Log In
  • Wednesday, June 20 | 8:30-9:45 AM


    Level: Intermediate

    Recommended Prerequisite: A basic understanding of computers, the internet and websites

    Field of Study: Specialized Knowledge

    This session will review how hackers and identity thieves gain access to your system and your information. It will also discuss how you inadvertently provide the information they need, and how malicious actors get a new and verifiable identity in less than 30 minutes. Everyone knows about firewalls and antivirus software, but this session addresses how hackers bypass these controls and how you can use this knowledge to prevent fraud.

    You Will Learn How To:

    • Identify personal habits that provide opportunities for hackers
    • Recognize when some of these attacks are occurring or have occurred
    • Examine methods used for computer security
    hmcfarland headshot
    Harold McFarland, CFE, CPA, CMA

    Owner, McFarland & Associates Inc.

    Harold McFarland is an expert witness in computer, internet and electronic communications forensics and a member of multiple federal task forces related to cybercrime. He has been admitted as an expert witness in state- and federal-level courts and has worked on numerous cases from local to international in nature. The types of cases range from simple embezzlement and identity theft to complex pyramid schemes involving multiple shell companies, international human trafficking, drug cartels, espionage, terrorism, and other crimes made possible through the compromise of a computer system.

  • hmcfarland headshot
    Harold McFarland, CFE, CPA, CMA

    Owner, McFarland & Associates Inc.

    Harold McFarland is an expert witness in computer, internet and electronic communications forensics and a member of multiple federal task forces related to cybercrime. He has been admitted as an expert witness in state- and federal-level courts and has worked on numerous cases from local to international in nature. The types of cases range from simple embezzlement and identity theft to complex pyramid schemes involving multiple shell companies, international human trafficking, drug cartels, espionage, terrorism, and other crimes made possible through the compromise of a computer system.

Sign up for conference updates