A Former FBI Special Agent Shows How To Protect Your Business From Cyber ThreatS1 in 4 Australian small businesses have fallen victim to Cybercrime. Do not risk your business, data and reputation. Expression of interest is open
This is the threat Australia is dealing with
Your company is flourishing, with a strong consumer demand, and significant financial growth. Employees are performing at an all-time high and customer satisfaction is overall excelling. Then a devastating, invisible attack-more complicated than a computer virus-attacks your computers, network, and software. An attack out of nowhere, unable to find the perpetrator due to the hidden layers of obfuscation, leaving you to pick up the pieces.
Compromising a company’s integrity creates a whole new category of risks, including exploiting vulnerabilities.
Data breached that were malicious or cyber attacks
Notifications that involved contact information disclosure
Increase in notifications under the NDB (Notifiable data breach) scheme
Number of eligible data breaches
Don’t put your company, yourself and your customers’ private information and valuable data at risk for a minute longer.
So what can you do to protect yourself from cyber attacks or hackers? What are the tools and techniques that can keep you out of the hands of malicious hackers?
Attend Cyber Threat Training with Michael F. D. Anaya
“Considered One of the FBI’s most talented presenters”
Michael has given more than 500 presentations and workshops on cyber security to several Fortune 500 companies like Coca-Cola, UPS, Delta etc. A skilled and engaging speaker with a wealth of professional experience, he spent nearly 14 years with the FBI before joining DEVCON as Head of Global Cyber Investigations and Government Relations.
At the FBI Michael gained a full, robust picture of the threat landscape. There he led numerous, expansive investigations including one that resulted in the first federal conviction of a US person for the use of a peer-to peer (P2P) botnet. He also led the Cyber program for the Atlanta FBI office, during which he oversaw countless number of arrests, search warrants and dismantlement of threat actors.
He draws from his experience in combating both criminal and nation state threats to craft thought provoking and impactful presentations.
Michael has presented on Cyber Security over 500 times around the world including at many Fortune 500 companies
Why This Workshop Is Unlike Anything You’ve Ever Attended Before
Michael will walk you through some of the sophisticated cases that he cracked and investigated at the FBI. He will expose the audience to some real life subject interviews , to include his professional observations of each. This will enable you to learn from his 14 years of first hand experience.
You will end the workshop with eﬀective countermeasures that every business owner/executive should consider to eﬀectively combat the threat.
Here’s what else you will learn with Michael in his one-day workshop on Cyber Security:
A Case Walkthrough - Illuminating the Dark Net
We will explore a dark net investigation from beginning to end. Icy eagle (alphabay seller) was flying under the radar, but not low enough. Each element of the investigative process will be uncovered in this interactive presentation.
Take Aways: Attendees will gain a unique perspective on the inside of a dark net investigation, as well as gain an understanding of what the dark net is and why one would access it.
The Hack - How a Hacker Will Systematically Tear Apart Your Network and What You Can Do About It
This presentation takes a closer look at a corporate data breach from the perspective of all the main players (the hacker, the company and the FBI). We explore the compromise, the call to law enforcement, the investigative process and the desired result. The objective is to set aside myth and misinformation of what the FBI might do and instead, hone in on the reality of what the FBI will do.
Take Aways: Attendees will understand a data breach from various perspectives.
The BIG Three - What Everyone Should Know
This presentation examines the top three cybercrimes effecting organizations today, data breaches, ransomware, and business email compromise (BEC). We will look at each of the three, to gain a better understanding of what they are and how to address them.
Take Aways: Attendees will better understand how to spot and access these three cyber matters, and will be less likely to fall prey to them.
Gone Phish’n - A How to Guide, an Untold Story of Deviance
This presentation is uniquely delivered, for it takes a look at phishing from the mind of the criminal. We will explore who their targets are, what type of phishing campaigns they would use, and how they go largely undetected. The audience will be asked to immerse themselves in that world and engage with the presenter in this highly interactive presentation.
Take Aways: Attendees will better understand the criminal mindset of a phisher, which will enable them to better understand how to defend against it.
Criminal Minds 401 - A Glimpse into Darkness
How do our Cyber adversaries think? Easy, like the rest of us. Well, with a slightly diﬀerent optic. In this interactive presentation, we expose the audience to some real-life subject interviews and Michael’s observations of each, so of whom were insider threats. We end with eﬀective countermeasures that every business owner/executive should consider to eﬀectively combat the threat.
Take Aways: Cyber threats are not only external, but internal as well. Attendees will be able to identify and guard their business from individuals who misuse authorized information.
A Case Walkthrough - The Takedown of a Bot Master( Exculsive for VIP workshop only)
We explore a peer-to-peer botnet case from beginning to end, from the extortion demand to the interrogation of the suspect. Each element of the investigative process is uncovered in this interactive small group discussion.
Take Aways: Attendees will gain a unique perspective on the inside of a bot net investigation.
What people are saying about these workshops
Sr. Information Security Analyst at McKesson
Richard Flowers, CISM, CISA
Director of Technology Compliance at Ingo Money
Anita Best Misel CFB CFC
President of Find Your Franchise