The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
As we immerse ourselves into the revolutionizing era of AI, the world of cybersecurity and digital forensics is confronted with unprecedented challenges as well as opportunities. During this powerful ...
Artificial intelligence has garnered significant interest in the United States Congress, impacting investigators and potential victims. This session will address what is coming from an A.I. legislativ ...
Trade secrets make up majority of value of U.S. public companies' portfolios. Not surprisingly, such secrets are high value targets for domestic and foreign theft. Domestic economic damage attributed ...
Whether working a HIPPA case, client-attorney privilege, or just a system with mixed file and data ownership can raise privacy concerns and without a proper methodology hinder the investigation. This ...
Many companies and organizations have rolled out Microsoft/Office 365 in their computing environments, but few have taken advantage of the search and investigatory tools built into Microsoft Purview. ...
This session explores the confluence of virtual economies, cybercrime, and money laundering within video gaming. It aims to understand the dynamics of closed virtual currencies and in-game economics. ...
AI images and videos are taking over the internet. Your selfies make you glow and have perfect skin and are presented to the world as real. Celebrities are regularly having AI generated explicit image ...
Video and image evidence is vital to all aspects of investigations as well as security. Trusting evidence that is submitted has increasingly been challenged, particularly related to "deepfake"video. A ...
As an investigator, you’re constantly searching for ways to close cases faster. One of the most effective ways to do so is by implementing social media data from multiple sources, but how? This sessio ...
Filesystem or full disk encryption on Android and iOS devices is an accepted and well understood norm nowadays. However, there are almost invariably additional layers of security on these devices now, ...
The legal sector is on the cusp of a technological revolution, propelled by AI, digital forensics, and eDiscovery. This session explores their integration in legal practice, focusing on AI's impact on ...
With the development of the internet came a new tool for criminals to conduct illegal activity. With the emergence of the dark web and cryptocurrency, criminals gained anonymity for their illicit tran ...
Mobile devices have become engrained in our daily lives, so smartphone data plays a critical part in almost every criminal investigation. Magnet Forensics offers a range of solutions at every stage of ...
Digital Forensics & Incident Response teams are facing unprecedented pressure to expedite caseloads and respond to incidents immediately. Learn how to harness the power of large-scale processing engin ...
This demo session will take a new look into forensic artifacts, highlighting how EnCase enhances the preservation and examination of artifacts within digital investigations. You’ll see how EnCase can ...
Join MSAB as they show how to use their flagship analytical software XAMN, they will demonstrate how to use XAMN to deep dive into the data for a better understanding of what the tool does. They will ...
The session will focus on on-scene investigations and use screenshots/screen recordings when talking with victims and witnesses. The session will delve into the unique challenges and opportunities tha ...
When the event has been resolved & the threat has been mitigated the client, CISO, CEO & BoD will want to know root cause, a resource consuming and costly project. Investigation into sufficient or lik ...
The Cloud has been thought of as a frontier which only the bold few Law Enforcement agencies have entered. Cloud services have arrived and understanding their implementation within your digital invest ...
Vulnerability management solutions just don’t secure an enterprise from the attacks that are occurring daily against organizations of every size. Attackers are using various tactics to expose and expl ...
Are you looking for a way to extract facial data from videos in order to compare to known datasets? Need to know how to quickly search text located in screenshots? How about simply pushing a button to ...
Join Exodus Road founder Matt Parker, Cellebrite’s Chief Marketing Officer Lisa Cole, and Cellebrite CEO Yossi Carmil for an engaging fireside chat and learn how Cellebite is on a mission to eliminate ...
Threat simulations involving malware and C2 frameworks are crucial in Cybersecurity training and readiness. They provide a realistic environment for Cybersecurity professionals to understand and count ...
This interactive session will present three distinct views from cyber security veterans including real-life scenarios each of us has experienced talking about cyber risk with senior leaders. In 2024 w ...
This session is designed to shed light on the critical yet often overlooked aspects of macOS forensic analysis. The session will explore a variety of advanced artifacts, including File System Events ( ...
This session will discuss the vital topic of backlog reduction and how digital forensic triage can improve ICAC/CSAM investigations. Attendees will learn: How to reduce the seizure of unnecessary devi ...
As examiners, we learn to listen to the who, what, where, when, and must understand the why. What happens when the evidence is silent? What happens when the storyline doesn’t make sense? What if the a ...
xBit Case Management for Digital Forensics. This workshop will demonstrate the xBit Case Management solution for digital forensic labs. Attendees will experience how the user-customizable xBit assists ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Join us for an in-depth exploration of cryptocurrency and its impact on law enforcement investigations. Discover the hardware, software, and exchanges that underpin this digital currency, and gain ins ...
In the world of network security, the latest Wi-Fi security standard is a "Breaking Bad""level of intense. Not to be overly dramatic, but 99% of your business networks are using technology that's been ...
Join Cellebrite’s expert team for a live interactive panel. Bring your questions about Cellebrite solutions, case-specific help, or anything else. And have a drink on us while you’re at it!
PenLink introduces CoAnalyst, a cutting-edge generative AI (Artificial Intelligence) platform tailored for the specialized need of law enforcement, national security, defense, and security. It combine ...
Generative artificial intelligence is a new technology that has seen phenomenal growth since late 2022. GAI platforms have proliferated even as uses have multiplied in private and public sectors. Deve ...
The range of sources and volume of data in criminal investigations continues to grow at an alarming rate, leaving forensics examiners with the persistent challenge of cutting through the noise to get ...
A detailed and step-by-step account of how a team of investigators was able to locate a criminal suspect by using blockchain forensic tools, metadata from NFTs, and traditional OSINT methods. Combined ...
This session examines real-world applications of AI to expedite digital investigations. It explores machine learning, natural language processing and computer vision techniques that enable investigato ...
From developing standard operating procedures to evaluating legal admissibility, digital forensic standards provide important reference material for examiners and can serve as a yardstick to measure t ...
This session will teach attendees about sanitizing/wiping data storage devices, the standards that govern data sanitization, and tools that can be used to wipe data storage devices. The discussion wil ...
NIST, DoD, NSA, DHS CISA, and other organizations have publicly available tools to help all types of organizations harden their systems. This session will explore how these tools can help you do your ...
Containerized systems are becoming widely used throughout the tech industry and is changing how we use virtualized systems. This session will introduce the concept of containerized systems and how the ...
This panel discussion will delve into pressing issues surrounding privacy concerns, as well as the collection and review hurdles confronting eDiscovery professionals across various industries. The con ...
While pattern of life artifacts has become the mainstay of many investigations, not all artifacts are created equal in terms of timestamps. Some will record in seconds, some in milliseconds, some in l ...
This case study shares how a construction superintendent Todd Engles, who produced CSAM with multiple 9–12-year-old girls on multiple social media platforms to include Discord, TikTok and Instagram. T ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Ephemeral data presents a real conundrum for everyone who works in the legal business. Lawyers have legal and ethical obligations to preserve, collect, review, and produce relevant electronically stor ...
This session will explore the impact of eSIM technology, how it has exploded in the world of IoT devices and how this has transitioned to be the solution of choice for smartphones and other mobile dev ...
Are you thinking about moving from the public sector into the private sector? Join this panel of industry-leading experts from Cellebrite and VeriFi who have successfully made the move. Learn from the ...
Discover the groundbreaking capabilities of Cellebrite’s latest innovation in digital forensics, designed specifically for accessing the widest-range of devices. Learn how what Cellebrite Inseyets bri ...
This presentation focuses on the often overlooked but critical aspect of digital forensics: Reporting! We will explore the art of transforming complex findings into clear, organized reports. Using dyn ...
*Pre-registration required (included with your paid registration)This hands-on workshop teaches a methodology for mobile forensic analysis of unsupported applications and artifacts. The workshop will ...
The SEC issued new Cybersecurity requirements that went into effect December 2023. Will your Incident Response program pass muster? This session will take a deep dive into the SEC’s new cybersecurity ...
A panel of industry practitioners will discuss the role of eDiscovery and Forensics within internal investigations. The panel will explore workflows, tools, processes, best practices, and other relate ...
