June 3-6, 2018
  Myrtle Beach, SC, USA

2018 Conference Program

2018 Conference Program

   
The 2018 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Sunday, June 03, 2018
    • Forensics
    Oleander A
    Today's investigators are finding more and more instances of two-factor authentication when it comes to cloud storage. What is two-factor authentication and can it be defeated to access valuable data ...
    • Information Security
    Oleander B
    Attendees will leave this session with new ideas that can immediately be applied to their password cracking needs ranging from recovery of password-protected documents needed for forensics, incident r ...
    • Investigations
    Atlantic 3
    Historical carrier call detail records have become an instrumental part of many law enforcement investigations. Recently, the United States Supreme Court heard oral arguments in effort to decide wheth ...
    • Cellebrite Lab
    Atlantic 1
    Cellebrite’s trusted and awards winning UFED technology delivers the most comprehensive digital forensics capabilities available for both field and lab, to date. Learn about Cellebrite’s newest and mo ...
    • Forensics
    Tides 1/2
    Surveillance video is encountered in nearly every investigation. The ability for investigators to quickly and accurately recover this evidence is crucial, particularly in the early stages of an invest ...
    • Magnet Forensics Lab
    Atlantic 2
    In this hands-on lab, learn about the evidence sources supported by Magnet AXIOM and how to leverage our support for cloud, smartphone and computer forensic artifacts for all cases. We will walk throu ...
    • Magnet Forensics Lab
    Atlantic 2
    In this hands-on lab, we will explore advanced recovery acquisitions, how AXIOM leverages machine learning for faster examinations, hex decoding, how to use profiles, how to leverage our Connections f ...
    • Investigations
    Oleander A
    Domestic and international criminals are finding creative ways to hide anonymously. Discover the value of utilizing innovative investigative search techniques to gather critical information on persons ...
    • Forensics
    Oleander B
    These days majority of modern smartphones, tablets and other portable devices use wide range of eMMC and eMCP memory chips such as BGA169, BGA162, BGA221 and others. When the device gets damaged or pi ...
    • Audit/Risk Management
    Atlantic 3
    In order to comply with the New York State Cybersecurity Requirements, many organizations are in the process of performing cybersecurity risk assessments using the NIST Cybersecurity Framework. Other ...
    • Cellebrite Lab
    Atlantic 1
    Mobile device security continues to thwart investigators and examiners on a daily basis. In an effort to equip forensic examiners and investigators for these challenges, Cellebrite developed the Advan ...
    • Information Security
    Oleander B
    Are we Flying Blind in the Clouds? 3rd Party Cloud Leaks or data Breach? IT Depends! In this session, we will discuss the rise in cloud leaks and “potential” data breaches. We will share current examp ...
    • Forensics
    Tides 1/2
    Nowadays Solid State Drives are becoming increasingly popular as internal storage devices in PCs, laptops, ultrabooks, and tablets. That’s why digital forensic examiners have to be prepared for the ch ...
    • Forensics
    Oleander A
    Another year, another iOS update, another sweet-shop-sounding Android OS. Each new update for a mobile OS represents a new puzzle for digital investigation teams. With a continued focus on encryption ...
    • Forensics
    Atlantic 3
    Investigative journalist Barıs Pehlivan was accused by Turkish prosecutors of membership in a terrorist organization and imprisoned for over a year and a half, based entirely on forged documents recov ...
    • Cellebrite Lab
    Atlantic 1
    With 1.1 million applications on the Play Store and App Store, our forensic tools do all they can to stay ahead. In this lab, we will walk through relevant data overlooked by our tools, even those whi ...
    • Magnet Forensics Lab
    Atlantic 2
    In this hands-on lab, we will explore advanced recovery acquisitions, how AXIOM leverages machine learning for faster examinations, hex decoding, how to use profiles, how to leverage our Connections f ...
    • Magnet Forensics Lab
    Atlantic 2
    In this hands-on lab, learn about the evidence sources supported by Magnet AXIOM and how to leverage our support for cloud, smartphone and computer forensic artifacts for all cases. We will walk throu ...
    • Investigations
    Oleander A
    Cloud storage continues to grow in ease of use and popularity. Businesses use the cloud to store important collaborative documents; individuals use the cloud to store sentimental pictures. The conveni ...
