Myrtle Beach, SC

June 2-5, 2019

Marriott Resort at Grande Dunes

Hero Default

hero__default

Tuesday, June 4, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Tuesday, June 04, 2019
    • Investigations
    Oleander A/B
    The Dark Web has changed dramatically in the past 18 months with the number of sites and services decreasing significantly. But illegal activity via Internet connected systems continues to rise. This ...
    • Cellebrite Lab
    Atlantic 1
    In this session, we will focus on 3 overarching strategy pillars that police agencies will need to implement to deal with the exponential growth of data as a response to current challenges facing poli ...
    • Magnet Forensics Lab
    Atlantic 2
    More than half of data breaches reported by organizations are insider incidents — either through the inadvertent or the malicious misuse of data. As enterprises expand the use of cloud-based services ...
    • Sponsor Demo
    Heron
    Mobile device investigations are growing exponentially. The number of mobile phones being examined has increased nearly tenfold over the past decade. Containing everything from text messages, call log ...
    • Sponsor Demo
    Osprey
    To securely triage, acquire, investigate, and report the findings of your digital investigations, you must have the right combination of forensic hardware and software at your disposal. OpenText™ EnCa ...
    • Forensics
    Tides 1/2
    The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can delete internet history, cookies, caches, and temporary files. Among the destruction of Internet artifacts ...
    • Forensics
    Oleander A
    Increasing public scrutiny around the privacy implications of mobile OSes like iOS and Android means that changes will come to those OSes to meet customer demand. Those changes will make it harder to ...
    • Information Security
    Oleander B
    The unfortunate fact is that most organizations will be compromised -- and after being compromised attackers will successfully exfiltrate stolen data. The methods used to remove this data are usually ...
    • Cellebrite Lab
    Atlantic 1
    The United States Supreme Court held that individuals have a reasonable expectation of privacy in regards to their historical cell site location records that were collected from a third party. This se ...
    • Audit/Risk Management
    Atlantic 3
    This interactive session will focus on the California Consumer Privacy Act going into effect 01/01/2020, and any changes that occurred since its unanimous passing. The presenter will discuss: Key part ...
    • Sponsor Demo
    Heron
    Technological advancements won’t wait for investigators to catch up. If you are going to do your job, you need tools that push the envelope and keep you ahead of the curve. With the massive and ever-g ...
    • Magnet Forensics Lab
    Atlantic 2
    Almost any type of investigation can benefit from timeline analysis to help understand what the user or the system did during a given incident. Whether you’re trying to understand how a suspect distri ...
    • Information Security
    Oleander B
    This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems will be explained ...
    • Investigations
    Tides 1/2
    Legal qualifications of any investigator, like a digital forensics examiner, to testify as an expert witness in state or Federal courts in civil or criminal cases have evolved since the landmark 1923 ...
    • Forensics
    Oleander A
    One of the most popular new ways people communicate in cybersapce today is via the emoji. This is particularly true in the mobile digital space. Studies have revealed that many young people communicat ...
    • Investigations
    Tides 1/2
    This session will show you step-by-step how to use free tools and the Chrome web browser to extract data from webpages and social media accounts. You will learn how to load Chrome extensions and navig ...
    • Information Security
    Atlantic 3
    An overview of current threats and trends in Cyber Security along with an explanation of Cyber Services offered by DHS to assist critical infrastructure with defense strategies. Attendees will underst ...
    • Information Security
    Oleander B
    This session will focus on introducing Malware Analysis and Reverse Engineering. The idea is to give the audience a broad understanding about the malware functionalities, the process of analysis and t ...
    • Forensics
    Oleander A
    This session will provide attendees with an introduction into chip-off forensics. The presenter will share how to recognize and understand different chip designs, identify the correct chip for removal ...
    • Magnet Forensics Lab
    Atlantic 2
    The combination of GrayKey and Magnet AXIOM has dramatically changed the way law enforcement conducts investigations on iOS devices. Just a short time ago, the statement, “I don’t know the passcode” m ...
    • Sponsor Demo
    Heron
    : System files may tell you a lot about the user or malware actions on a computer or a laptop. They may give you a hint about deleted files, opened documents, computer reboot or malware persistence. I ...
    • Sponsor Demo
    Osprey
    Learn how to acquire immediate digital evidence in the field.
    • Cellebrite Lab
    Atlantic 1
    Come see the power of Cellebrite as we unveil our on-premise iOS and Advanced Android solution. As part of our Digital Intelligence Platform, we will show how you can unlock and extract iOS data to ac ...
    • Cellebrite Lab
    Atlantic 1
    An in-depth analysis of how advanced analytics can improve your investigative process and why analytics is a required tool in today’s digital investigations. With the increasing amount of data in the ...
    • Sponsor Demo
    Heron
    Organize your digital forensic case data with xBit, the digital case management solution built to simplify the task of cataloging information unique to the digital forensic investigator.
    • Magnet Forensics Lab
    Atlantic 2
    "We’ve passed the early stages of digital forensics. The early processes and methods that we initially developed still have their place, but technology has exploded past that point. This is the time t ...
    • Information Security
    Tides 1/2
    Cyber supply chain security is the identification of risks involving vendors, suppliers, partners and other related entities which can impact the security of your organization or products. Even though ...
    • Forensics
    Oleander B
    Most modern web browsers offer private browsing modes, but how private are they? This session will review the privacy offered by these features. The presenter will discuss the results of research he c ...
    • Audit/Risk Management
    Atlantic 3
    Auditing the many cyber defense technologies currently being deployed to defend organizations against cyber-attack is extremely challenging, whether your organization is public, private or governmenta ...
    • Investigations
    Oleander A
    During this interactive panel discussion led by Wisconsin Circuit Court Judge Mark McGinnis, attendees will learn about common challenges that arise during judicial proceedings as to the admissibility ...
    Moderator: Panelists:
    • Cellebrite Lab
    Atlantic 1
    In 2017 the Norwalk Police Department was called to investigate the suspicious death of Kadeelyn Konstantino. As the investigation unfolded, investigators and prosecutors were able to locate evidence ...
    • Magnet Forensics Lab
    Atlantic 2
    Westchester County District Attorney's Office needed more with regard to tracking evidence, data, assets, and collaborating with non-technical stakeholders. They required a solution that understood th ...
    • Forensics
    Atlantic 3
    In addition to addressing the date irregularities that occur when unzipping files we will delve into the structure to understand why some zip files use modified dates as created dates. This session wi ...
    • Information Security
    Tides 1/2
    Threat Intelligence isn't about having a sea of honeypots, raw source feeds of bad IP addresses, domains & hashes, or log files -- we already have that; it's about taking that data, turning it into in ...
    • Forensics
    Oleander B
    Increasingly, drug dealers and child abusers are using darknet anonymising technologies to peddle their wares and collaborate with like minded individuals. In many cases, this entirely thwarts law enf ...

2019 Sponsors


QUOTE

  • Fantastic conference loaded with valuable information, powerful resources, and networking opportunities. A unique Cybersecurity and Digital Forensics unparalleled platform.
    Orit D. Gruber, Chief CLT, College of Staten Island
  • It was another great Techno event for us, we had fantastic booth traffic, thank you! As always, we saw a great mix of very important current customers and some good new prospects. We signed on for Techno Security & Digital Forensics Conference in California because we expect the usual excellent “Techno” results.
    John Graham, Director of Sales and Business Development, Atola Technology
  • I have participated in the Techno Security & Digital Forensics Conference since 2011 and highly recommend it to anyone in the DFIR community considering attending in the future. I experienced an immediate return on investment after the first day’s training sessions. The personal interaction and professional training available at the Techno Security & Digital Forensics Conference is simply the best in the industry.
    Will Baggett, DFIR Analyst, R. W. Grant Consulting
  • Thanks for a great event. I can't thank you enough for the quality of the event and staff. We generated more solid leads at this event than any other we have attended this year. Thanks for going the extra mile it's always a pleasure to work with you. Look forward to seeing you in San Antonio!
    Jason Roslewicz, Chief Executive Officer, Sumuri
  • The Techno Security & Digital Forensics is an incredible conference for everyone form security practitioners to forensics experts. The breadth and diversity of information shared at the conference gives all attendees an opportunity to leave the conference educated or at least exposed to a variety of security disciplines. I would recommend this conference to anyone from the curious to those seeking to further their education and knowledge base in the industry.
    Brian Bannister, Chief Information Security Officer, S.C. Department of Health and Environmental Con

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE