Abstract: Not Available
Bio: Not Available
Abstract: Not Available
Bio: Timothy Gallagher is a Managing Director with Kroll's Cyber Risk Practice. Tim is a highly regarded law enforcement executive, who served with great distinction for over two decades with the Federal Bureau of Investigation. Tim's practice focuses on working with his clients to identify and mitigate cyber threats. Before joining Kroll in 2018, he was the Special Agent in Charge of the FBI's Newark, N.J. office, where he managed the activities of over 800 professionals. Tim possesses a broad array of investigative experience spanning the areas of Financial Fraud, Counterterrorism, and Cyber Crime.Prior to his appointment as Special Agent in Charge of FBI Newark, Tim served at the FBI's Headquarters in Washington, D.C., as Deputy Assistant Director of the Criminal Investigative Division, the largest division in the FBI. In this capacity, Tim focused on developing and executing effective strategies to mitigate criminal threats with a Financial Crimes nexus. He regularly collaborated with his law enforcement counterparts in the UK, Canada, Australia, and New Zealand to combat transnational criminal organizations, money laundering, and cyber threats.Tim also served asthe Special Agent in Charge of the Criminal/Cyber Division in the Washington, D.C., Field Office. During this time, he played leading roles in several crises and noteworthy investigations, including the September 2013 Washington Naval Yard shooting, threats to members of congress and an attempted vehicle attack on the White House and US Capitol which resulted in the fatal shooting of the perpetrator. Additionally, Tim led a team investigating hacking groups/individuals such as Anonymous, the Syrian Electronic Army, and Guccifer which targeted US Government and Infrastructue.
Cybercrime and the Supply Chain
Abstract: Not Available
Bio: Capt. Cailean Gee is the deputy director, A2 Intelligence Directorate, 217th Air Component Operations Squadron, 110th Wing, Battle Creek Air National Guard Base, Michigan. As the deputy director, Capt. Gee leads all-source intelligence planning, training, and exercise support to United States Air Forces in Europe – Air Forces Africa (USAFE-AFAFRICA).
Capt. Gee enlisted in the Air Force in 2003 as a Security Forces specialist and transitioned to the Michigan Air National Guard in 2005. He attended Tri-State University graduating with a Bachelor of Science in Criminal Justice in 2007. Capt. Gee was selected for commissioning in 2009, and graduated from U.S. Air Force Officer Training School, Maxwell Air Force Base in April 2010. Capt. Gee attended Michigan State University, graduating with a Master of Science in Law Enforcement Intelligence Analysis in 2011, and Vermont Law School earning a Juris Doctor in 2016. Capt. Gee has 18 years of combined active duty and guard/reserve service, with technical and leadership experience in both security forces and intelligence career fields.
His notable staff tours include Joint Force Headquarters-Department of Defense Information Network (JFHQ-DODIN) and Joint Task Force-Liberty. At JFHQ-DODIN, Capt. Gee served as a division chief for the collection management, counterintelligence, and human intelligence (HUMINT) divisions. In his civilian capacity, Capt. Gee currently works in the Office of the Undersecretary of Defense for Intelligence and Security, and is an associate professor at Michigan State University, College of Social Science, School of Criminal Justice. Prior to this he was the director of intelligence for Joint Task Force-Liberty, Joint Base McGuire-Dix-Lakehurst, in support of Operation Allies Welcome
Abstract: Not Available
Bio: Patrick Grobbel is a managing director in the Data Insights and Forensics practice, based in Washington, D.C. He leverages more than 20 years of legal advisory, engagement delivery and business development expertise with financial advisory firms. Prior to joining Kroll, Patrick served as a managing director in FTI Consulting’s Data and Analytics practice. Patrick is an expert in providing solutions to matters requiring responses to government regulatory scrutiny, resulting in the need for services, including investigative forensic accounting, fraud investigation, cyber-enabled crimes, anti-money laundering (AML) investigations, complex dispute resolution and white-collar criminal defense. Patrick holds a B.A. from Michigan State University and a certification in forensic accounting from Georgetown University. He is a Certified Fraud Examiner (CFE), Certified Anti-Money Laundering Specialist (CAMS) with advanced certifications in Counter-Terrorist Financing (CTF) and Cyber-Enabled Crime (CEC).
Five Questions About Cybercrime You Should Think About
Abstract: The cybercrimeology.com podcast is a window into the world of cybercrime, its research and its researchers. With more than 60 episodes since 2019 it has provided me the opportunity to talk to a great number experts on cybercrime from around the world. This has given me a lot of time to work on the art of conversation and to consider questions with bright and insightful minds dedicated to solving the issue of crime online. Good discussion is the petri dish thought, and good answers breed good questions. In this presentation, I will share my experiences of building a science communication podcast and raise five questions about cybercrime and research that you should be thinking about.
Bio: Michael Joyce is the executive director for the Human-Centric Cybersecurity Partnership (https://hc2p.ca) a transdisciplinary group of scholars, government, industry and not-for-profit partners that are generating research and mobilizing knowledge that will help create a safer, more secure, more democratic and more inclusive digital society. He has nearly a decade of experience in the development and management of national and international cybercrime and cybersecurity knowledge mobilization programs, such as Canada’s Smart Cybersecurity Network (https://serene-risc.ca). He is the host of the Cybercrimeology podcast which discusses cybercrime science and research (https://cybercrimeology.com). In his spare time, he is completing a doctorate in criminology at the University of Montreal in the cybercrime prevention laboratory (https://www.prevention-cybercrime.ca/).
Terrorism and Targeting People, Healthcare Systems and the Effect on National Security During the COVID 19 Pandemic
Abstract: The pandemic has produced opportunities for terrorist groups to escalate their activities beyond their traditional trade of online disinformation. The pandemic has created significantly more public attention and stress on a large number of critical infrastructure components that already exist or arise out of government action. These components can represent an exceptionally attractive target to terrorist groups and this talk discusses some of the national security consequences of the synergistic collision of the pandemic and terrorist group objectives in the digital domain.
Bio: Max Kilger is an Associate Professor in Practice in the Department of Information Systems & Cyber Security at the University of Texas at San Antonio and Director of the Master in Data Analytics Program. He is also the Academic Director of the UTSA IC CAE Critical Technology Studies Program which prepares young people for a career in the Intelligence Community. Max received his Ph.D. in Social Psychology from Stanford University. He has over 20 years of experience in the area of information security concentrating on the social and psychological factors motivating malicious online actors, hacking groups and cyberterrorists. Max has written and co-authored a number of journal articles, book chapters and books in the national security space on profiling, motivations of malicious online actors, the social structure of the hacking community, cyberviolence, factors related to civilian attacks on critical infrastructure, hybrid warfare and the emergence of cyberterrorism. He co-authored the popular book Reverse Deception: Organized Cyberthreat Counter-Exploitation and has co-authored his second book Deception in the Digital Age. He is a founding and board member of The Honeynet Project – a not-for-profit international information security organization with 50 teams of experts in 42 countries working for the public good. Max was a member of a National Academy of Engineering committee dedicated to make recommendations for combating terrorism. He is a member of a multinational instructional team for a NATO counterterrorism course and a faculty member of the Cyber Center for Security and Analytics. He is also on the Scientific Board of the graduate interdisciplinary cyber security program at LUISS Guido Carli University in Rome, Italy. Max is a frequent national and international speaker to industry, federal law enforcement, the military and intelligence communities. University website: https://business.utsa.edu/faculty/max-kilger-2/
Cyber Threat Analysis: Placing Threat Intelligence in Context with Incident Response
Abstract: There is a bias within threat intelligence teams for current intelligence over useful analysis. Like the 24-hour news cycle, critical events and indicators of this week are forgotten by the following week. Worse, these proven incidents are often ignored in favor of the next round of up to the minute data. This presentation describes a framework for theory-driven threat intelligence analysis. It provides sample analysis that is actionable along with anecdotes, not data, of how that action took place during cyber incident response work over years. Finally, assessment criteria for implementing a successful analysis framework will be discussed.
Bio: Dr. Loper is the Vice President of Incident Response and Digital Forensic for the Herjavec Group. He has been a partner-level national practice lead at a global consulting firm. He has owned a forensic consulting firm. He has been a practicing professional and researcher in Digital Forensics and Incident Response (DFIR) since 1997. Dr. Loper is a professor of computer science at Southern Methodist University. He was lead instructor, author, and peer review board member for the US Department of Justice's Electronic Crime and Technology Center of Excellence. Dr. Loper has authored books, presentations, and articles on DFIR including co-authoring Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, distributed by the USDoJ and the Department of Homeland Security
The Dark Web: A Playground for Threat Actors & Scammers
Abstract: The term “dark web” can be seen in the news nearly every day. Join the Michigan State Police, Michigan Cyber Command Center as they explain what the dark web actually is, who’s accessing it, and then provide a deep dive into the dark web landscape of the recent, common threats and scams.
Bio: Asier is a postdoc at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and the Center of Expertise Cyber Security at The Hague University of Applied Sciences. He is a criminologist interested in how, when, and where cybercrime occur, focusing on the human factors involved. He mainly relies on quantitative methods and data science to do research, and enjoys collaborating with researchers from other disciplines, practitioners, and professionals. With his research, Asier aims to generate knowledge to better understand cybercrime, and to find solutions to reduce it or mitigate its impact.
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces
Abstract: In the face of market uncertainty, illicit actors on the darkweb mitigate risk by displacing their operations across digital marketplaces. In this study, we reconstruct market networks created by vendor displacement to examine how digital marketplaces are connected on the darkweb and identify the properties that drive vendor flows before and after a law enforcement disruption. Findings show that vendors’ movement across digital marketplaces creates a highly connected ecosystem; nearly all markets are directly or indirectly connected. These network characteristics remain stable following a law enforcement operation; prior vendor flows predict vendor movement before and after the interdiction. The findings inform work on collective patterns in offender decision-making and extend discussions of displacement into digital spaces.
Bio: Marie Ouellet is an Assistant Professor in the Department of Criminal Justice and Criminology at Georgia State University. Her research explores how illicit groups emerge and evolve, and how networks structure this process.
Abstract: Not Available
Bio: Not Available