Computer Misuse: The Use of Forensics & Associated Policies

Summary

This Workshop covers a wide range of incidents, and the policies, and procedures to manage them. Comments on tools used for investigation are also provided by delegates who overall had experience of security or forensic investigations.
Log in to access this resource in full. If you do not have a login use the form below to request access.

Information request

I would like information about purchasing this resource
I'd like to know if my organisation is already a member
Sign me up for the monthly newsletter
Name*
Company*
Job Title*
Email*
Telephone
General enquiry or comment?
815454
Sum the two numbers in white
and enter the total value below


Unparalleled Learning

Members Include

dmg-media-logo-colour-RGB-WEB-250px
johnlewis
mcdonalds
united biscuits
travis perkins
southwestwater
rexam
landregistry
HMRC
gchq
eon
dhl
EnvironmentAgency
BalfourBeatty
coop
BAE
aviva
01/17 
start stop bwd fwd

"Just wanted to say thanks; another great day where I have come out with more knowledge than I entered with"

"Many thanks; [the event was] very good and beneficial"

"I have never not found a day interesting"

"The Corporate IT Forum is a fantastic level check, free of vendor sell and consultancy hype. I like the open sharing of experience…"

"We get valuable knowledge and experience from members of The Corporate IT Forum. This helps us to make better and informed decisions to reach our business goals…"

"The knowledge from other people on what they are doing/have done is invaluable to my team"

"The workshop validated the marketplace for supplier apps; participants were of a uniformly high standard; personally, I value highly the ethos of the Forum in the fact that it is supplier independent"

Tel: +44 (0) 1442 866634
info@corporateITforum.com

Related Content

  • tISS: Security Strategies & Metrics (Reality Checker Nov 2012)
  • Brand Monitoring Services (Q&A Apr 2011)
  • eCrime Survey 2011 (Reality Checker Mar 2011)
  • tISS: Cryptography - Tackling the latest Challenges (Report Jan 2011)
  • Winning the War on eCrime the Fight Continues (Report Dec 2009)
  • eCrime Survey 2009 (Reality Checker Nov 2009)
  • CSO Forum - PCeU Session (Report Feb 2009)
  • CSO Forum: Emerging Electronic Security Threats (Report Mar 2007)
  • Computer Misuse: The Use of Forensics & Associated Policies (Report Dec 2006)
  • Banner
    Banner