Thursday, August 26, 2010

Fighting Cybercrime on the Internet

This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

Note: Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from the presentation is in blue.

I am from a company called TEC, or TechnologyEvaluation.Com, a hybrid online destination site and research consulting company in Woburn, Massachusetts and Montreal, Canada. I have been working in the capacity of Director of Security Research at TEC for almost a year. Prior to TEC, I worked as Director of Information Security for CMGi's flagship webhosting company known as Navisite. Prior to that I founded a consulting company called Relevant Technologies, which still exists, and currently I maintain a position on the board. Before that, I was CIO of Schafer Corporation.

At TEC I manage the research of security technologies and vendors, identifying and qualifying key criteria necessary to assist high-level IT decision makers in making best-choice infrastructure investments. As well, I report and analyze current security news events, pointing out how these events affect you, your network, and your organization. As businesses continue putting their web-enabled e-commerce sites, and the jewels of their infrastructure online, the importance of security and privacy is becoming increasingly critical. What I plan on talking about today is "Fighting Cybercrime on the Internet."

My research is supported by 17 years of industry experience in the Information Technology field. There are three primary aspects of cybercrime that I will be talking about today: cyberpedophilia, keeping digital evidence pure, and mitigating white collar cybercrime. The other various security topics that I will touch on will have to do with how processes and procedures can support the management of these three important Information Age Law Enforcement and Public Safety concerns. The various security processes worth understanding include, "What are the basics for managing security in an organization? What security policies do you need? And who should you call to assist you in investigating and reporting cybercrime?"

No comments:

Post a Comment