Showing posts with label training. Show all posts
Showing posts with label training. Show all posts

Thursday, June 2, 2022

What You Should Know About Trade Secrets

A Webinar Series for Start-ups: Part I & II

Part I - Introductory Session

Partners Melanie Seelig and Mauricio Uribe kicked off a two-part, comprehensive discussion on trade secrets. The presentation served as an introduction to the topic and provided more general information.

View live presentation: Video Link

View on SlideShare: Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part I

Part II - Detailed Discussion

Partners Melanie Seelig and Mauricio Uribe continued the two-part, comprehensive discussion on trade secrets. The presentation focused on a more detailed exploration of the topic and strategic implications for various scenarios.

View live presentation: Video Link

View on SlideShare: Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part II

View and download the full presentation below. Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part I and II

View more webinars on our Vimeo home page: Knobbe Martens on Vimeo

View more Knobbe Martens slide presentations here.

Thursday, March 31, 2022

Become a Successful Security Consultant - Step One

The Successful Security Consulting (SSC) Course is a one-day specialized training program.

 

It was developed for those who are interested in becoming security consultants, and those who recently launched an independent security consulting practice. 

 

This is a one-day program presented by leading technical and management security consultants. Seasoned, subject matter expert instructors provide pertinent and proven industry experiences.

 

Topics include:

  • The Business of Security Consulting
  • Security Consulting Practice Areas
  • Establishing and Operating a Consulting Practice
  • Getting Business and Attracting Clients
  • Executing a Consulting Assignment
  • Avoiding Common Mistakes and Pitfalls

The class is also helpful to experienced security consultants who are looking for new ideas and ways to reinvigorate their existing consulting practices. Don’t miss this opportunity to advance your career and your business.

 

Attendees of the Successful Security Consulting Course receive credit hours for CSC through IAPSC and CPE credits through ASIS. 

 

The 37th Annual IAPSC Conference will be held at The Westin Westminster in Colorado June 13-15, 2022. 

 

SCC attendees are encouraged to extend their stay and register for the Annual IAPSC Conference from Tuesday, June 14 – to Wednesday, June 15. Discounted rates and Early Bird registration are available through Wednesday, April 13.  Read more on the IAPSC website.

Tuesday, May 18, 2021

Seminar in Information Security & Cryptography

Zurich Switzerland, June 14−16, 2021
Lecturers: Prof. David Basin and Prof. Ueli Maurer, ETH Zurich

We are very pleased to announce that the seminar in Information Security and Cryptography on June 14-16 in Zurich Switzerland will take place and we still have a few places free.

We are fortunate that the situation with COVID-19 has improved to the point where we may hold the seminar, under the provisions of the Swiss Federal Office of Public Health (BAG) and their regulations for hotels and restaurants. 

This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects. The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography including blockchains and crypto currencies.

The lectures and all course material are in English. A full description of the seminar, including all topics covered, is available at https://www.infsec.ch/seminar2021.html. There are hotel rooms at a special group rate (deadline 24th of May) Please ensure you are allowed to enter Switzerland as every country has different regulations.

Wednesday, October 21, 2020

Spycam Detection Training - Now with English, Spanish & Korean Closed Captions

On-line, entertaining, self-paced, video training with Certificate of Completion...

Click to enlarge.
SPYCAM DETECTION TRAINING
teaches the basic investigative skills necessary to identify and detect covert spy cameras. 
 
It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. 
 
By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.

In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.

Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.

SPYCAM DETECTION TRAINING is primarily useful for:

  • security managers,
  • facilities managers,
  • store managers,
  • security officers,
  • private investigators,
  • landlords,
  • real estate management companies,
  • targets of activist groups,
  • and businesses which invite the public into their locations.

Recognizing and detecting spy cameras is also a valuable skill for:

  • law enforcement personnel,
  • security management students,
  • and the general public wishing to protect themselves against video voyeurism.

The course is structured to give the student:

  • a full understanding of the video voyeur problem,
  • a written policy which provides deterrence, leverage, and shows due diligence in court,
  • an understanding of the different types of spy cameras and how to identify them,
  • instruction on how to plan and execute a proper inspection,
  • and instruction on what to do if a camera is found and how to handle the evidence.

The course takes about an hour to complete.

Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.

Although SPYCAM DETECTION TRAINING focuses heavily on protecting workplace environments, there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases. 

Preview SPYCAM DETECTION TRAINING for FREE.

Friday, July 17, 2020

International Conferences on Business Espionage and Cyber Security

August 23-24, 2021 in Budapest, Hungary
ICBECS 2021: 15. International Conference on Business Espionage and Cyber Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Business Espionage and Cyber Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Business Espionage and Cyber Security. more

ICBECS 2020: 14. International Conference on Business Espionage and Cyber Security, August 19-20, 2020 in Budapest, Hungary (to be held digitally) more

Tuesday, January 21, 2020

‘Spy Games’ - 10 Civilians Vie for $100,000 Prize

One can’t deny that there is a certain charm and pull around the life of a spy - from going on undercover missions to just enjoying the finer things in life à la James Bond, and if you are keen on seeing how one goes about acquiring the skills needed to be a good spy, then Bravo’s latest offering ‘Spy Games’ might just be what you have been looking for...


One can’t deny that there is a certain charm and pull around the life of a spy - from going on undercover missions to just enjoying the finer things in life à la James Bond, and if you are keen on seeing how one goes about acquiring the skills needed to be a good spy, then Bravo’s latest offering ‘Spy Games’ might just be what you have been looking for.  more

Tuesday, January 7, 2020

The Art of Investigation (book)

https://amzn.to/2tF8RQ4
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way.

The editors and contributing authors* are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator’s professional skill-set.

Each chapter discusses the applicability of the traits to the contributor’s own work and experience as an investigator. more
*Robert Rahn (Lt. Ret.) is one of the excellent contributors.
ISBN-13: 978-1138353787
ISBN-10: 1138353787

Monday, January 6, 2020

Information Security and Cryptography Seminar

Information Security and Cryptography
Fundamentals and Applications
June 8-10, 2020 in Zurich, Switzerland
Lecturers: Prof. David Basin and Prof. Ueli Maurer

This seminar provides an in-depth coverage of Information Security and Cryptography from both a conceptual and an application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience.

A full description of the seminar, including all topics covered, is available at https://www.infsec.ch/seminar2020.html. Early registration is until February 28th.

The seminar takes place in Zurich Switzerland. The lectures and all course material are in English. more

Friday, October 11, 2019

Spy Camera Detectors – Do they work? How do they work?

Covert cameras have been around since the 1800’s. Interestingly, as soon as photography developed, people wanted to surreptitiously take photos. From voyeurs to private eyes, a spycam was the gadget to have.

In 1900, movie maker, George Albert Smith, glamorized optical voyeurism in his movie, As Seen Through a Telescope. We will take a historical shortcut here and leave the discovery of these early film spy cameras to auctioneers and collectors.

Our spy camera detection history begins with the advent of CCD and CMOS behind the lens. These are the electronic sensors within modern digital spy cameras which capture images.

With a little knowledge—aided by some inexpensive gadgets—you can detect spycams! Continued here.

Wednesday, July 10, 2019

Tuesday, June 18, 2019

Security Message Screen Savers for Business Computers and Laptops (FREE)

Three stock Security Message Screen Savers to choose from. Five rotating screens with the top five information security best practices employees can implement themselves.
  • Reminders work.
  • Put your idle computer screens to work as your security helpers.
  • Three backgrounds to choose from, or commission custom screens.
Click link to see these information security screensavers in action.
FREE to use as-is with "Logo goes here" removed, or can be customized with your business logo.
Need to customize? Contact us for details and cost.

Wednesday, March 27, 2019

Information Security and Cryptography Seminar - June 17-19, 2019

This seminar provides an in-depth coverage of Information Security and Cryptography from both a conceptual and an application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience. This includes the foundations needed to understand the different approaches, a critical look at the state-of-the-art, and a perspective on future security technologies.

The material is presented at three different levels. At the highest level, the basic concepts are presented in detail, but abstractly (e.g., as black boxes), without mathematics. No background is required to follow at this level. At an intermediate level, the most important concrete schemes, models, algorithms, and protocols are presented as well as their applications. Here some minimal mathematical and systems background is assumed. At the deepest level, which is not required to understand the higher levels, different special topics, requiring some mathematical background, are discussed.

Lecturers:
Prof. David Basin and Prof. Ueli Maurer
Advanced Technology Group GmbH
Grundgasse 13
9500 Wil
Switzerland
F: +41 (0)44 632 1172

Seminar Location: 
Marriott Courtyard Zurich North
Max-Bill-Platz 19
CH-8050 Zurich
Switzerland
more

Wednesday, January 9, 2019

Security Awareness Report for Executives

What can executives do to create or enhance environments to enable awareness programs to succeed?

The first of its kind, the SANS Security Awareness Executive Report draws data from the 2018 Security Awareness Report to reveal a detailed analysis of what drives a thriving awareness program. more

Wednesday, December 26, 2018

Being Your Own Bodyguard, by Richard Roth (Kindle)

Click to enlarge.
Foreword by The Honorable Carlos C. Campbell

Rich Roth condenses over four decades of experience as a member of the United States Secret Service, and as a private security consultant and bodyguard.

His business portfolio includes cyber security, executive protection, aircraft and airport vulnerability, threat assessment and mitigation, training, perimeter detection and CCTV systems design and crisis management.

From the plazas of Paris, to dodging the guns in the Gaza strip, to the cafes in Caracas, Roth slips out of the shadows of surveillance to inform readers about how they can protect themselves through situational awareness, adaptation, and employ techniques and tactics for survival and mitigation.

Being Your Own Bodyguard deals with physical layouts and boundaries, psychological characteristics, and physiognomic [facial expressions] clues in assessing threats. Rich draws heavily on his experience with the USSS that includes over one hundred protection assignments. more

Monday, December 24, 2018

Security Director Alert - Well Produced Information Security Awareness Videos for Employees

Foreign intelligence entities, which may include foreign governments, corporations, and their proxies, are actively targeting information, assets, and technologies that are vital to both U.S. national security and our global competitiveness. 

Increasingly, U.S. companies are in the cross-hairs of these foreign intelligence entities, which are breaching private computer networks, pilfering American business secrets and innovation, and carrying out other illicit activities.

The National Counterintelligence and Security Center is dedicated to raising awareness among government employees and private industry about these foreign intelligence threats, the risks they pose, and the defensive measures necessary for individuals and organizations to safeguard that which has been entrusted to their protection.

The following products will enable personnel to better understand these threats and provide guidance and tips for protecting the sensitive information, assets, technologies, and networks to which employees have access. It will also serve to help them protect their personal, confidential information that may be used by others to gain their trust. more

Videos:
Social Media Deception Trailer
Social Media Deception
Social Media Deception Full Video
Social Engineering
Spear Phishing (30 second trailer)
Spear Phishing 2017
Spear Phishing Full Video
Travel Awareness
Human Targeting
Supply Chain Risk Management
Economic Espionage  (True story.)

Sunday, December 24, 2017

"Hey, kids. Make BIG money in your spare time. Train spies!"

The UAE is recruiting former CIA and US government officials in a bid to create a professional intelligence body modeled on leading Western agencies.

The Gulf state has long relied on Western countries to build up its intelligence infrastructure, but are now paying big bucks to hire former US intelligence employees to build its spying capabilities.

Details of the training were reviewed by Foreign Policy and show daily seminars, scavenger hunts and training exercises in four-to-six man surveillance teams.

The following weeks provide advanced training on creating undercover identities when attending embassy functions and how to groom intelligence assets...

Former CIA and US government officials are drawn to the promise of a lucrative career, with instructor salaries of up to $1,000 a day funding an extravagant lifestyle, Foreign Policy reported. more

Saturday, December 9, 2017

Seminar in Information Security and Cryptography

Seminar in Information Security and Cryptography
Zurich Switzerland, June 11-13, 2018

Lecturers: Prof. David Basin and Prof. Ueli Maurer, ETH Zurich

Information Security and Cryptography. A full description of the seminar, including all topics covered, is available at infsec.ch/seminar2018.

This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects. The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography.

The seminar takes place in Zurich, Switzerland. The lectures and all course material are in English.