    • Information Security
    Tides 1/2
    As Incident Response Consultants for clients in various industry verticals, we often see the same threat vectors responsible for the majority of incidents. The vast majority of these incidents could h ...
    • Forensics
    Atlantic 3
    In recent years both the volume of digital evidence and the number of cases in digital forensics has been rapidly growing. As technology infiltrates all spheres of human activity, evidence can be foun ...
    • Forensics
    Oleander B
    Triage techniques offer the potential to sift increasing numbers of digital devices for evidence rapidly and reduce the number of devices subjected to a complete examination.  Used properly, triage ca ...
    • Cellebrite Lab
    Atlantic 1
    Unmanned Aerial Vehicle (UAV) also known as “drones” are currently being used to perpetrate numerous crimes around the world. Take a look at some of the different ways in which unmanned vehicles have ...
    • Forensics
    Tides 1/2
    Given that all MS Office documents are Zip files, a user can change the extension, open the file and access the internal document metadata. At that point they can modify what would otherwise be read o ...
    • Forensics
    Oleander B
    Instant Messengers are now everywhere. Needless to say, it is important to find messenger history in a course of forensic investigation. Crucial information on communication between victim and suspect ...
    • Magnet Forensics Lab
    Atlantic 2
    Join our mobile forensics expert, Christopher Vance, in this hands-on lab to discuss the value of full versus quick smartphone dumps, leveraging TWRP for better data recovery, downgrading applications ...
Monday, June 04, 2018
    • Keynote
    Oleander A/B
    Session description in development
    • Cellebrite Lab
    Atlantic 1
    Over the course of three years the YJB gang wreaked havoc throughout central Florida, committing burglaries, robberies, stealing vehicles, and using violence against rival gangs and law abiding citize ...
    • Magnet Forensics Lab
    Atlantic 2
    In this new world of hyper-connected mobile chat and social apps, it seems like a new app explodes in popularity every month and existing apps are constantly changing and adding new features. These ap ...
    • Investigations
    Oleander B
    In this session, we will have an update of the Adolescents and Technology session from two years ago discussing the investigative challenges of adolescents and millennials ESI. With help from the pane ...
    Moderator: Panelists:
    • Information Security
    Tides 1/2
    Red Team assessments are a great way to assess your companies security posture and maturity by simulating real-world scenarios that an adversary might take to potentially compromise information. How d ...
    • Sponsor Demo
    Osprey
    Learn how Susteen’s new forensic product can help you with quick acquisitions in the field
    • Forensics
    Oleander A
    Drones are quickly becoming a major concern for law enforcement agencies around the globe. They have been used to transport contraband across borders, into prisons, and drop propaganda at NFL games. T ...
    • Sponsor Demo
    Heron
    Showcasing the newest features of the WiebeTech® Ditto® DX drive imager – including new security lock/unlock and encryption/decryption features – will be forensic expert, Greg Dominguez of CRU®. He wi ...
    • Audit/Risk Management
    Atlantic 3
    Sending data over the Internet and over wireless networks be risky business. Use of Virtual Private Networks (VPNs) and secure session protocols (e.g, SSH and SSL/TLS) are widely used to protect data ...
    • Sponsor Demo
    Heron
    Now an examiner can create an extraction of internal and external cards on drones as well as import chip-off, internal/external physical images, parse app data from iOS and Android and much more.In th ...
    • Forensics
    Oleander A
    It is predicted that there will be over 20 billion connected devices by 2020 – and that doesn’t include over five billion smartphones. Add to that volume the amount of data people are using with their ...
    • Information Security
    Tides 1/2
    Online research of publicly accessible websites is a source for a practically infinite amount of data. But who knows what sorts of malicious software (malware) is lurking on the other side of every li ...
    • Sponsor Demo
    Osprey
    Session description in progress
    • Magnet Forensics Lab
    Atlantic 2
    Join our mobile forensics expert, Christopher Vance, in this hands-on lab to discuss the value of full versus quick smartphone dumps, leveraging TWRP for better data recovery, downgrading applications ...
    • Magnet Forensics Lab
    Atlantic 2
    Join our mobile forensics expert, Christopher Vance, in this hands-on lab to discuss the value of full versus quick smartphone dumps, leveraging TWRP for better data recovery, downgrading applications ...
    • Audit/Risk Management
    Atlantic 3
    Big Data is the term used to describe our ability to make sense of the ever-increasing volumes of data in the world. Whether you call it big data, analytics, business intelligence or data analysis doe ...
