San Diego, CA

March 11-13, 2019

Hilton La Jolla Torrey Pines

Hero Default

hero__default

2019 Conference Program

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, March 11, 2019
    • Forensics
    Scripps I
    This session will discuss several cases where the scope of the examination exceeded a simple DVR recovery. These types of advanced examinations require a significant understanding of the operation of ...
    • Audit/Risk Management
    Scripps II
    The disciplines of Information Security and IT Audit are quite different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuri ...
    • Forensics
    Grande D
    In recent years both the volume of digital evidence and the number of cases in digital forensics has been rapidly growing. As technology infiltrates all spheres of human activity, evidence can be foun ...
    • Information Security
    Grande E
    Bug bounty programs are popping up all over the place, as more and more companies embrace collaborating with friendly hackers to find vulnerabilities before cyber criminals have a chance to exploit th ...
    • Information Security
    Grande E
    As the next evolution of the workplace evolves, the use of social media has also grown internally within teams. Chats, document sharing, internal groups, presentations and more count as official publi ...
    • Investigations
    Scripps I
    Have you ever wondered what motivates certain cybercriminals and why some prefer to work independently, while others would do business with anyone? Do you know what to expect when engaging an Asian ba ...
    • Forensics
    Grande D
    New versions of Windows 10 certainly seem to be arriving faster than previous Windows incarnations. Each new version offers the potential for new forensics artifacts. Several new artifacts have alread ...
    • Audit/Risk Management
    Scripps II
    The session will focus on techniques and strategies to foster “flexibility” for the relationship between incident response, security operations program management and threat hunting. We will discuss h ...
    • Sponsor Demo
    Canyon
    Did a device owner delete data before you could conduct an extraction? During this demo, the presenter will share some ways to review the iOS or Android system to identify intentional deletion. Also, ...
    • Sponsor Demo
    Shore
    Helping continue the trend of Susteen's commitment to Law Enforcement agencies throughout the US and world. Our Secure View mobile forensic software is second to none. Secure View has been the "go to" ...
    • Sponsor Demo
    Canyon
    Are you wasting too much time mapping your CDRs by hand? Do you wish there was a way to get answers out of your CDRs in seconds rather than days or weeks? With CellHawk, the answers are at your finger ...
    • Sponsor Demo
    Shore
    Learn how to correlate different artifacts with each other and see the connections that occur between artifacts and pieces of evidence data. See how users interact with their content by replicating th ...
    • Investigations
    Grande E
    This session will explain the benefits of inter-agency cooperation in the investigation and prosecution of high-tech crimes. Federal, state, and local law enforcement will explain, the practical value ...
    Moderator: Panelists:
    • Information Security
    Scripps I
    80% of all enterprise data is unstructured and is predicted to grow up to 80% annually. 69% of unstructured data no longer has any legal or business value. There are no known, commercially-available s ...
    • Audit/Risk Management
    Scripps II
    Often, we fall back on examples of penalties to explain our justifications. But what if we could talk about it as a market mover? What if, we could explain that our customers are looking for safety and ...
    • Forensics
    Grande D
    The challenges of investigating smartphones devices are paramount. With the rapid development of phone apps, law enforcement agencies and vendors are playing catch up when it comes to reverse engineer ...
    • Forensics
    Scripps II
    Contents of emails can easily be altered. Focusing solely on email contents and metadata can prevent you from seeing the whole picture. How can you effectively corroborate information found in emails ...
    • Information Security
    Grande E
    This session will share a case study that has been fused together by the moderator and panelists from real cases and contains some fictional components as well. The panel will discuss the technical an ...
    Moderator: Panelists:
    • Forensics
    Grande D
    A modern-day vehicle typically has 50-70 electronic control units (ECUs) or computers running on five different networks. User and vehicle data can be stored on these ECUs that can help investigators ...
    • Investigations
    Scripps I
    Investigators have more tools than ever before to forensically examine phones, but what are the solutions when the phone is not working due to water or physical damage? The sensitive electronics insid ...
    • Sponsor Demo
    Canyon
    This demo will share how investigators/examiners can use Cellebrite tools to conduct fast, on-scene examinations and full forensic examinations of devices utilizing peer-2-peer applications to downloa ...
    • Sponsor Demo
    Shore
    In efforts to inform the mobile forensics community the pitfalls of “push button” forensics, FINALMobile Forensics and its team is determined to help the investigator in providing a tool and support t ...
Tuesday, March 12, 2019
    • Keynote
    Grande D/E
    As the world embraces digital services and automation of critical systems, understanding risk, attributing actions, and deciphering attack methods will be crucial to the proliferation of connected tec ...
    • Sponsor Demo
    Canyon
    See how easy it is to automate your forensic workflow to tag media during load, identify key artifacts, and generate useful reports on the fly using Truxton 2.4. Attendees will also see how to collabo ...
    • Sponsor Demo
    Shore
    With cases involving multiple mobile devices, and desktops storing terabytes of data, examiners need a pragmatic approach to gather the necessary files and apps, bring it together, and then review the ...
    • Audit/Risk Management
    Scripps II
    Information Governance represents processes, defined by policies and enabled by technologies, that empower business leaders to make more intelligent business decisions to maximize the value of their i ...
    Primary Speaker
    • Forensics
    Grande D
    As mobile devices become more complicated to gain access to in a forensic manner, automated tools can only do so much. With 88% of devices worldwide running Android, there is no easy solution to ensur ...
    • Information Security
    Scripps I
    Attackers commonly find themselves in situations in which they must access a resource which is guarded by a multi-factor authentication systems. There are multiple ways that attackers can accomplish t ...
    • Forensics
    Grande E
    Ephemeral data is here today, gone tomorrow (or sooner). Popular ephemeral messaging applications like SnapChat and Wickr transmit instant messages that automatically disappear from the recipient's sc ...
    Moderator: Panelists:
    • Forensics
    Scripps II
    This session will cover the current state of USB device forensics on modern Windows operating systems and will examine methods to improve the process. The presenter will discuss how examiners can bett ...
    • Information Security
    Scripps I
    According to figures released by the FBI in 2017, global losses resulting from Business Email Compromise (BEC) has reached over $5 billion over a 3-year period and shows no sign of slowing. This sessi ...
    • Information Security
    Grande D
    Join us for this highly interactive and dynamic session, driven by attendees. This 60-minute session provides you the opportunity to interact, engage, and have your questions answered by industry secu ...
    • Investigations
    Grande E
    Encryption and anonymity offered by Bitcoin and other cryptocurrencies are exploited for securing illicit transactions, but these transactions still include attributable features that lead to identify ...
    • Sponsor Demo
    Canyon
    Virtually every electronic in our lives can be connected to the Internet. What are the security risks of having so many devices connected? This demo will identify vulnerabilities your company may not ...
    • Sponsor Demo
    Shore
    Fraud investigations can be challenging for a number of reasons. They can be initiated either internally or externally from the organization; they could involve law enforcement or simply be treated as ...
    • Sponsor Demo
    Shore
    Digital forensic analysts and investigators have big challenges - there’s so much data on mobile phones today, it’s tougher and takes longer than ever to analyze it and find what you’re looking for. T ...
    • Sponsor Demo
    Canyon
    Cellphone data plays an increasingly relevant role as evidence in many of the cases analysts support. This demo is designed to provide an overview of more up-to-date methods of handling cellphone reco ...
    • Information Security
    Scripps II
    Join us for an interactive panel discussion led by some of today’s leading women in cybersecurity as they discuss; The latest emerging and current trends to impact the cybersecurity industry; Current ...
    Moderator: Panelists:
    • Investigations
    Scripps I
    This session will provide attendees with an overview of insider threats from both a law enforcement perspective and a corporate perspective.
    • Information Security
    Grande E
    According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users and these figures are expected to grow to 3.02 billion by 2021. In 2018, more than 77 percent of t ...
    • Forensics
    Grande D
    More than a billion connected devices – from vehicles to home appliances to wearable devices to “smart city” technologies – collect and communicate a watershed of potential evidence. Are you prepared ...
    • Information Security
    Grande E
    Internet bots have been widely used for various beneficial and malicious activities on the web. Spam is probably the biggest vector of infection for both commodity and targeted malware. One of the rea ...
    • Sponsor Demo
    Shore
    This demo will take an in-depth look into real-world applications of monitoring and compliance while using Argent as a single pane of glass solution. The demo will cover applications review and discus ...
    • Forensics
    Scripps I
    Cloud storage continues to grow in ease of use and popularity. Businesses use the cloud to store important collaborative documents; individuals use the cloud to store sentimental pictures. The conveni ...
    • Information Security
    Scripps II
    During this session, the presenter will discuss how cyberthreat detection and response must be tailored specifically for each industry and brand, especially when it comes to online businesses. Using r ...
    • Investigations
    Grande D
    This is an introductory session to open-source intelligence (OSINT) for investigators and law enforcement. The purpose is to present unique ways in which criminals might use OSINT to commit crimes and ...
    • Sponsor Demo
    Canyon
    Digital investigations are becoming increasingly complex due to the volumes of data to be processed, remote locations of user files in the cloud and diversity of file types. Intella cuts through these ...
    • Sponsor Demo
    Canyon
    Live demonstration of all Whooster investigative database capabilities and delivery platforms to include SMS/Text Messaging, Web Access and API. We will walk through not only utilizing these tools in ...
    • Forensics
    Scripps II
    The theft of IP is a constant concern for organizations. Most IP theft is removed from the premises via removable drives and cloud downloads. During this session, the presenter will share how to detec ...
    • Investigations
    Scripps I
    Cell phone call detail records (CDRs) can be a challenging topic for anyone to testify on in court. Without proper knowledge and training on what to say and how to say it, it is very easy for these re ...
    • Information Security
    Grande E
    The term “Left of Boom” was made popular in 2007 in reference to the U.S. military combating improvised explosive devices (IEDs) used by insurgents in Afghanistan and Iraq. The U.S. military spent bil ...
    • Forensics
    Grande D
    This session comes out of the research of the largest drone forensics research program in the world. This project, funded by the United States Department of Homeland Security, is identifying and defin ...
Wednesday, March 13, 2019
    • Information Security
    Grande E
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Forensics
    Grande D
    This session will discuss the typical Items of criminal interest on the Dark Web. The presenters will cover several key factors of Dark Web activity including; the anatomy of a transaction; the role o ...
    • Investigations
    Grande E
    The internet provides investigators with the ability to ascertain information on subjects efficiently. Focusing on the individual(s) is not always the answer. Identifying actionable intelligence is an ...
    • Sponsor Demo
    Canyon
    Join this demo to get an overview of the impact that the opioid epidemic is having in the United States and how law enforcement is using digital intelligence to combat drug dealers and other criminal ...
    • Audit/Risk Management
    Scripps II
    While both the GDPR and the CaCPA have caused panic and fear in most corporate circles with rigorous rules and serious consequences, an in-depth review of all aspects of an organization will create an ...
    • Information Security
    Scripps I
    This session will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The presenter will share the hacking of IoT devices and syste ...
    • Forensics
    Grande D
    This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS Macs, and items of consideration for APFS analysis on different forensic platforms.
    • Forensics
    Grande D
    At times over the past three years, Apple’s mobile operating system changes seemed so mercurial that the parallels to tweens’ rapid maturation couldn’t be missed. iOS 10 changed the backup structure, ...
    • Information Security
    Scripps I
    This session will look at an IT security program from a slightly different perspective. It’s not a question of if, but when, an IT security leader will need to demonstrate that they have provided a de ...
    • Forensics
    Scripps II
    The session will include a high-level overview of the FBI Next Generation Identification (NGI) System person-centric biometric modalities to include ten print, latent print, facial recognition and oth ...
    • Sponsor Demo
    Canyon
    This demo will go thru a few practical examples of building an attack to recover passwords from files and encrypted volumes. We will focus on the best practices of decryption. Attendees that would lik ...
    • Sponsor Demo
    Canyon
    Helping continue the trend of Susteen's commitment to Law Enforcement agencies throughout the US and world. This demo will showcase why the Secure View mobile forensic software is second to none. Secu ...
    • Information Security
    Scripps II
    Hospitals across the United Kingdom are crippled. Power distributers throughout Europe experience wide-spread system outages. The world’s largest shipping conglomerate comes to a halt. City government ...
    • Information Security
    Scripps I
    When migrating to the cloud, many companies make the same mistakes. Often called a “Lift and Shift”, organizations literally just copy their VMs from the data center and dump them in the cloud taking ...
    • Investigations
    Grande E
    During this session, attendees will discover the value of utilizing “outside the box” investigative searching methodology to gather critical information on persons of interest, and ultimately solve ca ...
    • Forensics
    Grande D
    Volumes of data are collected by companies like Google and Apple to capture and document location information in the name of better system and user experiences, and this collection is often uncontroll ...
    • Information Security
    Scripps I
    You have a suspect, but no access to their phone, You could access their vehicle, but you have no forensic tools, little technical prowess, and only a handful of minutes... Good news, Blue Team! In th ...
    • Forensics
    Scripps II
    This session will discuss a research study whose main objective was to develop a methodology that might assist digital investigators to extract and analyze third party application data during a crimin ...
    • Information Security
    Grande D
    In this session, attendees will learn how to harness the power of PowerShell and the Command Prompt for basic investigative purposes, along with a brief introduction on "PowerShell Core", which is an ...
    • Forensics
    Grande E
    This session will focus on some of the practical aspects of Threat Hunting as well as bringing this capability into an organization either through existing personnel and tools or through third party p ...

2019 Sponsors

QUOTE

  • Techno Security & Digital Forensics Conference has been a highlight of our trade show schedule. As always, the event allowed us to showcase our cutting edge technology to decision making users who could benefit the most from our product. We will be joining California as it should give us increased presence to agencies on the west coast.
    Jeremy Kirby, Director of Sales & Grants Coordinator, Susteen, Inc.
  • We find Techno Security Digital Forensics Conference to be a great return on our investment and look forward to meeting new prospects, catching up with our customers, and gaining insight to what’s new in the market. Because of our experiences in Myrtle Beach, we’ve organized our budget to include the San Diego conference in 2019 and look forward to another fabulous experience on the west coast.
    Natasha Lockhart, VP Business Development, SysTools

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE