognize and minimize unconscious bias in the workplaceCase IQ
The modern workplace should be an inclusive and welcoming environment for all employees but that isn’t always the case. In fact, systemic inequality is the norm for a vast number of workplaces throughout North America, Europe and beyond. And while the BLM and MeToo movements have received much media attention, the underlying factors that contribute to the inequality they point out aren’t always addressed.
Implicit, or unconscious, bias is the root of many systemic inequities in the workplace. It’s important that we recognize our personal biases, take action to mitigate them and actively serve as an ally to others.
On June 10, join Catherine Mattice-Zundel, president of Civility Partners, a training and consulting firm focused on helping organizations build positive workplace cultures, as she outlines strategies for uncovering and reducing implicit bias in workplace decision-making.
The webinar will cover:
● The origins of bias and four different types of bias
● Risk factors that increase our likelihood to engage in bias
● How to compensate for and attempt to overcome bias through clear and tangible actions
● Strategies to combat microaggressions and other exclusive behaviors using simple, tried and true
intervention methods
Search Engine Skills for Workplace InvestigatorsCase IQ
Whether you are investigating fraud, harassment or other misconduct, solid online research skills can serve you well. The internet is a valuable resource for finding information and evidence to support your case, and it’s important to stay up to date on its use and limitations.
Join Cynthia Hetherington, investigation expert, trainer and founder of Hetherington Group, as she explores techniques and tools for getting the information you need online.
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Case IQ
In a 2019 Monster survey, 90 per cent of employees said they had experienced bullying in the workplace. The Pew Research Center reports that 69 per cent of women say they have been sexually harassed in a professional setting. These numbers point to a serious problem that leaders can’t afford to ignore.
Policies and training are, of course, critical to the prevention of bullying and harassment, but there are other avenues that you may not have considered. Diversity and inclusion have benefits that go far beyond compliance. Not only do companies that embrace diversity and inclusion outperform those that don’t, but understanding, accepting and valuing differences ensures a fairer, more collaborative environment with less conflict.
Join Catherine Mattice-Zundel, president of Civility Partners, a training and consulting firm focused on helping organizations build positive workplace cultures, as she explores strategies for using diversity and inclusion to prevent harassment and bullying.
The webinar will cover:
What constitutes bullying and harassment in the workplace
Best practices for addressing and preventing bullying and harassment
How diversity and inclusion helps to reduce bullying and harassment
How to achieve diversity and inclusion
Case studies of how bullying, inequities and harassment tie together, and how resolving one requires resolving all
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
“I never would have imagined”, said the company owner, manager, colleague, or workplace friend. It is hard to reconcile that people would engage in fraudulent behavior in the workplace, let alone the depth of these schemes. Financial misconduct and internal fraud are among the biggest threats to today’s organizations. Without the right controls and prevention measures in place, companies are at financial and reputational risk.
Join financial crime compliance advisory and training specialist Michael Schidlow, as he reviews recent cases of internal fraud, what we can learn from them, and controls that companies can put in place to prevent fraud
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
It’s long been clear that organizations with strong ethical cultures perform better than those without. In addition to the multitude of positive impacts a strong ethical culture provides, these organizations will also typically experience less fraud and misconduct. However, to achieve maximum results, a strong ethical culture must focus on accountability and include robust fraud prevention measures.
Ethical accountability takes time and effort to build, but the rewards of fostering the right culture in an organization are measurable. Fewer fraud incidents, for example, can be demonstrated by hard numbers. A strong code of conduct is a great start, but it’s critical to have a comprehensive ethics program that fosters accountability.
Join Joseph Agins, CFE, CCEP, adjunct professor and fraud expert, as he outlines strategies organizations can use to ensure every employee from the C-Suite down has the tools they need to help them make ethical decisions and prevent fraud.
The webinar will cover:
The importance of tone from the top
Identifying the pressures employees face and thus the ethics and fraud risks
Understanding the resources employees have (or not) to report wrongdoing
Whether the internal imagining of the culture matches the reality
Developing tools and strategies for fostering ethics in the workplace
Anti-fraud measures that should be incorporated into every ethics policy
Encouraging ethics and accountability
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
49. Thank-you for participating
If you have any questions, please feel free
to email them to:
Sandra Stibbards, Owner / President of Camelot Investigations
sandra@camelotinvestigations.com
Questions about i-Sight:
info@i-sight.com
10/17/2016