San Diego, CA

March 11-13, 2019

Hilton La Jolla Torrey Pines

Hero Default

hero__default

2019 Conference Program

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, March 11, 2019
    • Audit/Risk Management
    Scripps II
    The disciplines of Information Security and IT Audit are quite different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuri ...
    • Forensics
    Scripps I
    This session will discuss several cases where the scope of the examination exceeded a simple DVR recovery. These types of advanced examinations require a significant understanding of the operation of ...
    • Forensics
    Grande D
    In recent years both the volume of digital evidence and the number of cases in digital forensics has been rapidly growing. As technology infiltrates all spheres of human activity, evidence can be foun ...
    • Information Security
    Grande E
    Bug bounty programs are popping up all over the place, as more and more companies embrace collaborating with friendly hackers to find vulnerabilities before cyber criminals have a chance to exploit th ...
    • Information Security
    Grande E
    Discovery, litigation and record management have advanced greatly in the last two decades with the constant evolution of people communicating, working, and living in a digital environment. Given the v ...
    • Investigations
    Scripps I
    Have you ever wondered what motivates certain cybercriminals and why some prefer to work independently, while others would do business with anyone? Do you know what to expect when engaging an Asian ba ...
    • Forensics
    Grande D
    New versions of Windows 10 certainly seem to be arriving faster than previous Windows incarnations. Each new version offers the potential for new forensics artifacts. Several new artifacts have alread ...
    • Audit/Risk Management
    Scripps II
    Session description in progress.
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Sponsor Demo
    Shore
    Session description in progress.
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Sponsor Demo
    Shore
    Session description in progress.
    • Investigations
    Session description in progress.
    • Information Security
    Grande E
    80% of all Enterprise Data is Unstructured and is predicted to grow up to 80% annually. 69% of unstructured data no longer has any legal or business value. There are no known, commercially-available s ...
    • Forensics
    Grande D
    The challenges of investigating smartphones devices are paramount. With the rapid development of phone apps, law enforcement agencies and vendors are playing catch up when it comes to reverse engineer ...
    • Audit/Risk Management
    Scripps II
    Often we fall back on examples of penalties to explain our justifications. But what if we could talk about it as a market mover? What if, much as vault salesmen of the 30’s, we could explain that our c ...
    • Forensics
    Grande D
    A modern-day vehicle typically has 50-70 electronic control units (ECUs) or computers running on five different networks. User and vehicle data can be stored on these ECUs that can help investigators ...
    • Investigations
    Scripps I
    Investigators have more tools than ever before to forensically examine phones, but what are the solutions when the phone is not working due to water or physical damage? The sensitive electronics insid ...
    • Information Security
    Grande E
    This session will share a case study that has been fused together by the moderator and panelists from real cases and contains some fictional components as well. The panel will discuss the technical an ...
    Moderator: Panelists:
    • Forensics
    Contents of emails can easily be altered. Focusing solely on email contents and metadata can prevent you from seeing the whole picture. How can you effectively corroborate information found in emails ...
    • Sponsor Demo
    Canyon
    This demo will share how investigators/examiners can use Cellebrite tools to conduct fast, on-scene examinations and full forensic examinations of devices utilizing peer-2-peer applications to downloa ...
Tuesday, March 12, 2019
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Sponsor Demo
    Shore
    Session description in development.
    • Forensics
    Grande E
    Ephemeral data is here today, gone tomorrow (or sooner). Popular ephemeral messaging applications like SnapChat and Wickr transmit instant messages that automatically disappear from the recipient's sc ...
    Moderator: Panelists:
    • Audit/Risk Management
    Information Governance represents processes, defined by policies and enabled by technologies, that empower business leaders to make more intelligent business decisions to maximize the value of their i ...
    Primary Speaker
    • Information Security
    Attackers commonly find themselves in situations in which they must access a resource which is guarded by a multi-factor authentication systems. There are multiple ways that attackers can accomplish t ...
    • Forensics
    Grande D
    As mobile devices become more complicated to gain access to in a forensic manner, automated tools can only do so much. With 88% of devices worldwide running Android, there is no easy solution to ensur ...
    • Forensics
    Grande D
    This session will cover the current state of USB device forensics on modern Windows operating systems and will examine methods to improve the process. The presenter will discuss how examiners can bett ...
    • Information Security
    According to figures released by the FBI in 2017, global losses resulting from Business Email Compromise (BEC) has reached over $5 billion over a 3 year period, and shows no sign of slowing. This sess ...
    • Information Security
    Scripps II
    Session description in progress.
    • Investigations
    Grande E
    Encryption and anonymity offered by Bitcoin and other cryptocurrencies are exploited for securing illicit transactions, but these transactions still include attributable features that lead to identify ...
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Sponsor Demo
    Shore
    Session description in progress.
    • Sponsor Demo
    Shore
    Digital forensic analysts and investigators have big challenges: There’s so much data on mobile phones today, it’s tougherand takes longerthan ever to analyze it and find what you’re looking for. This ...
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Information Security
    Join us for an interactive panel discussion led by some of today’s leading women in cybersecurity as they discuss; The latest emerging and current trends to impact the cybersecurity industry; Current ...
    • Sponsor Demo
    Canyon
    In depths look into realworld applications of monitoring & compliance while using Argent as a single pane of glass solution. There will be applications review and discussions targeting the top 3 compl ...
    • Investigations
    Scripps I
    This session will provide attendees with an overview of insider threats from both a law enforcement perspective and a corporate perspective.
    • Information Security
    Scripps I
    According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users and these figures are expected to grow to 3.02 billion by 2021. In 2018, more than 77 percent of t ...
    • Forensics
    Grande D
    More than a billion connected devices – from vehicles to home appliances to wearable devices to “smart city” technologies – collect and communicate a watershed of potential evidence. Are you prepared ...
    • Information Security
    Grande E
    Internet bots have been widely used for various beneficial and malicious activities on the web. Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new ...
    • Audit/Risk Management
    Grande E
    Lab accreditation for digital forensics labs can be a contentious topic—but it doesn’t have to be. The Nike, Inc. digital forensics lab found that accreditation became an opportunity to improve their ...
    • Forensics
    Grande D
    Cloud storage continues to grow in ease of use and popularity. Businesses use the cloud to store important collaborative documents; individuals use the cloud to store sentimental pictures. The conveni ...
    • Investigations
    Grande D
    This is an introductory session to open-source intelligence (OSINT) for investigators and law enforcement. The purpose is to present unique ways in which criminals might use OSINT to commit crimes and ...
    • Sponsor Demo
    Shore
    Session description in progress.
    • Sponsor Demo
    Canyon
    Live demonstration of all Whooster investigative database capabilities and delivery platforms to include SMS/Text Messaging, Web Access and API. We will walk through not only utilizing these tools in ...
    • Investigations
    Scripps I
    Cell phone call detail records (CDRs) can be a challenging topic for anyone to testify on in court. Without proper knowledge and training on what to say and how to say it, it is very easy for these re ...
    • Information Security
    The term “Left of Boom” was made popular in 2007 in reference to the U.S. military combating improvised explosive devices (IEDs) used by insurgents in Afghanistan and Iraq. The U.S. military spent bil ...
    • Forensics
    Grande D
    This session comes out of the research of the largest drone forensics research program in the world. This project, funded by the United States Department of Homeland Security, is identifying and defin ...
Wednesday, March 13, 2019
    • Information Security
    Grande D
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Forensics
    Grande E
    Session description in progress.
    • Audit/Risk Management
    Scripps II
    While both the GDPR and the CaCPA have caused panic and fear in most corporate circles with rigorous rules and serious consequences, an in-depth review of all aspects of an organization will create an ...
    • Forensics
    Grande D
    This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS Macs, and items of consideration for APFS analysis on different forensic platforms.
    • Information Security
    Grande E
    This session will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The presenter will share the hacking of IoT devices and syste ...
    • Investigations
    Grande E
    The internet provides investigators with the ability to detect individuals, identify threats and organize offensive and defensive approaches. Focusing on the individual threat is not always the answer ...
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Sponsor Demo
    Canyon
    Session description in progress.
    • Forensics
    Grande D
    At times over the past three years, Apple’s mobile operating system changes seemed so mercurial that the parallels to tweens’ rapid maturation couldn’t be missed. iOS 10 changed the backup structure, ...
    • Information Security
    Grande E
    This session will look at an IT security program from a slightly different perspective. It’s not a question of if, but when, an IT security leader will need to demonstrate that they have provided a de ...
    • Forensics
    Grande D
    The session will include a high level overview of the FBI Next Generation Identification (NGI) System person-centric biometric modalities to include ten print, latent print, facial recognition and oth ...
    • Information Security
    Grande E
    When migrating to the cloud, many companies make the same mistakes. Often times called a “Lift and Shift”, organizations literally just copy their VMs from the data center and dump them in the cloud, ...
    • Forensics
    Grande D
    Volumes of data are collected by companies like Google and Apple to capture and document location information in the name of better system and user experiences, and this collection is often uncontroll ...
    • Investigations
    Scripps I
    During this session, attendees will discover the value of utilizing “outside the box” investigative searching methodology to gather critical information on persons of interest, and ultimately solve ca ...
    • Sponsor Demo
    Canyon
    Helping continue the trend of Susteen's commitment to Law Enforcement agencies throughout the US and world. Our Secure View mobile forensic software is second to none. Secure View has been the "go to" ...
    • Audit/Risk Management
    Scripps II
    Session description in progress.
    • Forensics
    Grande D
    This session will discuss a research study whose main objective was to develop a methodology that might assist digital investigators to extract and analyze third party application data during a crimin ...
    • Information Security
    Grande E
    Commercial tools make our jobs easier and are typically the first choice for investigators and first responders in live analysis situations, but can you really rely on them to work in every scenario y ...
    • Forensics
    Grande D
    Often times it is difficult to justify the cost of an internal incident response team in even the largest organizations. Managers have a difficult time addressing downtime where the incident response ...
    • Information Security
    Grande E
    Vehicles can store indefinitely your home address, previous destinations, garage door codes, contact book, call logs, full text messages, and more. In-Vehicle Infotainment Systems (IVIS) are becoming ...

2019 Sponsors

QUOTE

  • Techno Security & Digital Forensics Conference has been a highlight of our trade show schedule. As always, the event allowed us to showcase our cutting edge technology to decision making users who could benefit the most from our product. We will be joining California as it should give us increased presence to agencies on the west coast.
    Jeremy Kirby, Director of Sales & Grants Coordinator, Susteen, Inc.
  • We find Techno Security Digital Forensics Conference to be a great return on our investment and look forward to meeting new prospects, catching up with our customers, and gaining insight to what’s new in the market. Because of our experiences in Myrtle Beach, we’ve organized our budget to include the San Diego conference in 2019 and look forward to another fabulous experience on the west coast.
    Natasha Lockhart, VP Business Development, SysTools

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE