Not That Kind of Vulnerability! - Human Trafficking During Coronavirus
Coronavirus has exposed new vulnerabilities for victims and survivors of human trafficking. From children’s online schooling to non-compliant businesses, COVID-19 has amplified the evils of modern slavery. Sherrie shares practical lessons on keeping your children safe from traffickers online and novel techniques and data sets to exploit while gathering intelligence on businesses, threats, and individuals in the current era. Lastly, get involved in the fight against human trafficking by joining project Crista!
Sherrie Caltagirone, Executive Director, Global Emancipation Network @GblEmancipation
View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at http://www.sans.org/u/195g
#CTISummit #cyberthreatintelligence
Видео Not That Kind of Vulnerability! - Human Trafficking During Coronavirus канала SANS Digital Forensics and Incident Response
Sherrie Caltagirone, Executive Director, Global Emancipation Network @GblEmancipation
View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at http://www.sans.org/u/195g
#CTISummit #cyberthreatintelligence
Видео Not That Kind of Vulnerability! - Human Trafficking During Coronavirus канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
9 марта 2021 г. 15:00:05
00:31:14
Другие видео канала
![Episode 129: Encryption - Part 5](https://i.ytimg.com/vi/rzi1daXMxAY/default.jpg)
![Detecting Malicious Actors in Google Workspace](https://i.ytimg.com/vi/HzuVhbpO_go/default.jpg)
![Deciphering Browser Hieroglyphics - SANS Digital Forensics and Incident Response Summit 2017](https://i.ytimg.com/vi/LnhSTZgzKuY/default.jpg)
![Why take FOR585: Smartphone Forensic Analysis In-Depth OnDemand](https://i.ytimg.com/vi/4pZHdsOdAVk/default.jpg)
![Episode 61: Selecting a bulletproof password](https://i.ytimg.com/vi/tNhftPyso04/default.jpg)
![SaaS Hunting | 2020 Threat Hunting & Incident Response Summit](https://i.ytimg.com/vi/boW-yAArbTo/default.jpg)
![How has FOR578 - Cyber Threat Intelligence helped you in your current job?](https://i.ytimg.com/vi/3OIThCrQItU/default.jpg)
![Forensic Analysis of sUAS aka Drones - SANS DFIR Summit 2015](https://i.ytimg.com/vi/36rZy9V_avo/default.jpg)
![Ransomware Running Wild in the Cloud](https://i.ytimg.com/vi/TJukruHjMJg/default.jpg)
![Episode 156: IPv4 - Part 2](https://i.ytimg.com/vi/RTYpg3_begQ/default.jpg)
![Episode 128: Encryption - Part 4](https://i.ytimg.com/vi/3nMCkmkPSSA/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/MApq8mSGZUk/default.jpg)
![Tracking Traces of Deleted Applications - SANS DFIR Summit 2019](https://i.ytimg.com/vi/4LcQm4ErXpA/default.jpg)
![Episode 38: What is the defense expert’s role - Part 4](https://i.ytimg.com/vi/abWENFCJz0Y/default.jpg)
![Episode 155: IPv4 - Part 1](https://i.ytimg.com/vi/DqeZMIL2iVM/default.jpg)
![Episode 102: USB Forensics Series - Part 4 of 7](https://i.ytimg.com/vi/Uws4XYDZFwI/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/h6dJozJuLS0/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/oIvCYMCFFzU/default.jpg)
![Cracking the Beacon: Automating The Extraction of Implant Configurations](https://i.ytimg.com/vi/3NzCysnltNg/default.jpg)
![SANS DFIR WEBCAST: Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!](https://i.ytimg.com/vi/E0P9IzJJIsU/default.jpg)
![FOR585 Course Animation: Solid State Memory Properties](https://i.ytimg.com/vi/LvmiAuV6PJA/default.jpg)