Date and Time:
September 9, 2022 10:00 am - 3:00 pm
Event Location:
Online, India
Description
Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. Digital forensics is the use of specialized tools and techniques to investigate various forms of computer-oriented crime including fraud. A cybercrime investigator is primarily concerned with gathering evidence from digital systems that can be used in the prosecution of internet-based, or cyberspace, criminal activity.
Benefits of attending:
- Learn to produce evidence in the court, which can lead to the punishment of the culprit.
- Learn how to capture important information if the computer systems are compromised.
- Learn Ways of solving cybercrime
- How to protect sensitive & Critical data
Who should attend:
- Internal & External Auditors
- Chief Risk Officers
- Chief Audit Executives
- Cybercrime Investigators
- Fraud Examiners
- Risk & Governance professionals
- Legal & Compliance
Thought Leaders:
- Anirban Sengupta
Partner, Cyber Security and Data Privacy
PWC - Amol Pitale
Managing Director
Ankura - Amulya Podile Pepalla
Associate Director
PwC
Event Timelines
Session 1: Data Privacy:
• Data Privacy
o Setting the context
o Defining different categories of data e.g., sensitive data
• Key Data Privacy Principles
• Common data privacy regulatory requirements
• Data Privacy Implementation challenges for
o Enterprises
o Global Portals / Online Sites
• Enterprise Data Protection: The Cyber Security Dimension
o Tools and Technologies for Data Protection
• Structuring a Data Privacy / Protection Org
Session 2: Digital Forensics:
• Background and legal practices
o Introduction to the science of forensics
o The background of digital crime
o Case histories of real-life cases
o Standards of digital forensics
o The risks faced by organizations
o The digital forensics response framework
• Forensic Report Writing
o Introduction
o Report Samples
o Report writing skills
o Common mistakes in report
o Report submission
Lunch Break
Session 3: Redefining Cyber Crime
• Defining cybercrime
• Ways of solving cybercrime
• Sections which cover the implication
• Cyber Investigation
o Collecting and processing digital evidence
Domain Name System (DNS)
Extended security infrastructures
Investigating mobile technologies
Acquisition of digital evidence and artifacts
Handling of digital evidence and artifacts
Processing of digital evidence and artifacts
Case management protocols
Wireless protocols