    • Information Security
    Tides 1/2
    As information security teams grow and start to focus on incident detection and response, they need to develop an alert and incident triage process. This session will cover the basics of doing endpoin ...
    • Sponsor Demo
    Osprey
    Join us for an overview of xBit DCM. Developed for an ICAC TF and is solidly built for submissions, case tracking, evidence maintenance, extensive note taking and overall case management. Additionally ...
    • Cellebrite Lab
    Atlantic 1
    Digital intelligence starts from extracting digital data but it doesn’t end there. Streamline your investigation and take a broader look at the digital intelligence stakeholders within your agency inc ...
    • Investigations
    Oleander B
    This panel discussion will address the relevance of data to solve cases and how it has created new challenges for legally acquiring data and evidence using credentials obtained from mobile devices and ...
    • Forensics
    Oleander A
    Although merchants and retailers have been implementing more secure technologies within their payment environments, such as Chip and PIN and Point to Point Encryption, they continue to be targeted by ...
    • Sponsor Demo
    Heron
    Quin-C is the bright new future of digital investigations.It delivers leading-edge capabilities to dramatically improve the quality and speed of your investigations.
    • Audit/Risk Management
    Atlantic 3
    Microsoft SQL Server is in just about every enterprise and government organization in the world and it is trusted to store and serve up even the most sensitive of data. As a result, Microsoft has inst ...
    • Cellebrite Lab
    Atlantic 1
    Through several case study examples, attendees will learn how Cellebrite’s Digital Intelligence solutions helped revitalize an investigation a year later. Live and deleted data recovered by Physical A ...
    • Investigations
    Oleander B
    Bitcoin and other altcoins have been in the news almost daily lately. You may or may not be aware of what blockchain and/or cryptocurrencies are but news of the rapid increase of value, wild price flu ...
    • Information Security
    Tides 1/2
    Buzzwords in security catch our eye as they begin to appear in articles, journals, and conferences. "Big Data" and "Security Analytics" are two such concepts. "User Entity Behavior Analytics" (UEBA) i ...
    • Sponsor Demo
    Heron
    iPhones are among the most secure mobile systems available. Apple has designed the iOS platform with security at its core and has made protecting the privacy of its users one of its highest priorities ...
    • Forensics
    Oleander A
    Over the past several years, automotive manufactures have been adding advanced technology to seamlessly and safely integrate access to our digital lives from within our vehicles. Vehicles that create ...
    • Magnet Forensics Lab
    Atlantic 2
    In this hands-on lab, we will explore advanced recovery acquisitions, how AXIOM leverages machine learning for faster examinations, hex decoding, how to use profiles, how to leverage our Connections f ...
    • Information Security
    Tides 1/2
    The EU General Data Protection Regulation (GDPR), which replaces the outdated existing EU data protection law and helps bring the requirements into the digital age, takes effect on May 25, 2018. Even ...
    • Magnet Forensics Lab
    Atlantic 2
    In this new world of hyper-connected mobile chat and social apps, it seems like a new app explodes in popularity every month and existing apps are constantly changing and adding new features. These ap ...
    • Forensics
    Atlantic 3
    Audio, acoustics, voice and video evidence are common in civil and criminal litigation throughout all state and Federal courts. Often such evidence is extracted from a computer or mobile device. All p ...
    • Investigations
    Oleander B
    RAM Analysis for the Investigator - Many times the ONLY evidence you have of the more skilled hackers penetrating your network is the RAM of the affected host. It is also the case that deep RAM analys ...
    • Cellebrite Lab
    Atlantic 1
    Every day around the world, digital data is impacting investigations. Making it accessible, intelligent and actionable is what Cellebrite does best. The Cellebrite Analytics solution empowers your inv ...
Tuesday, June 05, 2018
    • Information Security
    Oleander A
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will delve into the role o ...
    • Sponsor Demo
    Heron
    Join us for an overview of the Falcon-NEO’s capabilities and learn how this next-generation imager can shorten the evidence collection process with superior speed and advanced features designed for se ...
    • Forensics
    Oleander A
    Currency like Bitcoin, based on the cryptography principal, has added a layer of almost untraceable transactions to the already hard to navigate world of the Dark Web. Looking into a world where anyth ...
    • Magnet Forensics Lab
    Atlantic 2
    Join Jessica Hyde, Director of Forensics at Magnet Forensics, to learn how to link common artifacts with each other and see the connections that occur between different artifacts and pieces of evidenc ...
    • Information Security
    Oleander B
    Rapid developments in the field of artificial intelligence (AI) have resulted in a spate of new products and services. Without these advances, voice-based assistants like the Amazon Echo, Apple’s Siri ...
    • Audit/Risk Management
    Atlantic 3
    Cybersecurity and risk management cybersecurity decisions should be driven from a shared understanding of your organization's assets, threats, and vulnerabilities so that security investments address ...
    • Cellebrite Lab
    Atlantic 1
    Drones have been used to perpetrate crimes around the globe. These Unmanned Arial Vehicles (UAV) also known as “drones” can contain data that is imperative to investigations. A look at how investigato ...
    • Forensics
    Tides 1/2
    This presentation will provide an overview of Mac file systems including Apple File System (APFS), recently introduced as a replacement for HFS+. After the audience is familiarized with the variations ...
    • Information Security
    Tides 1/2
    This session focuses on how critical information security education is to an organization. We will be discussing ransomware threats and talking about our organizations actual ransomware infection and ...
    • Sponsor Demo
    Heron
    With all the applications available in the different marketplaces, Apple Store, Google Play, etc. It is impossible to have a tool support all of them. In this session we look into what data can be fou ...
    • Forensics
    Oleander A
    As mobile devices become more complicated to gain access to in a forensic manner, automated tools can only do so much. With 88 percent of devices worldwide running Android, there is no easy solution t ...
    • Investigations
    Oleander B
    With more user data stored on Apple's corporate servers, investigators need to know how to submit a search warrant request to Apple and how to deal with the data they receive back. This session will p ...
    • Magnet Forensics Lab
    Atlantic 2
    As enterprises of all sizes continue to shift more and more data into cloud-based content collaboration platforms, it's more important than ever to learn how to recover cloud-based data and perform fo ...
    • Sponsor Demo
    Osprey
    This talk will focus on describing the attributes of “best-in-class” digital forensic hardware and software, and how to use them in combination to improve case efficiency. Due to the increasing number ...
    • Magnet Forensics Lab
    Atlantic 2
    Gartner predicts that by 2020 there will be more than 20 billion connected “things,” not including smartphones, in the world. That’s 20 billion things collecting data, 20 billion potential “technologi ...
    • Investigations
    Tides 1/2
    In this session, the presenter will share his firsthand experience and detailed description of the Robert Hanssen investigation from a DFRS perspective. He’ll discuss how the investigation was initiat ...
    • Cellebrite Lab
    Atlantic 1
    Session description in development
    • Information Security
    Oleander B
    The continued hacking of large organizations’ websites all have something in common; they gain access by stealing credentials. Hacking credit/debit cards and personal information is a growth industry. ...
    • Information Security
    Atlantic 3
    Cyberattacks on large companies such as Sony and Equifax have shown that no one is immune to malicious cyber activity. With demand high for qualified professionals, filling cyber security positions ha ...
    • Forensics
    Oleander A
    Every day we hear about drones around prisons, hauling drugs across borders, lingering around military installations, and much more. This is not on a US epidemic, but there are cases from around the g ...
    • Sponsor Demo
    Heron
    A new class of solutions promise to meet the prevention, detection, and investigation needs of information security, forensic, and investigative teams. But can they really detect potentially malicious ...
    • Sponsor Demo
    Osprey
    iPhones are among the most secure mobile systems available. Apple has designed the iOS platform with security at its core and has made protecting the privacy of its users one of its highest priorities ...
    • Information Security
    Oleander B
    The public and private sectors face a growing national security concern resulting from the ability of criminals, terrorists, and state actors to obfuscate their activities by going dark through encryp ...
    • Investigations
    Tides 1/2
    This presentation brings together the Python Programming Language and Twitter Investigations. Python is a free, simple, easy to learn programming language. Twitter is a social micro-blog that has over ...
    • Forensics
    Oleander A
    Digital forensic processing of very large organizations (thousands of nodes) offers some significant challenges when compared to traditional computer forensics. Hence, the term “Big Forensics.” These ...
    Moderator: Panelists:
    • Audit/Risk Management
    Atlantic 3
    Social media and other online public data sources present new challenges for enterprise risk management executives and chief security officers.Today’s online reality and fast-paced business environmen ...
    • Cellebrite Lab
    Atlantic 1
    With mobile malware and spyware on the rise, Android is a target of 81% of attacks (2017). In this interactive lab, learn to identify and isolate malware from Android devices. Using several open sourc ...
    • Magnet Forensics Lab
    Atlantic 2
    Whether it’s snaps, shares, chats, or hidden data, apps are now the source for some of the most relevant digital evidence in any given case. Whether the apps are used by suspects, victims, or witnesse ...
    • Magnet Forensics Lab
    Atlantic 2
    As manufacturers continue to improve device security and encryption, we ask: Where will the most valuable data reside? What can you do to both acquire and analyze it effectively? This session discusse ...
    • Investigations
    Tides 1/2
    Investigators have more tools than ever before to forensically examine phones, but what are the solutions when the phone is not working due to water or physical damage? The sensitive electronics insid ...
    • Information Security
    Oleander B
    Cloud computing has brought relief to enterprises by relieving them of managing huge IT infrastructure requirement and bringing down cost of IT related operations substantially. Cloud security is beco ...
Wednesday, June 06, 2018
    • Forensics
    Oleander B
    Smartphone are crucial to our lives and our businesses as well as the crimes involved in both. If you have not dealt with them yet, you will. Being prepared is key and learning the steps you need to w ...
    • Cellebrite Lab
    Atlantic 1
    SQLite allows binary data to be stored as Large Objects in a record, hiding entire files from us. Apple’s iOS uses these BLOBs to store plist files which contain treasure troves of evidence. Even embe ...
    • Information Security
    Oleander A
    They have innocent-sounding names like AlphaBay, Europol, and Dream Marketplace. But inside these “hidden” sites cybercriminals gather to buy and sell, connect with other cybercriminals, and develop i ...
    • Investigations
    Atlantic 3
    This session will provide an in-depth look into cellular networks and call detail records (CDR’s) from any cell phone provider. We’ll share how to understand the information, how to use the informatio ...
    • Magnet Forensics Lab
    Atlantic 2
    Session description in development
    • Magnet Forensics Lab
    Atlantic 2
    Session description in development
    • Forensics
    Oleander A
    Current solutions for detecting child pornography in video often rely upon representative key frame image captures that the analyst must manually review. While this method is an improvement over havin ...
    Moderator: Panelists:
    • Information Security
    Oleander B
    Since the inception of the internet, attempts have been made to solve the problem of privacy and security. These efforts demonstrate the challenge of inconvenience, cost and insecurity. In this sessio ...
    • Investigations
    Atlantic 3
    G Suite, a package of cloud-based services offered by Google for businesses or schools, has enhanced online productivity and collaboration. Furthermore, G Suite has allowed for enhanced administrative ...
    • Forensics
    Oleander B
    The vast majority of data, including sensitive data, is stored in relational databases. Databases expose an input/output interface, while opaquely managing storage and query execution. Therefore, user ...
    • Cellebrite Lab
    Atlantic 1
    Have you ever wondered what the big deal is with Accreditation? After all, isn’t it time consuming and require a massive amount of organizational introspection...exactly! Many training organizations a ...
    • Investigations
    Atlantic 3
    This case study involves an affluent young man involving in distribution of drugs while in high school. As he prepares to go to college out of state he is murdered in what is most likely his last loca ...
2018 Sponsors

2018 Sponsors


 

Testimonials

  • “Techno Security & Digital Forensics Conference continues to be a great asset to both the law enforcement/government agency and civilian/commercial security space. Bringing these two groups together allows us all to continue to provide tactical and strategic improvements in the security space.”
    Jim Keegan, Director, Information Security
    Essent Guaranty, Inc.
  • “Techno Security & Digital Forensics Conference delivers state of the art training, networking opportunities, and access to the latest digital forensic products.”
    Darin Meadows, Lieutenant
    Houston County Sheriff's Office
  • “Techno Security & Digital Forensics Conference did an excellent job educating people on the relevant topics, trends, and best practices impacting and being used in organizations every day.”
    Matt Donato, Co-Founder & Principal Partner
    HuntSource
  • “The best conference to find out what is going on in the forensic community and the mobile devices area all in one gorgeous setting.”
    Charlene Warner, Digital Forensic Specialist
    Michigan Dept. of State Police - Computer Crime Unit