Cloud forensics involves analyzing and collecting digital evidence from various cloud-related sources. This session will discuss how whether data is hosted and offered through the cloud, generated, an ...
Who, What, and When are the basis for many investigative questions. The ‘what’ and ‘when’ questions are covered in many digital investigation courses about artifacts and timelines. But, you need to un ...
Various video investigation cases for CCTV, DVR and Car Dashcam will be presented using MD-VIDEO AI demo. Recovery of deleted video frames, Enhancement and restoration of US car number plate of unclea ...
Updated with more video and resources. This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which ...
Tom Cruise performing magic tricks on TikTok, foreign leaders declaring acts of war…the prevalence of high-quality synthetic media online has brought a new age of disinformation and distrust to societ ...
Digital forensics professionals are increasingly encountering privacy-focused tools like Linux Tails, which present unique challenges when conducting investigations. This session will guide attendees ...
This case study walks through an investigation beginning with a substantial cash out of Bitcoin and the investigation leading into the dark web of hackers and the uncovering of a prolific SIM swapper. ...
Are you so confident in your open source findings that you would testify in court? In this presentation, participants will learn best practices for capturing and storing open source findings on social ...
Join us as we delve into the trends shaping our sector. Discover actionable strategies derived from industry trends, empowering your business to thrive in today's dynamic landscape. Don't miss out on ...
Understand how the DekkoSecure solution helps organizations with highly sensitive, and mission critical information to be able to share and collaborate in the cloud, with guaranteed security.
In this session, attendees will explore key certifications: CISA, CISM, CISSP, and CCSP, pivotal for career advancement. The journey to certification, enriched by AI-enhanced tools, will be demonstrat ...
In this session, audience members will learn the truth behind common misconceptions about the eDiscovery process. Myths such as "its complicated,""it’s expensive,"or "manual document review is the gol ...
Despite being overshadowed by social media giants, Reddit is an underrated gem in the realm of OSINT. Reddit stands out for its vast assortment of third-party tools that grant access to previously del ...
The public-private sector relationship can be a veritable minefield of relational issues. Law enforcement examiners can often find themselves at odds with policy, procedure, supervisors and/or prosecu ...
This session focuses on the challenges of finding AI traces in Windows systems from a digital forensics point of view. The presenter will share how AI works with the operating system and the tough job ...
In this year’s State of Enterprise DFIR report, Magnet Forensics surveyed almost 400 DFIR professionals globally, and 42% of corporate DFIR practitioners reported difficulty acquiring from remote on o ...
The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
Join us for "Mastering Mac Imaging with RECON ITR: A Demo for Forensic Professionals,"a focused 50-minute journey into the specialized world of Mac forensic imaging, presented by digital forensics pio ...
Global news sources provide a vast sea of data for investigators. This session explores a new approach that combines Python, Natural Language Processing (NLP), and ChatGPT, to transform the way we har ...
This session will share three developments not well known among cybercrime investigators. The session walks through the E2EE apps which are available to anyone with an Internet connection and a mobile ...
This session will focus on a broader spectrum of cyber risk consequences beyond pure financial metrics. We will explore different approaches to assessing, measuring, prioritizing, and quantifying risk ...
Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
Join us for this session to explore how Magnet Griffeye is transforming digital media investigations with its powerful set of analytical features and capabilities, uncovering crucial evidence efficien ...
DATAPILOT First-to-market acquisition capabilities for Apple Vision Pro & Meta Quest VR headsets. Be the first to see our new technology capable of pulling multiple types of data from VR headsets. DAT ...
This is a case study of an iPhone 11 that was retrieved from a highway after being run over multiple times. Learn how to recognize, diagnose and repair several strange faults that are common with seve ...
This session provides a roadmap for cybersecurity professionals to become "Hacker Minded."Today, cyber career discussions are boxed into certifications and education. The presenter will share the "5 E ...
Important device information can be identified through the monitoring of raw data sent via USB protocol. iOS devices present sensitive information in the back end even when this information is not see ...
The number of data sources continues to grow. Leading organizations now have Chief Data Officers to lead the governance and set the direction in dealing with the data sets. Reports are dynamically gen ...
Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
This hands-on lab session will walk you through operating the analytic features of Oxygen Forensic® Detective. You will explore the following: Facial Categorization, Face Searching, OCR, Image Categor ...
*Pre-registration required (included with your paid registration) I’m a digital forensics examiner (DFE), and I know that I need some scripting skills, but I don’t want to be a full-time programmer. P ...
Many modern businesses rely on a cloud environment (if not multiple) to store and host valuable employees, customers, and proprietary data. But cloud security is constantly evolving, emphasizing the n ...
This session will explore the revolutionary potential of Generative Pre-trained Transformers (GPTs) in Open-Source Intelligence (OSINT). Attendees will learn to harness Chat GPT for insightful OSINT i ...
You've been hired to build a team from the ground up, now what? In this session, you will be presented with the scenarios and questions inherent in developing an Enterprise forensics and eDiscovery te ...
The dramatic increases in the volume, velocity, and veracity of digital evidence, particularly with mobile devices, can paralyze even the most efficient and effective forensic labs, with examiners mak ...
This session outlines a process for identifying USB storage device activities on Windows 11. Leveraging Sysinternals Procmon, we monitor registry changes related to USB insertions, removals, and persi ...
Almost all serious crimes nowadays contain a digital footprint, and the effective session of this digital evidence to juries is essential for successful prosecutions. In this session attendees will le ...
This session provides a practical walkthrough of extracting employee data from Microsoft 365 using an admin account. Attendees will understand how to identify and export data, investigate user logs, a ...
With ever-growing volumes of digital data flooding digital forensics labs—from chat records to geolocational data, photos, videos, and everything in between—time to evidence is crucial. Automation and ...
The state of Generative AI today is reminiscent of the inception of the world wide web's interface to the internet. The chatbots today are in the same way bringing the masses to AI, ready or not. The ...
Use of remote user access to enterprise networks has exploded dramatically since the start of the recent COVID pandemic...but due to its often-careless management and use, it has become a dangerous ba ...
The session demonstrates real use cases in Brazilian investigations solved using operating system artifacts, metadata, and data collection from open sources. This educational session will delve into p ...
This session will cover the importance of testing response plans and procedures through performing tabletop exercises focusing specifically on insider threats. The presenter will discuss *the proper p ...
Discover three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trusted site, and human ingenuity techniq ...
Join us as we delve into the intricacies of understanding early data assessment, collection, and analysis of employee devices and commonly used workplace applications, including phones, tablets, lapto ...
In today’s digital landscape, data is curial to business and legal processes. Managing eDiscovery security risks is vital. This session will enhance your grasp of international standards, introducing ...
This session examines the current state of the computer security requirements that have been imposed on defense contractors to protect Controlled Unclassified Information. In the process it examines w ...
As digital evidence becomes more prevalent throughout the world this trend also includes the prison system. This case study will follow the Tennessee Department of Correction’s first major digital evi ...
This session will be informing the purpose, threat, and detection of AI images and videos, addressing the rising concerns surrounding AI-generated visual content and its potential for spreading misinf ...
Surveillance video is utilized in most investigations, but getting the most from the evidence you collect can be difficult. Depending on how it was collected, and what is required, you might be used t ...
This session focuses on the investigation and forensic analysis of a drone which was recovered from prison contraband smuggling incident. Discussion will cover the capabilities of drones, unique foren ...
Digital forensic evidence can convict the guilty or exonerate the innocent. Justice requires transparency in pretrial discovery & scrupulous ethics by all investigators. During this session, attendees ...
This session explores challenges in modern communication methods used by the public and private sectors. It discusses the complexities of integrating contemporary data types into standard practices, f ...
OSINT is a great mechanism for the collection of data, but what do you do with all of it once it’s collected? For the last 5 years we’ve been exploring Azure and AWS for computer vision to rapidly pro ...
The cloud has created opportunities for adoption of emergent technologies, e.g., Artificial Intelligence (AI), that many would have considered out of reach a few years ago. Additionally, data is spann ...
This session describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to a ...