Behind the Keyboard Workshop

From July 17, 2017 08:00 until July 18, 2017 17:00

A two-day workshop of innovative and traditional techniques to investigate computer-facilitated crimes with the intention of placing the suspects behind the keyboard.  Workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  The course includes hard copies of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.

Course is designed for general investigators (LE and PI), cybersecurity professionals (digital forensics, incident response, etc..), and attorneys litigating computer-related incidents.  Knowledge of digital forensics is not required, however, digital forensic methods will be demonstrated in portions of the course.

Course is a closed course to LE ONLY, however, if the host opens to outside attendees, the wait list will be contacted on a first-come, first-served basis.  To be placed on a wait list, send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with your name and telephone contact.  Notifications of wait list acceptance into the course will be no later than 7 days prior to the start of the course.

Evidence matters  
•    Collection through presentation
•    Approaches to crime scenes and decision-making charts
•    Suspect/Witness/Victim interviews
•    Asking the ‘right’ questions
It’s more than just the computer
•    Physical investigations 
•    Electronic intercepts (wiretaps, etc…)
About a person: Compiling the Complete Identity
•    Real identity 
•    Digital identities (real, fake, and anonymous)
User activity 
•    Attributing computer activity to a specific person or persons
•    Digital forensics artifacts pointing to specific persons
Case management and Presentation
•    Organizing to analyze and prepare to present
•    Visualization of information and big data
Online Investigations and Open Source Information
•    Google Hacks
•    Social media investigations
Covert communication methods
•    Encrypted chat/email/Internet communications
•    Identifying and breaking covert communications
Anonymous Internet
•    Tor browser, VPNs
•    Dark web investigations and topography
Cryptology and Steganography
Anti-forensics/counter-forensics techniques

Archived events

If you want to hire me as a speaker..

I have given presentations from small groups in corporations to auditoriums with hundreds of attendees on the topics of digital forensics, criminal investigations, electronic discovery, and cyber-security.  

Generally, the location is open and I have presented throughout the USA and Canada. I look forward to presenting just about anywhere in the world.

For any engagement, I require:

  • $1500 daily speaking fee (fee varies depending on specifics)
  • Travel/Lodging/Meals
  • If your event is local and non-profit, I may present at reduced charge.