Date and Time:
September 14, 2021 11:00 am - 1:00 pm
September 15, 2021 11:00 am - 1:00 pm
September 16, 2021 11:00 am - 1:00 pm
September 17, 2021 11:00 am - 1:00 pm
Event Location:
Online, India
Description
Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. Digital forensics is the use of specialized tools and techniques to investigate various forms of computer-oriented crime including fraud. A cybercrime investigator is primarily concerned with gathering evidence from digital systems that can be used in the prosecution of internet-based, or cyberspace, criminal activity.
Benefits of attending:
- Learn to produce evidence in the court, which can lead to the punishment of the culprit.
- Learn how to capture important information if the computer systems are compromised.
- Learn Ways of solving cybercrime
- How to protect sensitive & Critical data
Who should attend:
- Internal & External Auditors
- Chief Risk Officers
- Chief Audit Executives
- CFOs
- Cybercrime Investigators
- Fraud Examiners
- Risk & Governance professionals
Thought Leaders:
- Kartikeya Raman
Director
Grant Thornton Bharat LLP
- Akshay Garkel
Partner & Leader Cyber
Grant Thornton Bharat LLP
- Simrat Kaur
Associate Partner
LexOrbis
Brochure: DataPrivacy_V7
Event Timelines
• Data Privacy
o Overview of the Bill
o Impact
Enterprise
Online Sites and Other Data Aggregators
Financial Firms
o Personal Data Protection
Defining personal data
Protecting sensitive & Critical data
Need for data protection officer
• Legal Implications of India’s Data Protection & Privacy Bill
o Responsibilities for data protection
o Accountability for ensuring privacy
o Landmark cases and implications
o Exemptions under the bill - additions and removals
• Digital Forensics
o Background and legal practices
Introduction to the science of forensics
The background of digital crime
Case histories of real-life cases
Standards of digital forensics
The risks faced by organizations
o The digital forensics response framework
The first responder digital forensics toolkit
Scene of digital crime management
The Secure Operations Centre (SOC)
The CSIRT (Computer Security Incident Response Team)
Roles and responsibilities
Implementing a framework
Case management
• Redefining Cyber Crime
o Defining cybercrime
o Ways of solving cybercrime
o Sections which cover the implication
o Cyber Investigation
Collecting and processing digital evidence
• Domain Name System (DNS)
• Extended security infrastructures
• Investigating mobile technologies
• Acquisition of digital evidence and artifacts
• Handling of digital evidence and artifacts
• Processing of digital evidence and artifacts
• Case management protocols
• Wireless protocols
• Supporting technologies
o Investigations of internal and external digital crimes
OSINT (Open Source Intelligence)
Its place in the digital forensic investigation
Defining internal crimes
Defining external crimes
Child exploitation and investigations
Malicious applications
Ransomware
Anti-forensics capabilities
Digital forensics and terrorism