Speakers and topics

Here you can find information about speakers and topics that will be presented

KEYNOTE SPEAKERS AND TOPICS:

  • TROPINA TATIANA
  • KÜNNAPU MARKKO

SPEAKERS AND TOPICS: 

  • AYODEJI PATRICIA
  • BOIĆ VITOMIR
  • BRĐANOVIĆ DARINKA
  • BROWN STEVEN DAVID
  • ELDER BOB
  • GREGORY STEPHEN
  • GRIFFITH PATRICK
  • JAŠINSKIENĖ RŪTA
  • KARAYEV ARIEL
  • MARKIĆ ANTE
  • NORMAND ANTOINE  
  • PALADIN DAMIR
  • PANKOVA TANYA 
  • ŠKRTIĆ DRAŽEN
  • TINKER CARL
  • TOMIĆ LUCIA ANA 


    TROPINA TATIANA

Tatiana Tropina is a senior researcher at the Max Planck Institute for Foreign and International Criminal Law in the Information Law and Legal Informatics Section. Her current areas of research include international standards to fight cybercrime, the comparative analysis of cybercrime legislation, self- and co-regulation, public private partnerships to address cybersecurity issues, and the multi-stakeholder approach to fight cybercrime.
Tatiana Tropina's background includes both academic and practical experience. She has been conducting cybercrime research for more than 12 years, starting in Russia in 2002, where she became the first Russian researcher to defend a PhD thesis on cybercrime (2005). From 2002 to 2009, she was responsible for cybercrime projects at the regional subdivision of the Transnational Crime and Corruption Centre (George Mason University, USA) in Vladivostok, Russia. At the same time, from 2003 to 2008, she worked full-time as a lawyer and then as head of the legal departments of a number of telecommunication companies. In 2008, she won the British Chevening Scholarship to study telecommunications management at Strathclyde University, Glasgow. In 2009, she was awarded a German Chancellor Fellowship (Alexander von Humboldt Foundation) and moved to Germany to pursue her research on legal frameworks for cybercrime.
Since 2009, Tatiana Tropina has been involved in both legal research and various applied cybercrime projects at the international level. This activity includes such projects as drafting model legislation on the interception of communication for the Caribbean states and adapting it via stakeholder consultations (ITU-EU project, 2010) and carrying out a cybercrime study for the Global Symposium of Regulators (ITU, 2010). Recently, she served as a consultant to the UNODC Comprehensive Cybercrime Study (2012-2013) and to the World Bank (World Development Report 2016). Tatiana Tropina has a number of publications to her credit, including a monograph on cybercrime. She is frequently invited to present on her research at various international events.

 

Title: New instruments for cross-border cooperation in accessing e-evidence: are we hitting rock bottom? 

On both sides of Atlantic, last year was marked by the development of legislative tools on transborder access to e-evidence, widely criticised by privacy advocates, national governments and academics. The US Cloud Act, enacted in 2018, and the EU E-Evidence proposal, put forward in April the same year, started processes that have been characterised as an arms race to dismantle existing safeguards to access data and content in global information networks. Both instruments try to re-design the existing regime of mutual legal assistance by providing the tools for requesting data directly from communications providers without judicial authorisation in the country where request is sent to. In fact, the new instruments turn private entities into de-facto judicial authorities: it imposes the obligation to provide data upon legal requests coming from foreign law enforcement with no verification of such demands against privacy safeguards on the national level.
The frustration felt by legislators and law enforcement is understandable. Mutual legal assistance is slow because it requires due process and safeguards. However, are the shortcuts proposed by the Cloud Act and the EU E-Evidence draft directive helpful? What are the dangers of the approach they propose, and what should be done instead to really improve fighting crime online while safeguarding the privacy of users and following due process? The presentation will provide the insights into the content of these new legislative proposals, discuss their shortcoming and propose the way forward to improve trans-border cooperation in accessing electronic evidence.


    KÜNNAPU MARKKO

Markko KÜNNAPU is currently the member of the Bureau of the Convention Committee on Cybercrime (T-CY), which is supervising the implementation and dealing with other matters related to the Convention on Cybercrime. Between 2010-2014 he was the Chair of the Committee.
He has graduated the Law Faculty of Tartu University in 2001 and after that worked in the Tallinn Police Prefecture and in the Legal Department of the Ministry of Interior Since 2005 he is working in the Criminal Policy Department of the Ministry of Justice of Estonia.
He has been involved in drafting several legislative proposals, including legislation concerning cybersecurity, cybercrime, identity theft and other aspects of criminal law and procedure. As government representative he has participated in different working and expert groups as well as committees of European Union, Council of Europe and United Nations.
Since 2014 he is an associated expert on cybercrime and cybersecurity at e-Governance Academy in Tallinn, Estonia. He has been also a trainer and speaker at different national and international workshops, seminars and conferences. 

 

Title: Access to electronic evidence: Way forward to the Second Additional Protocol to the Budapest Convention

The purpose of the lecture and the presentation is to provide an brief overview about the problems that practitioners have been facing concerning timely access to electronic evidence stored abroad. The Budapest Convention as the only legally binding international instrument on cybercrime and electronic evidence already provides some solutions, but these are not sufficient considering the latest developments of the ICT. The Cybercrime Convention Committee has started work in order to find solutions already several years ago. In 2017 negotiations of the Second Additional Protocol to the Budapest Convention started. The Protocol would provide answers and solutions to the problems that have been identified. However drafting such a new instrument is not an easy task and requires also cooperation with all the stakeholders. 



    AYODEJI PATRICIA 

Patricia Ayodeji, founding lawyer of E-PDP PROTECCIÓN DE DATOS PERSONALES®, is a British, dual qualified Civil Law and Common Law lawyer. Solicitor for England & Wales. Abogado for Spain. Her dual qualification means that she can practice both in Spain, & England and Wales. She has over 18 years experience providing legal services for SMEs and Multinationals, SMEs entrepreneurs, private individuals, & law firms. Specialities: Information, Technology & Communications Law, Privacy, & Data Protection Law, E-Commerce Law, and Intellectual Property Law. She works closely as an international lawyer with different Embassies and Governmental departments. Member of the Governing Council of the British Chamber of Commerce in Spain. Awarded Civil Law Lawyer 2019 in Spain, from International Advisory Experts, having received exceptional commendation from her peers. Regular conference speaker on ICT Law issues in different European member states.

 

Title: Social media & digital evidence. The Spanish approach

Analysis of two Spanish judgments. How social media networks yield digital evidence of the planning and commission of crimes, and assisted in cyber investigations resulting in the creation of solid cases against the defendants.

Case studies:
Judgment no. 1 June 2018 – Audencia Nacional, Madrid (National criminal & administrative court), Case No. 18/2018, Crime: Praise & defence of Terrorism, types of social media: Facebook, Twitter, Whatsapp.
Judgment no. 2- June 2018- Audencia Provincial, Valladolid (Provincial court), Case No. 00184/2018, type of social media: Facebook.

Analysis of an on-going case:
Special case no. 20907/2017 - Tribunal Supremo, Madrid (Supreme Court)  'Crime' Catalan Independence Referendum 1 October 2017, types of social media: Whatsapp, Twitter...


BOIĆ VITOMIR

Vitomir Boić, LL.M., is the president of the County Court of Velika Gorica, the Head of the Department of Social Sciences at the University of Applied Health Sciences in Zagreb and an associate professor at the Department of Civil Procedural Law at the Faculty of Law, University of Zagreb. He is a judge with years of experience, the author of a number of scientific papers and a member of several regulatory working groups. Main areas of his interest include enforcement law and insurance law.

 

Title: Application of the General Data Protection Regulation - GDPR in court decisions

The right to the protection of personal data is one of the fundamental rights of every person. The purpose of personal data protection is the protection of private life and other human rights, as well as fundamental freedoms, in the collection, processing and use of personal data.
The United Nations Universal Declaration of Human Rights of 10 December 1948 states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation.”
Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms of 4 November 1950 states that everyone has the right to respect for his private and family life, his home and his correspondence and that there shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in the interests of public safety, for the prevention of crime, and so forth.
In order to raise public awareness of the right to the protection of personal data, the Council of Europe, with the support of the European Commission, launched the “EUROPEAN DATA PROTECTION DAY” to be celebrated each year on 28 January.
In the Republic of Croatia, the right to the protection of personal data is a constitutional category which guarantees the protection of human rights and fundamental freedoms to everyone, irrespective of their citizenship or place of residence and regardless of their race, colour, sex, language, religion, political or any other opinion, ethnic or social origin, property, birth, education, social status or any other such ground.
Principles and rules on the protection of individuals with regard to the processing of their personal data should respect their fundamental rights and freedoms, and in particular their right to the protection of personal data, regardless of their nationality or place of residence.
The reform of personal data protection in the European Union was initiated by technological developments and new ways of processing personal data that made it imperative to adopt a new instrument which would ensure the protection of rights and fundamental freedoms of individuals with regard to the processing of their personal data. Thus, after a long negotiation, the Regulation (EU) 2016/679, which entered into force on 25 May 2016 and which has been applicable in the Republic of Croatia since 25 May 2018, was adopted. The Regulation brings up to date and redefines the scope of personal data protection throughout the European Union. The new EU Regulation applies directly to all Member States without need for further conversion into national legislation. The General Data Protection Regulation (GDPR) regulates the general protection of personal data of citizens of the European Union.



BRĐANOVIĆ DARINKA

Darinka Brđanović is the Deputy County State Attorney in the County State Attorney’s Office in Varaždin since 2012, and previously, in the period from 2003 to 2009, she was the Municipal State Attorney in the Municipal State Attorney’s Office in Ludbreg, and before that the duty of Deputy in the Municipal State Attorney’s Office in Varaždin. She is employed in the State Attorney’s Office since 1996, hence, since she was a trainee.

She is also the Head of Criminal Division and works on all types of criminal cases. She was appointed as the contact person for European Judicial Network in criminal matters, she is responsible for monitoring and reporting about hate crimes and she monitors and analyses legal issues of international legal aid and cooperation.

She participated at expert panels of Criminal Division of the State Attorney's Office of the Republic of Croatia, and that in 2013, as the publisher of the paper with the topic “Issue of continuity between crimes per CC/97 and CC/11 and problems related to the application of a more latent law in court practice at the area of the County State Attorney’s Office in Varaždin” and in 2018 with the paper “Ban on reformatio in peius".

 

Title: Use of digital evidence in criminal matters  

Presentation of use of digital evidence in criminal matters, method of excluding and obtaining these evidence, and their legality. The presentation consist of a brief review of provisions of Criminal Code and Criminal Procedure Code, regulating the quoted topic, implementation of obtained digital evidence in specific cases and more relevant court decisions ruling about the legality respectively illegality of obtained and derived digital evidence.


    BROWN STEVEN DAVID

Steven David Brown is a specialist in criminal justice with a particular focus on integrity, criminal intelligence, electronic evidence and computer-based crime. Although a barrister of the Inner Temple, he left the Bar to become a police officer with London’s Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He has worked in the international arena since 2001 including periods as the Senior Law Enforcement Advisor for the UN Office on Drugs and Crime in Central Asia, policy advisor on law enforcement to the EU Advisory Group in Armenia and as project manager for the EU/Council of Europe’s Global Action on Cybercrime initiative. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. Steven has published a number of articles in peer reviewed journals and is the editor of and major contributor to the textbook “Combating International Crime: The longer arm of the law” (Routledge: 2008). He regularly lectures on electronic evidence and cybercrime and his online course, ‘Insights into cybercrime and electronic evidence’, currently has a student based of more than 5,000 students from 138 countries.

 

Title: Hackers in law: The shotgun marriage of malware and criminal justice

Computer-based crime has severed the physical nexus between criminal and crime scene with the identity and location of criminals increasingly masked by encryption and anonymising applications that undermine traditional lines of inquiry. Whilst cybercrime is constantly in the headlines, less well known is that, for more than 20 years, law enforcement has been using hacking techniques and malware to disrupt cyber criminality, identify felons and to gather evidence. Without these techniques some dangerous criminals would never have been brought before the courts, but this approach also begs several important and generally unresolved questions about accountability, human rights and jurisdiction. This session will consider those questions, describe known hacking techniques and strategies used by law enforcement in cyberspace. It will also explore attendant ethical dilemmas and review such laws and oversight mechanisms as are currently in place. 


    ELDER BOB

Bob Elder retired from the Victoria Police Department in British Columbia after 21 years experience in policing, including over 7 years as a Detective in the VICPD Computer and Mobile Forensics Unit. Bob Elder has been innovative in the Mobile Forensics field through his research and development and is sought after all over the world for his knowledge and skills in the Mobile Forensics environment. Bob Elder began with Teel Technologies in 2009 as an instructor in the Flasher Box, JTAG and Chipoff classes that he developed himself. These classes have been taught to Law Enforcement and Military agencies all over the world and continue to be popular advanced Mobile Forensics courses. Bob’s knowledge and skills have been recognized with the following awards he received: 2015  4: Cast awards –  Winner – Digital Forensic Analyst of the Year, 2014  4: Cast awards –  Runner up – Digital Forensic Analyst of the Year, 2014  Chief Constable’s Commendation for Meritorious Service, 2013  International Association of Chiefs of Police August Vollmer Excellence in Forensic Science AwardSpecialties: Physical and RAW user data acquisitions from Mobile devices using Flasher Boxes, JTAG and Chipoff processes.

 

Title: Advanced Hardware Acquisition Techniques - Don't give up on them yet!

This discussion will review the advance techniques like JTAG; ISP; Chip-off; Flasher Boxes and Custom Bootloaders and how we associate them the cell phone forensics. This talk will demystify the impression that these techniques are at "end of life"! Not so at all, all these techniques still have a long and happy life for forensic examiners in acquiring data from other hardware devices like Internet of Things; Embedded Devices; Smart TV's; Vehicle Infotainment/Telematic Systems; Tablets/Laptops; Skimmer/Shimmers; and more. See how these techniques have successfully recovered user data from real cases that have helped investigators solve Crimes and Cyber Crime events.


    GREGORY STEPHEN

Stephen Gregory is a 22-year veteran Detective Police Officer from the U.K. with experience in computer forensics investigations, both with the Police and latterly in the private sector. He has been employed by Guidance Software (now OpenText) since 2002 during which time he has worked in various departments such as the Training, Professional Services and the Forensic Business Unit. In his current role at OpenText his responsibilities include advising customers and channel partners of the technical features, functionality and benefits of EnCase Forensic software and Tableau hardware solutions, as well as obtaining vital customer feedback to help develop the products to overcome the challenges presented by digital forensic investigations.

 

Title: So What’s happening with EnCase & Tableau? 

Since the acquisition by OpenText in 2018 its business as usual. This presentation highlights the latest updates to EnCase Forensic and Tableau Forensic hardware highlighting our mission as the only cohesive solution for the entire digital forensic workflow – from triage to reporting.


    GRIFFITH PATRICK

Patrick Griffith joined Magnet Forensics in 2016 as a Regional Account Manager for the EMEA region.  Leveraging many years of experience within Software Solutions and Professional Services for both Enterprise and Public sector, Patrick is accountable for the over all Customer Success in the region.  Whether empowering the Partner Channel, or being hands-on with strategic clients, Patrick is involved right from the discovery stage all the way through to providing best practices for deployment scalability.  With Patrick’s own prior entrepreneurial footing, he enjoys the challenges of providing solutions through complex cycles, that assist Corporations and Law Enforcement in cementing their investments with training, support, and absolute user adoption. In his tenure at Magnet, Patrick has quickly been able to combine his enthusiasm for partnerships and technology, to become a strong passion for empowering Magnet customers to fulfill their missions by finding the most digital evidence possible.

 

Title: Magnet Forensics Product Overview and AXIOM 3.0 Highlights

We're excited to have released the most powerful and comprehensive version of Magnet AXIOM earlier this month: Magnet AXIOM 3.0.  With AXIOM 3.0, we're giving you the ability to recover digital evidence from more sources than ever before (including Mac computers and new cloud sources), a powerful and intuitive new Timeline view, and much more. Join Carl Tinker, Director of EMEA Sales, and Patrick Griffith, Regional Account Manager, as they provide an overview of Magnet Forensics products and AXIOM 3.0 highlights.  


    JAŠINSKIENĖ RŪTA

Mrs. Rūta Jašinskienė Rūta is an intelligence analysis expert and trainer with an extensive background in international police cooperation and investigations, intelligence monitoring, tactical and strategic analysis. She is member of IALEIA (International Association of Law Enforcement Intelligence Analysts) and ACFE (Association of Certified Fraud Examiners).
Prior to joining NRD CS team, Mrs. Rūta Jašinskienė had been working 20 years at the police units responsible for drug control and organized crime investigations. Last ten years she led a unit in charge of national competence and coordination role among police units as well as law enforcement agencies in drug control area. Mrs. Jašinskienė was a member of various international initiatives including the Horizontal Working Party on Drugs of EU Council and EMPACT group on Synthetic Drugs and NPS.
For the past 2,5 years, Mrs. Jašinskienė has been consulting customers from public and private sectors on the analysis process and the best tools to use for it. She also has been providing training courses on intelligence, analysis and IBM i2 Analyst’s Notebook.

 

Title: How not to get lost in the data jungle? 

Some of us remember the days when information gathering was a challenging task due to the lack of data. Nowadays we face a contrary situation – too much available information and too little time for decision-making. How to define which data is priceless and which could be missed? How to puzzle out the whole picture from different data obtained from various sources, quickly get analytical insights and understandably present the results to others? These questions and relevant topics will be covered during the lecture focusing on the importance of an intelligence analysis cycle and its impact on an effective investigation or decision-making as well as discussing key elements of successful analysis.


    KARAYEV ARIEL

Ariel has been with Cellebrite for the last few years as a Sales Engineer, bringing more than 20 years of experience in Networking & Telecom specifically. With his experience in understanding of Service Providers and Enterprise end-user applications, he deeply understands the need for analytics solutions for organizations.  

 

Title: The Power of Digital Data Analytics

Learn how Analytics supports a complete, end-to-end, digital forensics workflow that eliminates manual analytical processes that drive time and cost into investigations. The scalable platform enables tens or even hundreds of users – forensic specialists, detectives, investigators, analysts, agency management, attorneys, outside experts – to collaborate on a case or perform cross-case analysis simultaneously.


    MARKIĆ ANTE 

Ante Markić has completed postgraduate specialist study at the Faculty of Organization and Informatics in Varaždin. Since 2004, he has worked as a permanent expert witness for Informatics and a professor of Information Systems in the Ministry of Interior. He is a qualified Internal Assessor in accordance with ISO 27001: 2005 holding a certificate "Internal Assessor for ISO 27001: 2005 Information security system”.  He has ECDL Expert certification as Instructor for the National Information System for border control CRO-NBMIS N 91096. His main fields of interest are computer forensics and computer networks, information system audit, information system security, the misuse of computers and computer systems.

 

Title: Fiscal cash registers database forensics

At the request of the State Attorney's Office, a database of the fiscal cash register of one catering facility was examined. The warrant sought to establish possible irregularities in the work such as issuing a pre-invoice, an account without a single account identifier (JIR) and other possible irregularities in the work. The tools that were used for this analysis are: Forensic Toolkit (FTK), SQLite Forensic Explorer, Sys Tools SQL Recovery, Sys Tools SQL Log Analyzer, SQLite Database Recovery Sys Tools, MS SQL Server 2017 RC1, MS SQL Server Tools 17 and hex editors.


    NORMAND ANTOINE

Mr. Normand is the CEO of Bluebear LES a software company specialized in visual data forensic. Mr. Normand is a technology and cybercrime expert. Mr. Normand delivered numerous conferences on the topic of cybercrime and visual data forensic to police agencies of Europe, Asia and the USA. On February 27th 2013, Antoine Normand was awarded the Queen Elizabeth II Diamond Jubilee Medal for his commitment to combating child exploitation on the Internet worldwide. Mr Normand is the Chairman of the Canadian Cybersecurity Cluster IN-SEC-M.

 

Title: Fast Video and Image Carving with Lace Forensic Carver

With LACE CARVER as a standalone tool, forensic experts will be able to efficiently extract the evidence and import it using the JSON standard in all the various tools they choose to use to analyze and review the evidence. Very Affordable, Easy to install, Simple to use, Super-Fast and Rock-solid software for carving images and videos (and text documents) from any digital media in a forensically sound manner.  The LACE FORENSIC CARVER recognizes over 180 file types covering image, video, text, archive, and database files.


    PALADIN DAMIR 

Damir Paladin is an information security consultant. He is professionally engaged in information technology over 25 years, and in 1998th he started with his own company Borea, where he works today. His areas of expertise are computer forensics, audit and testing security of information systems. He owns professional certificates CISSP, CISA and CISM. He is a permanent court expert in IT. He cooperates with some of the most important Croatian companies and institutions providing professional services in the field of information security.

 

Title: Cyber incidents forensic analysis

Complexity and diversity of cyber incidents require trained immediate responses both by IT staff responsible for oversight of incidents and by digital forensic experts who are involved in the analysis of these incidents, and these areas cannot and should not be separated. The lecture will describe the main features of forensic procedures in the cyber incident analysis and the place of forensic analysis in the process of responding to security incidents. Special emphasis will be put on comparison of "traditional" forensic analysis and forensic analysis conducted in the case of cyber incidents. The main points of computer systems to be covered by forensic analysis will be defined and the methods of this analysis, as well as tools for implementing these methods, will be described.


    PANKOVA TANYA

In the year 2006 Tanya joined Oxygen Forensics as a tech support member and gaining technical knowledge and experience in forensics made her way from a tech support manager through a data mining specialist to a marketing manager. She is experienced in team management, product quality assurance, deep data analysis and have an extensive knowledge in mobile, cloud and drone forensics. 

 

Title: WhatsApp Forensics. Advanced methods of extraction and decryption

WhatsApp is without doubt the most popular messenger in the world with over 1.5 billion users globally. Thus, extracting complete evidence from WhatsApp Messenger is essential for any investigation. In this session, we will look into all possible sources where WhatsApp data might be stored (mobile devices, computers, cloud) and present our exclusive method of WhatsApp data extraction directly from the WhatsApp Server. Moreover, we will guide you through the process of WhatsApp backups decryption offering the alternative decryption method via phone number. Finally, we will explain how to extract WhatsApp data from a locked mobile device using a WhatsApp QR token from a PC.


    ŠKRTIĆ DRAŽEN  

Ph.D. Dražen Škrtić graduated from the College of Internal Affairs in 1994 and from the Police Academy in 1999. He finished postgraduate scientific studies of criminal law at the Faculty of Law in Zagreb in 2007. He defended his doctoral dissertation Criminal law protection of informatics contents at the Faculty of Law in Zagreb in 2011. He is employed in the Ministry of the Interior, Karlovačka County Police Administration since 1990. He is working on criminal police jobs as Head of criminal police in police stations since 1994 and since 2001 in the Police Administration on tasks regarding general and economic crime. He is a lecturer for legal courses at the Karlovac University of Applied Sciences since 2012. The area of his scientific interest are criminal law, criminal procedural law, criminology and with these areas connected parts of labour law, administrative law and commercial (business) law. He is a member of the Croatian Association for Criminal Sciences and Practice. He published several scientific and expert works and lectures from the area of cyber-crime. He participated on numerous Croatian and international expert and scientific conferences. On Croatian and international expert and scientific conferences he presented works from the field of substantive criminal law respectively criminal acts of cyber-crime, special forms of cyber frauds as well as procedural criminal law related to obtaining digital proofs from media for storing computer data which are not under the control of the person providing digital proofs as legal issues of remote search and control of computers with the purpose of providing digital proofs. LIST OF PUBLISHED WORKS: https://bib.irb.hr/lista-radova?autor=313654.

 

Title: Data base analysis for identifying criminal offenses perpetrators – case study

Lecture on a successfully completed criminal investigation and court proceeding conducted after analysing a huge amount of data on the identification marks of the communication devices that were briefly stored in the database of the data provider of the communication service at the location close to the site and just before and after the execution of several criminal offenses. The identification of the subscriber number of a mobile device user appearing in the databases of the communication service provider near the place and at the time of the commission of the criminal offense, enabled monitoring and defining the place of possible commission of a new criminal offense and ultimately the arrest of the perpetrator immediately after the commission of the criminal offense. The presentation and interpretation of the mentioned digital data during the trial was crucial for the pronouncement of the verdict to the defendant.


    TINKER CARL

Carl Tinker is the Director of Sales for Europe, Middle East and Africa region at Magnet Forensics. Carl has 14 years’ experience in the Digital Forensics industry providing software and hardware solutions to government agencies worldwide. Having joined Magnet in January 2015, he has been influential in the rapid growth of Magnet products throughout the EMEA region. In 2018, the company was the Forensic 4:Cast Digital Forensic Organization of the Year, the industry’s top honor. Carl holds a Bachelor of Science degree in Business Management from Manchester Metropolitan University.

 

Title: Magnet Forensics Product Overview and AXIOM 3.0 Highlights

We're excited to have released the most powerful and comprehensive version of Magnet AXIOM earlier this month: Magnet AXIOM 3.0.  With AXIOM 3.0, we're giving you the ability to recover digital evidence from more sources than ever before (including Mac computers and new cloud sources), a powerful and intuitive new Timeline view, and much more. Join Carl Tinker, Director of EMEA Sales, and Patrick Griffith, Regional Account Manager, as they provide an overview of Magnet Forensics products and AXIOM 3.0 highlights.  


    TOMIĆ LUCIA ANA 

After graduating from the Faculty of Law and the Faculty of Economics and Business, I gained my MBA and worked as a lawyer attending to legal affairs from the domain of company law in various institutions and positions. I am currently the Director of Compliance and Management Board Support at the bank Hrvatska Poštanska Banka. The scope of my work at the bank includes compliance, prevention of money laundering and fraud.

 

Title: Financial crime and what we can learn from banks

The growth of market economies and the accumulation of global wealth over the last 30 years were accompanied by a significant increase in financial crime. Economically motivated crime represents a major threat to the development and stability of economies. Financial crime includes crimes against property, fraud, money laundering, corruption, cybercrime, identity theft, information security and the like.
Perpetrators of criminal acts require financial support to achieve their goals, while a successful terrorist group, just like any other criminal organization, is capable of building and maintaining an efficient financial infrastructure. They rely on professional services to manage their finances, such as those provided by bankers, accountants and lawyers, and benefit from a range of financial products.
Due to prevalence and advancement of digital technology, financial crime has taken on a whole new dimension. Criminal organizations operate transnationally to avoid detection, with stolen funds crossing many physical and virtual boundaries before reaching their final destination.
The use of advanced monitoring technology saw an increase in opportunities for detection and the fight against financial crime. In the area of money laundering prevention, it is easier to detect criminal acts as there are a number of tools available to bank employees who can quickly collect and review data related to accounts and transactions, and block suspicious and dubious transactions. Various platforms monitor lists of politically exposed persons and other individuals exposed to high risk of financial crime.
Due to the complex nature of financial services, especially following the development of digital services, the detection and prevention of fraud in the financial sector became an almost overwhelming challenge. Threats may be domestic or international. They may come from within or outside an organization. Income from fraud is rarely generated in cash. Unlike money laundering, where there is intent for money to enter the system, assets that are the target of fraud are for the most part already in the financial system.
Being aware of the risk, governments around the world have implemented critical internal control systems and increasingly regulate financial institutions (primarily banks) by establishing domestic and international legislative frameworks. This discussion will present what we can learn from banks, as gatekeepers of the financial world.