Sept. 30 - Oct. 2, 2019
   San Antonio, TX, USA

2018 Conference Program

2018 Conference Program

The 2018 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 17, 2018
    • Forensics
    Rio Grande West
    This session is designed for personnel within the forensic community on the proper identification, imaging, and forensic examination options of Apple File System (APFS) Macs. The presenters will addre ...
    • Forensics
    Rio Grande Center
    How can machine learning and artificial intelligence be leverage in a digital forensics investigation to help narrow results and find relevant information more quickly? From Child Exploitation, Hate C ...
    • Audit/Risk Management
    Regency East 1
    This session will explore General Data Protection Regulation (GDPR) data processors, the duties and responsibilities that are directly applicable and can be directly enforced. GDPR compliance is a sha ...
    • Information Security
    Rio Grande East
    According to Statista.com in 2017, 71 percent of Internet users worldwide were social network users and these figures are expected to grow. In 2016, more than 81 percent of the United States populatio ...
    • Sponsor Demo
    Guadalupe
    With all the applications available in the different marketplaces, Apple Store, Google Play, etc. It is impossible to have a tool support all of them. In this session we investigate what data can be f ...
    • Investigations
    Rio Grande West
    Bitcoin and other altcoins have been in the news almost daily lately. You may or may not be aware of what blockchain and/or cryptocurrencies are but news of the rapid increase of value, wild price flu ...
    • Forensics
    Rio Grande Center
    Cloud storage continues to grow in ease of use and popularity. Businesses use the cloud to store important collaborative documents; individuals use the cloud to store sentimental pictures. The conveni ...
    • Information Security
    Rio Grande East
    Red Team assessments are a great way to assess your companies security posture and maturity by simulating real-world scenarios that an adversary might take to potentially compromise information. How d ...
    • Audit/Risk Management
    Regency East 1
    All businesses are now cloud businesses, and every business is at risk for a cybersecurity incident regardless of size. This session will review the current threat landscape (who is trying to take you ...
    • Sponsor Demo
    Guadalupe
    This demo will focus on the main features of Lima for examiners; tackling continuity of evidence, automated reports and advanced features such as data indexing and operating in a paperless environment ...
    • Information Security
    Rio Grande East
    Phishing and other social engineering scams continue to proliferate and evolve with new hybrid attacks despite the best efforts of endpoint security and gateway solutions to block them. How do you kee ...
    • Sponsor Demo
    Guadalupe
    Learn how to correlate different artifacts with each other and see the connections that occur between artifacts and pieces of evidence data. See how users interact with their content by replicating th ...
    • Audit/Risk Management
    Regency East 1
    It isn’t just Classified Information anymore……there is now an ongoing and concerted effort to steal company Trade Secrets. Such trade secrets include proprietary technology, product prototypes, R&D, m ...
    • Forensics
    Rio Grande Center
    Unmanned Aerial Vehicle (UAV) also known as “drones” are currently being used to perpetrate numerous crimes around the world. Take a look at some of the different ways in which unmanned vehicles have ...
    • Information Security
    Rio Grande West
    As threat vectors continue to grow, the attack surfaces expand at exponential rates, with risks and costs continuing to rise with connectivity of IoT devices. This session will discuss the path to IoT ...
    • Information Security
    Rio Grande East
    Information security practices and technology are rapidly evolving. Security specialists are tasked to stay up to date on the current trends and to examine and implement integrated defenses that requi ...
    • Audit/Risk Management
    Regency East 1
    This session targets the shifting perspectives around Cybersecurity, as it relates to the changing role of incident response. Increased resiliency requires a forward and progressive shift in thought a ...
    • Forensics
    Rio Grande Center
    Digital forensics labs are facing an array of challenges and there is a need to work more effectively. Labs are handling an ever increasing amount of data; larger hard drives in computers, tablet comp ...
    • Forensics
    Rio Grande West
    The session will include a high level overview of the FBI Next Generation Identification (NGI) System person-centric biometric modalities to include ten print, latent print, facial recognition and oth ...
Tuesday, September 18, 2018
    • Sponsor Demo
    Medina
    In the ever-increasing world of electronic communications and cloud based synchronized data it has never been more important to apply good workflows in investigating email and other user artifacts dur ...
    • Forensics
    Rio Grande Center
    This session will delve into locating and extracting social media artifacts on mobile phones using available forensics tools, conducive to an investigation. Taking this knowledge, the session will the ...
    • Investigations
    Rio Grande West
    This session will discuss the necessity of the technology team communicating and collaborating with the traditional investigative team where information is passed between the work streams and electron ...
    • Audit/Risk Management
    Regency East 1
    The Privacy Landscape for America now includes GDPR and the NYDFS Cyber Security Regulation, and will include the California Consumer Privacy Act which will affect an estimated 500-600,000 businesses ...
    • Information Security
    Rio Grande East
    In this session, attendees will learn how the increased accuracy of facial recognition technologies will result in its becoming an important tool for law enforcement. The session will begin with a bri ...
    • Forensics
    Rio Grande West
    As an investigator, you know that every scene you arrive on there will be one or more digital devices that require investigation. You also know that simply collecting the devices and sending them to a ...
    • Audit/Risk Management
    Regency East 1
    Cybersecurity and Risk Management Cybersecurity decisions should be driven from a shared understanding of your organization's assets, threats, and vulnerabilities so that security investments address ...
    • Information Security
    Rio Grande East
    A look into the three most interesting cases of the year. Focusing on different types of attack strategies and investigations. The investigations to be explored include; One Incident Leads to Another ...
    • Forensics
    Rio Grande Center
    Every day we hear about drones around prisons, hauling drugs across borders, lingering around military installations, and much more. This is not on a US epidemic, but there are cases from around the g ...
    • Sponsor Demo
    Medina
    In this demo, the presenter will investigate a case scenario where an external attacker was able to phish an employee, steal their credentials, and obtain confidential documents that were used to comm ...
    • Sponsor Demo
    Guadalupe
    Showcasing the newest features of the WiebeTech® Ditto® DX drive imager – including new security lock/unlock and encryption/decryption features – will be forensic expert, Greg Dominguez of CRU®. He wi ...
    • Sponsor Demo
    Medina
    The hurdles in digital investigations are fierce: staggeringly large data sets that continue to grow in size, diversity, and complexity, combined with limited resources. AccessData is reimagining digi ...
    • Sponsor Demo
    Guadalupe
    Join us for an overview of the Falcon-NEO’s capabilities and learn how this next-generation imager can shorten the evidence collection process with superior speed and advanced features designed for se ...
    • Information Security
    Rio Grande East
    Join us for an interactive panel discussion led by some of today’s leading women in cybersecurity as they discuss; The latest emerging and current trends to impact the cybersecurity industry; Current ...
    Moderator: Panelists:
    • Forensics
    Rio Grande Center
    With mobile malware and spyware on the rise, Android is a target of 81% of attacks (2017). In this session, attendees will learn to identify and isolate malware from Android devices. Using several ope ...
    • Forensics
    Regency East 1
    Litigation happens. Realize it or not nearly every company has employees subject to legal hold ("custodians"). Is your preservation, collection, presentation and reporting function legally defensible? ...
    • Investigations
    Rio Grande West
    Of all the techniques used by digital forensic professionals, perhaps analysis of Wi-Fi communications is the most underutilized in the investigator's toolbox. This session will first establish a basi ...
    • Forensics
    Rio Grande Center
    As manufacturers continue to improve device security and encryption, we ask: Where will the most valuable data reside? What can you do to both acquire and analyze it effectively? The presenter will di ...
    • Information Security
    Rio Grande East
    Receive new ideas to quickly apply to your password cracking needs ranging from recovery of password-protected documents needed for forensics, IR, law enforcement, and legal cases, to improving passwo ...
    • Sponsor Demo
    Medina
    With over 500 million mobile apps, web sites and dark net sites active today and a growing shift towards cloud applications, investigators are finding that critical digital evidence often remains inac ...
    • Sponsor Demo
    Guadalupe
    How do you go back in time to review what happened on an APFS volume? In Apple’s latest file system, snapshots are now used to store the history of changes to files. In addition, the file system may b ...
    • Investigations
    Rio Grande West
    This session will focus on some manual methods of deobfuscating VBA (Visual Basic for Applications) macros and powershell macros which are often found in the course of investigations. The session will ...
    • Information Security
    Regency East 1
    Artificial Intelligence mixed with IOT provides data and analytics that can reduce response times and crimes with real-time data analytics, alerts and situational awareness. This session will share ho ...
    • Information Security
    Rio Grande West
    Recent major cyber security incidents have highlighted the fact that organizations don’t just need incident response plans, they need plans that work. Typical IR Plans can lead to poor information flo ...
    • Investigations
    Rio Grande East
    Blockchain technology is not only a disruptive new payment rail, but is also the next phase in the evolution of the Internet. This new technology presents unique investigative challenges for law enfor ...
    • Sponsor Demo
    Guadalupe
    New threats are facing the modern military, police, commercial and security services. We are pressured with tighter finances, manpower and, often hidden, time sensitive attacks. Front line digital exp ...
    • Forensics
    Rio Grande Center
    Doing an investigation involving smartphones can be a daunting task. Understanding all the ins and outs of the devices and the data they have access to can cause you a lot of geek level anxiety. This ...
    • Audit/Risk Management
    Regency East 1
    This interactive session examines how businesses can effectively assess their risk, identify gaps in security and address those gaps using the 20 critical controls as a guide. As each control needed i ...
    • Forensics
    Rio Grande Center
    Most agencies do not receive severely damaged mobile devices frequently enough to develop solid expertise in dealing with these devices. Early survey input suggests that most agencies receive a water ...
    • Information Security
    Rio Grande East
    In today’s digital world, it is more important than ever to ensure that your data is protected, especially with the rise of machine learning, also known as artificial intelligence (AI). Machine learni ...
    • Sponsor Demo
    Medina
    Susteen will showcase their new Field Acquisition Device, which can pull evidence data from cell phones in seconds!.. Including encrypted applications. This cutting edge new product works with your ot ...
    • Investigations
    Regency East 1
    One of the greatest threats to any company may be the person you least expect, your employee(s). Trusted insiders have access to all types of sensitive company information and are too familiar with yo ...
Wednesday, September 19, 2018
    • Audit/Risk Management
    Regency East 1
    The tension between security and innovation can result in underfunded security programs and mis-aligned priorities in security and functional teams within an organization. Even worse some organization ...
    • Information Security
    Rio Grande Center
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Investigations
    Rio Grande West
    Commercial tools make our jobs easier and are typically the first choice for investigators and first responders in live analysis situations, but can you really rely on them to work in every scenario y ...
    • Forensics
    Rio Grande East
    Cyber security and forensics is an area of strategic and policy interest to governments and enterprises globally, which results in an increase in the demand for cyber security and forensics profession ...
    • Forensics
    Rio Grande West
    Investigative journalist Barıs Pehlivan was accused by Turkish prosecutors of membership in a terrorist organization and imprisoned for over a year and a half, based entirely on forged documents recov ...
    • Information Security
    Rio Grande East
    Rapid developments in the field of artificial intelligence (AI) have resulted in a spate of new products and services. Without these advances, voice-based assistants like the Amazon Echo, Apple’s Siri ...
    • Sponsor Demo
    Rio Grande Center
    How can you support your lab to examine digital evidence for investigators as part of a case review process and also enable those same investigators the power to engage with the same digital evidence ...
    • Information Security
    Rio Grande East
    Penetration tests are a lot of fun, if you're the penetration tester. Far too often, defenders simply pay for penetration tests because they're either required or they don't know what else to ask for ...
    • Forensics
    Rio Grande West
    The macOS Spotlight desktop search system (built in since 10.4) facilitates fast file search on live systems by indexing a wealth of useful information from files, including extracted text and metadat ...
    • Forensics
    Rio Grande Center
    This session will cover the current state of USB device forensics on modern Windows operating systems and will examine methods to improve the process. The presenter will discuss how examiners can bett ...
    • Information Security
    Rio Grande East
    With so much information in Office 365 and people using their mobile devices to interact with that data, it's more important than ever to protect that information once it leaves the cloud and lands on ...
    • Investigations
    Rio Grande West
    This session will provide a thorough background on the realities of the dark web and will describe a specific methodology for conducting dark web investigations. This method is a step by step map to c ...
    • Forensics
    Regency East 1
    The challenges of an ever increasing data volume that forensic investigators in both private and public sectors are facing is only going to continue to increase over the projected future. As the world ...
    • Investigations
    Rio Grande West
    G Suite, a package of cloud-based services offered by Google has enhanced online productivity and collaboration. Furthermore, G Suite has allowed for enhanced administrative control through the admin ...
    • Information Security
    Rio Grande East
    The uniqueness of an IoT solution is that it merges together the physical aspect of a device and the software running on that device. And IoT security poses unique security, privacy, and compliance ch ...
    • Forensics
    Rio Grande Center
    Many of us regularly use Plaso (log2timeline) in our investigations. The shear amount of data that the tool produces can often be overwhelming. There are many methods to filter that data both from the ...
2018 Sponsors

2018 Sponsors


 

Testimonials
  • “The San Antonio Techno Security & Digital Forensics Conference was the first I attended. I was pleased with the presentations and as usual I learned something. It was also good for networking.”
    Loy Locke
    Detective, San Marcos Police Department
  • “For attending this conference for the first time, after always attending the ICAC conferences, the Techno Security conference is right up there with them.”
    Miguel Miranda
    Detective/Task Force Officer, Internet Crimes Against Children Unit, Metropolitan Police Department
  • “There was a vast amount of information, knowledge and expertise shared freely to those of us striving to learn more about the massive growing field of technology and the barriers that we face daily. Great conference!”
    Sherri Wallace
    Ardmore Police Department
  • “This is one great conference, and in the heart of Texas! I especially liked the combination of attendees and speakers, as it mixed corporate and sole practitioners with academia, and was heavily oriented toward forensics and cyber security with an appropriate mix of audit and compliance. The vendor mix was just right, and I appreciated the allowance for and appreciation of industry associations. I had several good takeaways, both in the form of ideas to pursue, and future friendships and partnering opportunities. There were also a good number of pithy workshops where the latest ideas were exchanged and an in-depth understanding of the subject area was achieved.”
    Harvey Nusz
    PwC Contractor - GDPR Specialist and President, ISACA Greater Houston Chapter