San Diego, CA

March 9-11, 2020

Hilton La Jolla Torrey Pines

Hero Default

hero__default

2020 Conference Program

The 2020 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, March 09, 2020
    • Forensics
    Grande D
    This session will educate investigators, law enforcement, and prosecutors on proper methods for the collection, preservation, and analysis of digital video evidence. With this knowledge, police and pr ...
    • Investigations
    Scripps I
    Many phones are locked and inaccessible to lab personnel. Our engineers have used algorithms and gathered the most commonly used pincodes/passcodes for different forensic cases. Learn the most commonl ...
    • Sponsor Demo
    Shore
    Have a case that contains 100,000 images and you are literally looking for the needle in the haystack that happens to be a red needle? This is what today’s digital investigations have come to, often a ...
    • Sponsor Demo
    Canyon
    T3K, Law Enforcement's Global Partner presenting its AI solutions: LEAP: Law Enforcement Analytic Platform, for high-speed triaging and analysis of forensics images. Also applicable for border control ...
    • Information Security
    Scripps II
    In military parlance, a force multiplier can change the outcome of a battle or a war. In the world of cybersecurity, the advent of machine learning (notably supervised machine learning) and artificial ...
    • Sponsor Demo
    Canyon
    Blacklight 2019R3 brought some new and improved functionality and we will show some of the new features to help you in your investigations. What's New and Improved? • New Processing options to help tr ...
    • Sponsor Demo
    Shore
    Cellphone data plays an increasingly relevant role as evidence in many of the cases analysts support. This presentation is designed to provide an overview of more up-to-date methods of handling cellph ...
    • Audit/Risk Management
    Scripps II
    There are a number of frameworks available to base your organizations' cybersecurity on but the latest of these has been provided to us by the US Government. There will be something for everyone to le ...
    • Information Security
    Grande E
    Growth in Ransomware attacks are targeting both small and large organizations alike. The number of ransomware attacks has increased over 700% annually. The current approach of the attacker involves th ...
    • Investigations
    Scripps I
    The session will include a high-level overview of the FBI Next Generation Identification (NGI) System person-centric biometric modalities to include ten print, latent print, facial recognition and oth ...
    • Forensics
    Grande D
    More than half of data breaches reported by organizations are insider incidents — either through the inadvertent or the malicious misuse of data. As enterprises expand the use of cloud-based services ...
    • Forensics
    Grande D
    What does it take to bring a digital forensic lab into full accreditation status? The attendees will learn from the Director of a digital forensic lab that is currently undertaking international accre ...
    • Forensics
    Scripps I
    Hear from the Apple experts how Catalina’s new organization of system verses user files may change investigative techniques. In addition, we’ll cover what users can expect to extract from unified logs ...
    • Audit/Risk Management
    Scripps II
    Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public perception demand that corporations disclose before even understand the issue. Three ...
    • Sponsor Demo
    Canyon
    Vehicles hold a vast amount of data that can be used to uncover critical information during an investigation and help determine what happened, where it occurred, and who was involved. The iVe Ecosyste ...
    • Sponsor Demo
    Shore
    With the millions of applications available to users on Android devices, it becomes impossible for commercial tools to be able to parse and support them all. This makes it critical to understand how a ...
    • Forensics
    Grande E
    When the size of a digital forensics investigation gets bigger, it gets more difficult to determine the scope and finalize the investigation in time. What about a digital forensics investigation which ...
    • Sponsor Demo
    Shore
    This talk will include demonstration of our capability to image a T2 equipped Apple device over the wire and discuss optimization of processing with Encase supported by some new architectures. These o ...
    • Sponsor Demo
    Canyon
    : FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for acquiring only the evidence you need, instantly from digital devices. This hands-on demo will change your ...
    • Investigations
    Scripps II
    NOTE: This demo is for Law Enforcement only. Proof of identification will be required to attend. As technology evolves, so must law enforcement's approach to digital forensics. No longer can an invest ...
    • Forensics
    Grande D
    As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data, wh ...
    • Investigations
    Scripps I
    It seems that almost every day we hear reports of another cyber incident involving a data breach or ransomware attack impacting a business, school or local government. Cyber incidents are often the re ...
Tuesday, March 10, 2020
    • Keynote
    Grande D/E
    The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses as well as fake forens ...
    • Information Security
    Grande E
    Attendees will learn cybersecurity, privacy, civil liberty and safety threats associated with surveillance and data mining business practices employed by tech and telecom giants such as Google, Apple, ...
    • Forensics
    Grande D
    Mac investigations can be challenging for a number of reasons. Learn about the Apple File System (APFS) and the changes made as part of the update from HFS+, while discussing the best techniques for s ...
    • Forensics
    Scripps I
    Join Lyn Hinsch for the fundamentals of memory analysis using industry proven open source software tools such as Volatility and BulkExtractor. Learn how to download, install, and configure the tools o ...
    • Audit/Risk Management
    Scripps II
    Although California’s Consumer Privacy Act (CCPA) was intended to govern digital giants like Facebook, it will also impact small and medium-sized businesses. Effective Jan. 1, 2020, the sweeping digit ...
    • Sponsor Demo
    Shore
    The advent of new, cost-effective acquisition tools like Datapliot, ADF, E3, and other products has made digital forensics easier and more affordable than ever before. Come see how your team can simul ...
    • Sponsor Demo
    Canyon
    With the recent partnership between BlackBag and Berla, investigators now have the ability to export a file to a proprietary format that can be opened in BlackLight, BlackBag’s flagship forensic tool ...
    • Sponsor Demo
    Shore
    Cybercrime provides its own unique challenges. Every case of fraud, workplace harassment, insider threats, identify theft, data exfiltration, IP theft, network intrusions, malware and ransomware attac ...
    • Forensics
    Grande D
    Trying to defeat encryption with a word list increases your odds of bypassing encrypted file(s). An overview of various tools will be presented that are used in the acquisition of data sets and the cr ...
    • Sponsor Demo
    Canyon
    FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for acquiring only the evidence you need, instantly from digital devices. This hands-on demo will change your p ...
    • Forensics
    Scripps I
    While the collection phase of legal discovery only consumes between 8-12% of each dollar spent on eDiscovery, it is increasingly becoming the most critical and complex task in the eDiscovery lifecycle ...
    • Forensics
    Scripps II
    In recent years, digital forensics has undergone a major shift from primarily analyzing desktop computers to now investigating smartphones, tablets and other portable digital devices in almost every i ...
    • Information Security
    Grande E
    This session will describe how to approach a professional web application penetration test, including where in the application to start, what kinds of tests to do, and how to know when to stop. The pr ...
    • Forensics
    Scripps I
    The Windows 10 introduced a new feature named “Timeline” which has seen enhancements in subsequent updates to the Operating System in 2018 ~ 2020. This feature acts like a browser for all your recent ...
    • Investigations
    Grande D
    This session will explore the past and present for the Iranian cyber threat, from initial connection to the Internet to an up and coming operational cyber powerhouse. Topics covered will include an an ...
    • Information Security
    Grande E
    A security issue occurs when a hacker gains unauthorized access to a system. Privacy issues, those involving the unwarranted access of private information, don't necessarily have to involve security b ...
    • Sponsor Demo
    Canyon
    This demo will take attendees through RECON LAB, the only full forensic suite designed natively onthe Mac platform to harness the power of a Mac. Access over 270 timestamps and all Apple Extended Meta ...
    • Sponsor Demo
    Shore
    Cybercrime orchestration in the deep and the dark web is fueled by Cryptocurrency. In this session will demonstrate how to find Cryptocurrency wallet footprints over the deep and dark web and link it ...
    • Sponsor Demo
    Shore
    Forensic Explorer - Command Line, (An Automated, Repeatable Forensic Processing to Eliminate the Backlog)
    • Sponsor Demo
    Canyon
    One of today’s biggest challenges for investigators, forensic examiners and others is to sift through and make sense of the huge volumes of data found on mobile devices. Having tools that can recover ...
    • Information Security
    Scripps II
    There are commonly held beliefs about threat intelligence and how it solves defense in depth problems and cures security issues. Rarely does this take into account knowledge of ones own environment. T ...
    • Forensics
    Grande D
    WhatsApp is, without a doubt, the most popular messenger in the world with over 1.5 billion users globally. Thus, extracting complete evidence from WhatsApp Messenger is essential for any investigatio ...
    • Forensics
    Scripps I
    Email evidence often plays a central role in legal proceedings, and fraudulent emails being passed as legitimate electronic evidence has become an increasingly common issue. Proving the authenticity o ...
    • Forensics
    Grande D
    Join Jason Roslewicz, CEO of SUMURI in a discussion on best practices for triaging Mac computers. As the security on Macs continues to increase the need to triage live in the field becomes more of a n ...
    • Sponsor Demo
    Canyon
    You asked for it! Come see if the newest capabilities in Macquisition to include the new triage functionality! If you are a new user or thinking about using Macquisition, we will also show how to do a ...
    • Forensics
    Grande E
    This session will discuss the process of forensics in the cloud. We will look at both AWS and Azure and will address secure communications, encryption, authentication, dynamic provisioning, evidence h ...
    • Forensics
    Scripps I
    The automotive industry is one of the leading industries in the world, topping 2.6 trillion dollars in annual sales. A modern day vehicle typically has 50-70 electronic control units (ECUs) or compute ...
Wednesday, March 11, 2020
    • Investigations
    Grande D
    Under the cloak of darkness, criminals are using tools for privacy and anonymity to commit a wide range of crimes on the Dark Web using Crypto Currency. During this session, attendees will learn some ...
    • Sponsor Demo
    Shore
    The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments agains ...
    • Sponsor Demo
    Canyon
    As computer technology advances, the amount of data being generated and stored worldwide is also increasing exponentially. Gone are the days when a forensic image harvested from a consumer computer on ...
    • Information Security
    Grande E
    Leading experts explore the latest trends and best practices in leveraging AI in the world of Cybersecurity and Forensics. Rick Grinnell, Founder, and Managing Partner, Glasswing Ventures, moderates a ...
    • Forensics
    Grande D
    According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users and these figures are expected to grow to 3.02 billion by 2021. In 2018, more than 77 percent of t ...
    • Investigations
    Scripps I
    Modern vehicles pack increasing amounts of connected sensors and features… which can be exploited by criminals to commit all sorts of old crimes in new ways. It is already happening, and law enforceme ...
    • Audit/Risk Management
    Scripps II
    By 2020, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually. The question is what’s the best way to get the message ac ...
    • Investigations
    Scripps I
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Ethereum, today's digital forensic ...
    • Sponsor Demo
    Shore
    This session offers you a fundamental understanding of forensic video analysis. Get thinking about the material value of video evidence and the shortcomings if not properly trained to handle it. Also ...
    • Information Security
    Grande D
    There is great promise, myths and confusion regarding Machine Learning (ML) and Artificial Intelligence (AI). This lecture and demonstration will introduce what machine learning is and how it can be a ...
    • Information Security
    Grande E
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Sponsor Demo
    Canyon
    Large scale investigations require a collaborative approach to examine data quickly and efficiently, which leads to improved productivity and workflows. Intella Connect provides a web-enabled, collabo ...
    • Sponsor Demo
    Canyon
    This presentation will explain how Grayshift is able to use its next generation access forensic tool called Graykey to bypass today’s locked iOS devices. Grayshift will explain why today’s iOS devices ...
    • Investigations
    Scripps I
    In the last few years, mass casualty shootings have posed increasing threats and are rapidly becoming a global epidemic. With each attack inspiring other terrorists, or domestic extremists, these even ...
    • Forensics
    Grande D
    What do many of the top security breaches over the last few years have in common? Most of the victim enterprises spent millions of dollars on security, had SOCs, firewalls, IDFs and anti-virus systems ...
    • Forensics
    Grande E
    The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can delete internet history, cookies, caches, and temporary files. Among the destruction of Internet artifacts ...
    • Keynote
    • Information Security
    Scripps I
    Active Directory is the keystone for nearly every enterprise in the world. With this being said, it is constantly under attack, especially from inside the organization. Unfortunately the built-in capa ...
    • Forensics
    Grande D
    The global impact resulting from the distribution of doctored digital photographs has reached an epidemic proportion. These digitally altered photos are distributed through social media, news outlets, ...
    • Information Security
    Grande E
    Researchers at WitFoo in conjunction with The University of Chicago and representatives from Law Enforcement, US Military and Fortune 500 organizations conducted more than 2000 controlled experiments ...

2020 Sponsors

QUOTE

  • The 2019 California Techno Security & Digital Forensics Conference was a fantastic opportunity to learn from some of today’s leaders in digital forensics. The seminars and materials available were excellent and I look forward to utilizing the tools and insights I learned. Thank you!
    Motti Gabler, Forensic Expert, National Center for Audio and Video Forensics
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • As an academic, I attend Techno Security & Digital Forensics Conference to maintain a grasp on current trends as well as maintain networked relationships. No other conference makes those two things so readily available to me.
    Douglas A. Orr, Ph.D., Assistant Department Head, University of North Georgia
  • Like the other Techno Security & Digital Forensics Conferences, San Diego proved to be a success, with quality content and exceptional attendees from law enforcement and the private sector. Look forward to next year.
    Bill Teel, Owner, Teel Technologies
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare
  • Techno Security and Digital Forensics Conference has provided our company with a premier one-stop shop to the latest information, innovative technology, and networking we need to continually improve our solutions and services for our customers. It has been invaluable to our business' growth.
    Clayton D. Schilling, President and CEO, Precision Digital Forensics, Inc.

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE