Myrtle Beach, SC

June 2-5, 2019

Marriott Resort at Grande Dunes

Hero Default

hero__default

Wednesday, June 5, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Wednesday, June 05, 2019
    • Forensics
    Oleander A
    The phenomena of Fake Photos, Audio recordings, and Video have become viral. Just one example according to the Washington Post (2017), “following an attack on the London Bridge that killed eight peopl ...
    • Information Security
    Oleander B
    This isn’t a talk about best practices or how to configure your system. It’s designed to get into the mindset of a motivated, equipped adversary who wants to get in to a system or application, specifi ...
    • Magnet Forensics Lab
    Atlantic 2
    Mac investigations can be challenging for a number of reasons. Learn about the Apple File System (APFS) and the changes made as part of the update from HFS+, while discussing the best techniques for s ...
    • Audit/Risk Management
    Atlantic 3
    Today’s Internet connections are typically shielded by a Demilitarized Zone (DMZ), a critical CyberSecurity buffer zone between your organization’s internal network and the outside world. Firewalls, i ...
    • Investigations
    Tides 1/2
    Cryptocurrencies used extensively as key payment method of the underground economy and to facilitate many other forms of criminal activity including money laundering, child exploitation, and ransomwar ...
    • Cellebrite Lab
    Atlantic 1
    Learn about Cellebrite’s UFED Cloud Analyzer and how you can use it to recover forensically sound content, from more than 40 cloud applications and sources. We will describe how to export an account p ...
    • Information Security
    Oleander B
    US small businesses contributed over half the total $17 trillion GDP, and yet at least 61% of small to medium businesses have seen a cyber-attack and 60% of them go out of business within a year after ...
    • Magnet Forensics Lab
    Atlantic 2
    While the recovery of essential data from your evidence is paramount, presenting that data can be just as important. Examiners are used to looking at raw, unstructured data to piece together valuable ...
    • Forensics
    Oleander A
    The Windows 10 April 2018 update (1803) introduced a new feature named “Timeline” which has been further enhanced in subsequent updates to the Operating System in late 2018 and early 2019. This featur ...
    • Forensics
    Oleander A
    After attending this session, attendees will have an enhanced understanding of how smartwatch wearable devices with cellular network capability interact with companion mobile phones and where sensitiv ...
    • Cellebrite Lab
    Atlantic 1
    An in-depth analysis of how advanced analytics can improve your investigative process and why analytics is a required tool in today’s digital investigations. With the increasing amount of data in the ...
    • Forensics
    Oleander B
    Existing law enforcement tools to collect evidence from mobile devices are designed based on the assumption that the device in question has been legally taken from the alleged perpetrator of a crime b ...
    • Information Security
    Atlantic 3
    Are you worried about the cybersecurity posture of your system, but not sure that you can sit through another dry RMF presentation? This may be just what you are looking for. The advent and implementa ...

2019 Sponsors


QUOTE

  • Fantastic conference loaded with valuable information, powerful resources, and networking opportunities. A unique Cybersecurity and Digital Forensics unparalleled platform.
    Orit D. Gruber, Chief CLT, College of Staten Island
  • It was another great Techno event for us, we had fantastic booth traffic, thank you! As always, we saw a great mix of very important current customers and some good new prospects. We signed on for Techno Security & Digital Forensics Conference in California because we expect the usual excellent “Techno” results.
    John Graham, Director of Sales and Business Development, Atola Technology
  • I have participated in the Techno Security & Digital Forensics Conference since 2011 and highly recommend it to anyone in the DFIR community considering attending in the future. I experienced an immediate return on investment after the first day’s training sessions. The personal interaction and professional training available at the Techno Security & Digital Forensics Conference is simply the best in the industry.
    Will Baggett, DFIR Analyst, R. W. Grant Consulting
  • Thanks for a great event. I can't thank you enough for the quality of the event and staff. We generated more solid leads at this event than any other we have attended this year. Thanks for going the extra mile it's always a pleasure to work with you. Look forward to seeing you in San Antonio!
    Jason Roslewicz, Chief Executive Officer, Sumuri
  • The Techno Security & Digital Forensics is an incredible conference for everyone form security practitioners to forensics experts. The breadth and diversity of information shared at the conference gives all attendees an opportunity to leave the conference educated or at least exposed to a variety of security disciplines. I would recommend this conference to anyone from the curious to those seeking to further their education and knowledge base in the industry.
    Brian Bannister, Chief Information Security Officer, S.C. Department of Health and Environmental Con

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE