San Diego, CA

March 9-11, 2020

Hilton La Jolla Torrey Pines

Hero Default

hero__default

2020 Conference Program

The 2020 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, March 09, 2020
    • Audit/Risk Management
    Scripps II
    Technology companies, long left largely unregulated, face a brave new world. Given growing concerns over data protection and cybersecurity, public scrutiny is increasing. As good corporate citizens, h ...
    • Forensics
    Grande D
    This session will educate investigators, law enforcement, and prosecutors on proper methods for the collection, preservation, and analysis of digital video evidence. With this knowledge, police and pr ...
    • Information Security
    Grande E
    As cyber risk continues to diversify and become more strategic, Cyber Security focus increases and evolves. Melting in a level of Cyber Resilience becomes more paramount. Establishing a risk driven fo ...
    • Investigations
    Scripps I
    Many phones are locked and inaccessible to lab personnel. Our engineers have used algorithms and gathered the most commonly used pincodes/passcodes for different forensic cases. Learn the most commonl ...
    • Sponsor Demo
    Shore
    Have a case that contains 100,000 images and you are literally looking for the needle in the haystack that happens to be a red needle? This is what today’s digital investigations have come to, often a ...
    • Sponsor Demo
    Canyon
    T3K, Law Enforcement's Global Partner presenting its AI solutions: LEAP: Law Enforcement Analytic Platform, for high-speed triaging and analysis of forensics images. Also applicable for border control ...
    • Sponsor Demo
    Shore
    Cellphone data plays an increasingly relevant role as evidence in many of the cases analysts support. This presentation is designed to provide an overview of more up-to-date methods of handling cellph ...
    • Sponsor Demo
    Canyon
    Blacklight 2019R3 brought some new and improved functionality and we will show some of the new features to help you in your investigations. What's New and Improved? • New Processing options to help tr ...
    • Audit/Risk Management
    Scripps II
    There are a number of frameworks available to base your organizations' cybersecurity on but the latest of these has been provided to us by the US Government. There will be something for everyone to le ...
    • Information Security
    Grande E
    Growth in Ransomware attacks are targeting both small and large organizations alike. The number of ransomware attacks has increased over 700% annually. The current approach of the attacker involves th ...
    • Investigations
    Scripps I
    The session will include a high-level overview of the FBI Next Generation Identification (NGI) System person-centric biometric modalities to include ten print, latent print, facial recognition and oth ...
    • Forensics
    Grande D
    More than half of data breaches reported by organizations are insider incidents — either through the inadvertent or the malicious misuse of data. As enterprises expand the use of cloud-based services ...
    • Forensics
    Grande D
    What does it take to bring a digital forensic lab into full accreditation status? The attendees will learn from the Director of a digital forensic lab that is currently undertaking international accre ...
    • Information Security
    Grande E
    t's Friday night "IR Night", 5pm and you get the call. After some initial information is collected, inevitably the next first step is to spin up an IR bridge. Rapidly the various teams join; incident ...
    • Forensics
    Scripps I
    Hear from the Apple experts how Catalina’s new organization of system verses user files may change investigative techniques. In addition, we’ll cover what users can expect to extract from unified logs ...
    • Audit/Risk Management
    Scripps II
    Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public perception demand that corporations disclose before even understand the issue. Three ...
    • Sponsor Demo
    Shore
    With the millions of applications available to users on Android devices, it becomes impossible for commercial tools to be able to parse and support them all. This makes it critical to understand how a ...
    • Sponsor Demo
    Canyon
    (in progress)
    • Sponsor Demo
    Shore
    See the new Tableau Forensic Imager (TX1) feature suite demonstrated, which spans advanced logical imaging, a remote Web interface, including forensic triage / file collection, user account management ...
    • Sponsor Demo
    Canyon
    : FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for acquiring only the evidence you need, instantly from digital devices. This hands-on demo will change your ...
    • Investigations
    Scripps II
    NOTE: This demo is for Law Enforcement only. Proof of identification will be required to attend. As technology evolves, so must law enforcement's approach to digital forensics. No longer can an invest ...
    • Forensics
    Grande D
    As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data, wh ...
    • Investigations
    Scripps I
    It seems that almost every day we hear reports of another cyber incident involving a data breach or ransomware attack impacting a business, school or local government. Cyber incidents are often the re ...
Tuesday, March 10, 2020
    • Keynote
    Grande D/E
    The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses as well as fake forens ...
    • Information Security
    Grande E
    Attendees will learn cybersecurity, privacy, civil liberty and safety threats associated with surveillance and data mining business practices employed by tech and telecom giants such as Google, Apple, ...
    • Sponsor Demo
    Shore
    Learn how to move your forensics lab to the cloudto reduce hardware and storage investment, enable remote collaboration and centralized correlation, and leverage Azure Cognitive Services like OCR, obj ...
    • Sponsor Demo
    Canyon
    (in progress)
    • Audit/Risk Management
    Scripps II
    Although California’s Consumer Privacy Act (CCPA) was intended to govern digital giants like Facebook, it will also impact small and medium-sized businesses. Effective Jan. 1, 2020, the sweeping digit ...
    • Forensics
    Grande D
    Mac investigations can be challenging for a number of reasons. Learn about the Apple File System (APFS) and the changes made as part of the update from HFS+, while discussing the best techniques for s ...
    • Forensics
    Scripps I
    Join Lyn Hinsch for the fundamentals of memory analysis using industry proven open source software tools such as Volatility and BulkExtractor. Learn how to download, install, and configure the tools o ...
    • Information Security
    Grande E
    This session will describe how to approach a professional web application penetration test, including where in the application to start, what kinds of tests to do, and how to know when to stop. The pr ...
    • Information Security
    Scripps I
    There is rarely a shortage of log files and other forms of evidence when threat hunting or conducting an IR investigation. Quite often there is more data than can be effectively reviewed. In this disc ...
    • Forensics
    Scripps II
    In recent years, digital forensics has undergone a major shift from primarily analyzing desktop computers to now investigating smartphones, tablets and other portable digital devices in almost every i ...
    • Sponsor Demo
    Canyon
    FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for acquiring only the evidence you need, instantly from digital devices. This hands-on demo will change your p ...
    • Sponsor Demo
    Shore
    Cybercrime provides its own unique challenges. Every case of fraud, workplace harassment, insider threats, identify theft, data exfiltration, IP theft, network intrusions, malware and ransomware attac ...
    • Forensics
    Grande D
    Trying to defeat encryption with a word list increases your odds of bypassing encrypted file(s). An overview of various tools will be presented that are used in the acquisition of data sets and the cr ...
    • Information Security
    Scripps II
    Industrial Control Systems (ICS) control the world we live in. The power grid, our water supply, sewage treatment, petrochemical refineries, mass transit, and manufacturing centers are just a few exam ...
    • Sponsor Demo
    Shore
    Cybercrime orchestration in the deep and the dark web is fueled by Cryptocurrency. In this session will demonstrate how to find Cryptocurrency wallet footprints over the deep and dark web and link it ...
    • Sponsor Demo
    Canyon
    This demo will take attendees through RECON LAB, the only full forensic suite designed natively onthe Mac platform to harness the power of a Mac. Access over 270 timestamps and all Apple Extended Meta ...
    • Forensics
    Scripps I
    The Windows 10 introduced a new feature named “Timeline” which has seen enhancements in subsequent updates to the Operating System in 2018 ~ 2020. This feature acts like a browser for all your recent ...
    • Investigations
    Grande D
    This session will explore the past and present for the Iranian cyber threat, from initial connection to the Internet to an up and coming operational cyber powerhouse. Topics covered will include an an ...
    • Information Security
    Scripps II
    There are commonly held beliefs about threat intelligence and how it solves defense in depth problems and cures security issues. Rarely does this take into account knowledge of ones own environment. T ...
    • Sponsor Demo
    Canyon
    One of today’s biggest challenges for investigators, forensic examiners and others is to sift through and make sense of the huge volumes of data found on mobile devices. Having tools that can recover ...
    • Sponsor Demo
    Shore
    Forensic Explorer - Command Line, (An Automated, Repeatable Forensic Processing to Eliminate the Backlog)
    • Forensics
    Grande D
    WhatsApp is, without a doubt, the most popular messenger in the world with over 1.5 billion users globally. Thus, extracting complete evidence from WhatsApp Messenger is essential for any investigatio ...
    • Forensics
    Scripps I
    Email evidence often plays a central role in legal proceedings, and fraudulent emails being passed as legitimate electronic evidence has become an increasingly common issue. Proving the authenticity o ...
    • Investigations
    Grande E
    The REACT task force in Santa Clara County, CA has spent the last 1 ½ years investigating, arresting and prosecuting SIM-swappers nationwide. This presentation will look at how the crime is committed, ...
    • Sponsor Demo
    Canyon
    You asked for it! Come see if the newest capabilities in Macquisition to include the new triage functionality! If you are a new user or thinking about using Macquisition, we will also show how to do a ...
    • Information Security
    Scripps I
    We are seeing change in the security product landscape, technologies like Machine Learning are being built to find the anomalous behaviors instead of relying on signatures to match on network packets. ...
    • Forensics
    Grande D
    Join Jason Roslewicz, CEO of SUMURI in a discussion on best practices for triaging Mac computers. As the security on Macs continues to increase the need to triage live in the field becomes more of a n ...
    • Forensics
    Scripps II
    Forensics groups in both law enforcement and industry are getting called on to perform more investigations into intrusion and cyber attack cases. These types of investigations require a different focu ...
Wednesday, March 11, 2020
    • Investigations
    Grande D
    Under the cloak of darkness, criminals are using tools for privacy and anonymity to commit a wide range of crimes on the Dark Web using Crypto Currency. During this session, attendees will learn some ...
    • Sponsor Demo
    Canyon
    Increase throughput and profitability with better tools. As data increases at an exponential rate, it is imperative to have the tools that keep pace with the workload and ever-increasing security thre ...
    • Investigations
    Scripps I
    Modern vehicles pack increasing amounts of connected sensors and features… which can be exploited by criminals to commit all sorts of old crimes in new ways. It is already happening, and law enforceme ...
    • Information Security
    Grande E
    Leading experts explore the latest trends and best practices in leveraging AI in the world of Cybersecurity and Forensics. Rick Grinnell, Founder, and Managing Partner, Glasswing Ventures, moderates a ...
    • Forensics
    Grande D
    According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users and these figures are expected to grow to 3.02 billion by 2021. In 2018, more than 77 percent of t ...
    • Audit/Risk Management
    Scripps II
    By 2020, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually. The question is what’s the best way to get the message ac ...
    • Forensics
    Grande D
    When completing a digital forensics investigation in a corporate setting, you're often working against the clock to deliver results to your executive stakeholders. Although hard work is important, the ...
    • Information Security
    Scripps II
    While the industry is focused almost entirely on software protection against cyber-attacks, one of the greatest threats resides in rogue or corrupt hardware devices that are present in almost every co ...
    • Investigations
    Scripps I
    Will be updated soon. Attendees can bring their own computer for the is kab. No special software or data files are required.
    • Information Security
    Grande E
    • Sponsor Demo
    Shore
    This session offers you a fundamental understanding of forensic video analysis. Get thinking about the material value of video evidence and the shortcomings if not properly trained to handle it. Also ...
    • Sponsor Demo
    Canyon
    Large scale investigations require a collaborative approach to examine data quickly and efficiently, which leads to improved productivity and workflows. Intella Connect provides a web-enabled, collabo ...
    • Sponsor Demo
    Canyon
    This presentation will explain how Grayshift is able to use its next generation access forensic tool called Graykey to bypass today’s locked iOS devices. Grayshift will explain why today’s iOS devices ...
    • Forensics
    Grande E
    The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can delete internet history, cookies, caches, and temporary files. Among the destruction of Internet artifacts ...
    • Investigations
    Scripps I
    In the last few years, mass casualty shootings have posed increasing threats and are rapidly becoming a global epidemic. With each attack inspiring other terrorists, or domestic extremists, these even ...
    • Information Security
    Scripps II
    Cyber supply chain security is the identification of risks involving vendors, suppliers, partners and other related entities which can impact the security of your organization or products. Even though ...
    • Forensics
    Grande E
    What do many of the top security breaches over the last few years have in common? Most of the victim enterprises spent millions of dollars on security, had SOCs, firewalls, IDFs and anti-virus systems ...
    • Forensics
    Scripps II
    Performing live memory analysis is an increasingly critical component in a forensic investigation. Existing solutions for obtaining an image of the system’s live memory (DRAM) require, however, access ...
    • Information Security
    Grande E
    Researchers at WitFoo in conjunction with The University of Chicago and representatives from Law Enforcement, US Military and Fortune 500 organizations conducted more than 2000 controlled experiments ...
    • Forensics
    Grande D
    The global impact resulting from the distribution of doctored digital photographs has reached an epidemic proportion. These digitally altered photos are distributed through social media, news outlets, ...
    • Information Security
    Scripps I
    Active Directory is the keystone for nearly every enterprise in the world. With this being said, it is constantly under attack, especially from inside the organization. Unfortunately the built-in capa ...

2020 Sponsors

QUOTE

  • The 2019 California Techno Security & Digital Forensics Conference was a fantastic opportunity to learn from some of today’s leaders in digital forensics. The seminars and materials available were excellent and I look forward to utilizing the tools and insights I learned. Thank you!
    Motti Gabler, Forensic Expert, National Center for Audio and Video Forensics
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • As an academic, I attend Techno Security & Digital Forensics Conference to maintain a grasp on current trends as well as maintain networked relationships. No other conference makes those two things so readily available to me.
    Douglas A. Orr, Ph.D., Assistant Department Head, University of North Georgia
  • Like the other Techno Security & Digital Forensics Conferences, San Diego proved to be a success, with quality content and exceptional attendees from law enforcement and the private sector. Look forward to next year.
    Bill Teel, Owner, Teel Technologies
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare
  • Techno Security and Digital Forensics Conference has provided our company with a premier one-stop shop to the latest information, innovative technology, and networking we need to continually improve our solutions and services for our customers. It has been invaluable to our business' growth.
    Clayton D. Schilling, President and CEO, Precision Digital Forensics, Inc.

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE