San Diego, CA

October 25-27, 2021

Hilton La Jolla Torrey Pines

Hero Default

hero__default

2021 Conference Program

The 2021 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, October 25, 2021
    • Investigations
    Grande D
    Course will briefly discuss the containment model, leveraging resources, emerging trends in child sexual abuse material, field searching (including digital evidence gathering techniques and tools), Em ...
    • Forensics
    Scripps II
    This presentation and demo will discuss the various objects and processes that can be found in a memory capture to help identify the existence of malware. Using open source tools the demonstration por ...
    • Investigations
    Scripps I
    Electronic information is central to the investigation and prosecution of crimes. This session will focus on “hot topics," including reasonable expectations of privacy, the applicability of the Fifth ...
    • Forensics
    Grande E
    With the amount of data being stored on today's vehicles, the challenge is how to properly harness it for your investigations. Knowing how and when it is generated, is critical when using it as key ev ...
    • Sponsor Demo
    Shore
    The rapid push towards globalization means the data relevant to investigations is being generated in many languages. The majority of the world doesn’t speak/write English as their first or native lang ...
    • Forensics
    Grande E
    Many applications today store data in SQLite databases from Android to iOS to even IoT. We will explore how data is stored in SQLite and how to recover data from these databases. We will discuss the b ...
    • Information Security
    Scripps I
    Cybersecurity professionals are all too familiar with the cliché that the weakest link in an organization are the people who work for and with the company. According to the 2019 Verizon Data Breach an ...
    • Information Security
    Scripps II
    Quantum computing promises significant breakthroughs that benefit all humankind in science, medicine, financial services, and more. But what does quantum computing mean for data security and digital f ...
    • Sponsor Demo
    Shore
    My technical background started back in 2000 working at various positions from Helpdesk, Desktop Support to system administrations. In 2014 I started at EnCase as an entry level in Technical Support d ...
    • Forensics
    Grande E
    Join John Day from the SUMURI Software Team for a discussion on the latest shake-up to the Mac Forensics world. With the release of Apple’s new proprietary processors, Mac Forensics is faced with its ...
    • Sponsor Demo
    Canyon
    With posts and comments on social media playing a larger role in investigations, the need to collect and analyze that data has also grown. Social media data can provide timely evidence to an ongoing i ...
    • Investigations
    Scripps II
    Does your case involve digital data? In 2021, almost every case does. Learn how to ensure the digital data you collect does not get thrown out. Under PC 1546, California has very unique and specific r ...
    • Audit/Risk Management
    Grande D
    With the proliferation of digital evidence now involved in crimes and investigations, traditional evidence rooms are no longer capable of accommodate the need to manage digital evidence. Policing orga ...
    • Information Security
    Scripps I
    A key function for cyber leaders is developing and improving the technical proficiency of their teams. Although there are some great training and certification paths, they can be expensive and require ...
    • Sponsor Demo
    Shore
    Learn the best and most effective use cases for utilizing the Datapilot 10(DP10). Highlights of the course will cover on site evidence extractions from cell phones, capturing evidence from cloud sourc ...
    • Forensics
    Grande D
    In corporate environment doing digital forensic investigations and incident response is not an easy task. Local networks consist of hundreds if not hundreds of thousands of computers, laptops and even ...
    • Forensics
    Scripps I
    Explore the digital forensics difficulties (and possible solutions) facing Law Enforcement & Military Operations. We will delve into options and methodologies used by these groups in order to learn ho ...
    • Information Security
    Scripps II
    We live in a world of constant attacks on our PCs, Mobile devices, and Networks. In 2020 alone there were more than 300 million Ransom attacks. The hackers are targeting major aspects of our economy: ...
    • Investigations
    Grande E
    **NO PRESS** Uber is one of the most widely used transportation companies in the world. While critical incidents and criminal activity involving Uber are a fractional percentage of overall trip volume ...
    • Sponsor Demo
    Shore
    This demo with focus on usage of SNH and how the tool is used to effective and efficiently conduct investigation and collect and evaluate data from social networks. SNH software is used to collect, an ...
    • Sponsor Demo
    Canyon
    Find CSAM 100x faster with Cyan Forensics’ suite of FAST, THOROUGH, and SIMPLE TO USE tools. Find out why these ‘game changing’ tools have been adopted by UK government for every police force in the U ...
Tuesday, October 26, 2021
    • Investigations
    Grande D
    Blockchain and Cryptocurrencies are digital technologies of the present, not the future. In your jurisdiction today, under the cloak of darkness, criminals are using tools designed for privacy and ano ...
    • Forensics
    Grande E
    Cloud Forensics has become a term that is used to mean many things. In this talk we will focus on both how to leverage cloud infrastructure to conduct forensic exams allowing for scaling as well as ac ...
    • Information Security
    Grande E
    App developers are building their software with anonymity and encryption top of mind, but when bad actors exploit these protections, investigators are becoming more often left in the dark on crucial p ...
    • Audit/Risk Management
    Scripps II
    There are numerous frameworks available for your organizations’ cybersecurity and privacy program but the latest of these has been provided by the US Government. There will be something for everyone t ...
    • Forensics
    Grande D
    The use of Drones is rapidly growing and expanding into criminal enterprises and terrorist organizations and news feeds are continually reporting on crimes being successfully prosecuted where UAV fore ...
    • Investigations
    Scripps I
    Companies are increasingly vulnerable to the pirating of Intellectual Property by current and former employees. Learn how to investigate and mitigate these risks based on a very common case study. See ...
    • Sponsor Demo
    Canyon
    In business, there’s a famous adage, ‘cash is king’. When it comes to digital forensics, there’s a new adage, ‘RAM is king’. With RAM, examiners can see exactly what users were doing at the time of ac ...
    • Sponsor Demo
    Shore
    FTK Central allows investigators to distribute the right artifacts to the right people to get the most out of every investigation quickly. FTK Central provides a browser-based review interface tailore ...
    • Forensics
    Grande D
    Participants will learn how to leverage and combine PowerShell, Python and Yara rules in order to perform live-triage of target systems for the presence of ransomware and other hostile threats. This s ...
    • Sponsor Demo
    Shore
    Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently ...
    • Information Security
    Grande E
    Mobile device usage for social media has increased to 91% of social channel accesses in 2018 according to Marketing Profs. Many technology thought leaders believe social networking will displace tradi ...
    • Audit/Risk Management
    Scripps II
    Data retention laws and policies aim to protect user privacy by establishing data retention duration and purging requirements. Thus, companies should destroy data that is no longer needed and must des ...
    • Sponsor Demo
    Canyon
    We live and breathe to exploit a device to get the data we want. What happens when the data we wanted wasn’t there to begin with? In this demo, we’ll learn to gather data from the next best source … t ...
    • Investigations
    Scripps I
    Forensics experts, incident responders and investigators all need to find the right stuff in their searches by using the right file comparisons, search and hashing methods. During this session, we’ll ...
    • Information Security
    Scripps I
    Abstract Proposal: Ransomware continues to challenge cybersecurity teams – and business continuity – globally, with shrinking dwell times and rising ransom demands. Attackers are steadily finding new ...
    • Audit/Risk Management
    Scripps II
    Didn’t catch our Techno Security session on the CCPA in March 2020? You’re in luck! No, we don’t have a time machine to go back to that session, but we have updated that presentation to reflect the ch ...
    • Information Security
    Grande E
    Cybercrime appears to be flourishing, with estimates that the cost to businesses globally is in excess of $6 trillion. Ransomware demands have reached unbelievable levels and companies are paying tens ...
    • Forensics
    Grande D
    With case backlogs increasing and the sheer volume of data examiners are facing, the risk of examiner burnout is on the rise. In response to the growing demands, some examiners are working more hours ...
    • Sponsor Demo
    Canyon
    This demo will take attendees through RECON LAB and RECON ITR, the only forensics solutions designed natively on the Mac platform to utilize the power of macOS. Gain access to over 270 timestamps and ...
    • Sponsor Demo
    Shore
    Backlogs in digital investigations are a growing problem that challenge examiners and investigators on a daily basis. With the growing amount of data collected - from devices of all types - the requir ...
    • Information Security
    Scripps II
    Threat modeling (which encompasses documenting trust boundaries, data flows, and risks to key assets) is a frequently overlooked security tool. By encompassing threat modeling techniques into security ...
    • Forensics
    Grande E
    Devices are getting more secure every year. To extract digital evidence from mobile devices investigators have to deal with screen locks as well as device encryption. In this session, we will speak ab ...
    • Sponsor Demo
    Canyon
    Data acquisition is the most crucial part in each digital forensics and incident response case. If you cannot acquire data, there is nothing to analyze. In our modern world, there can be multiple chal ...
    • Forensics
    Grande D
    Self-propagating ransomware evolved into attacker-driven ransomware; more recently, data exfiltration and extortion has been combined with the ransomware payload. A breach of third-party vendors holdi ...
    • Investigations
    Scripps I
    This will be an overview of the use of onsite mobile forensics during in-field operations targeting human trafficking. We will discuss the role of mobile forensics in conducting offender-focused inves ...
    • Sponsor Demo
    Shore
    a. Log files are a commonly used element of Incident Response, Criminal and Corporate investigations. Unfortunately, early in the process, no one really thought to standardize log formats, or they dec ...
    • Information Security
    Scripps II
    Right now, there are 500,000 open roles in cybersecurity, and we’re struggling to fill them. There are three main reasons for this: a lack of awareness, a lack of desire, and a lack of skills. In the ...
    • Forensics
    Grande D
    Parental control apps are prevalent whether in form of carrier-based trackers or third-party apps through the android and the iOS app stores. But at some point the boundary between naïve parental trac ...
    • Investigations
    Scripps I
    Abstract Proposal: Digital License Plates are here (and on the road) with an array of features, including GPS, Bluetooth, RFID and a Cellular Modem. The training will cover, in detail, the built-in te ...
    • Information Security
    Grande E
    With recent high profile attacks on critical infrastructure, the OT world is being forced to rethink decades of ineffective security posture and apathy. Under the specter of new executive orders, info ...
    • Sponsor Demo
    Canyon
    Attackers leverage Active Directory in nearly every breach, due to AD holding the Keys to the Kingdom. Most organizations are easy targets, as their AD does not get the attention that it needs and des ...
Wednesday, October 27, 2021
    • Investigations
    Scripps I
    Abstract Proposal: Passively monitoring network activity can discover rogue devices, aberrant behavior, and emerging threats, this method provides insights not available using traditional network scan ...
    • Investigations
    Grande E
    Coming off the heels of the U.S. Colonial pipeline incident, the cybersecurity community learned of the concept of Ransomware as a Service (RaaS). Last August, if you were to do a Google search into D ...
    • Forensics
    Grande D
    Traditional collection methods are limited, creating backlog and potentially jeopardizing access to time-sensitive data. This session will demonstrate modern approaches to digital forensics that enabl ...
    • Sponsor Demo
    Canyon
    This demo will be a detailed look at the Detego Forensics Platform’s tools for data triage, rapid imaging and data analysis from Windows, macOS and Linux computers. We will also be showcasing our mobi ...
    • Forensics
    Grande D
    Abstract Proposal: Digital forensics is a scientific investigation process in which computer artifacts, data points, and information are collected around a cyber-attack. This presentation will explain ...
    • Information Security
    Grande E
    After initial compromise of a device, Active Directory is leveraged in all of the recent ransomware attacks, making it the imminent target. Attackers exploit vulnerabilities and misconfigurations in d ...
    • Forensics
    Scripps I
    Google Takeouts can contain a wealth of information from a variety of devices using Google accounts. This can include data from Android devices, Chromebooks, Chrome Browser used on multiple devices, G ...
    • Sponsor Demo
    Canyon
    We are living in a digital world. Investigators & Analysts are faced with an enormous volume of data and digital evidence which requires filtering and analyzing. Pathfinder helps expedite the investig ...
    • Information Security
    Scripps I
    Abstract Proposal: Your organization can do everything right — but security incidents and data breaches still happen. As cyber attacks continue to increase, strict regulations like GDPR, HIPAA, and FE ...
    • Forensics
    Grande D
    One of the most important parts of any investigation is the report, and the story that report tells. Visualizations can help tell that story with great effect. SQLite databases are the most used datab ...
    • Investigations
    Grande E
    The Dark Web has become a household term synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the DarkWeb will slip up and eventually revea ...
    • Forensics
    Grande D
    DomainKeys Identified Mail (DKIM) and Authenticated Received Chain (ARC) are two of the most powerful tools in an email investigator's arsenal. The presenter will discuss how forensic examiners can ut ...
    • Investigations
    Grande E
    A Google reverse location search, commonly referred to as a geofence, is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives usin ...

2021 Sponsors

QUOTE

  • It was refreshing to be a part of such a high-quality conference. All of the exhibitors and attendees shared one common goal: to get our country in a better place. The conference brought a great sense of unison. We encountered government agencies that have an immediate need for a solution that our products offer. I am looking forward to the next event.
    Jerry Kaner, Founder, President and Chief Executive Officer (CEO), Ciphertex Data Security
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • As an academic, I attend Techno Security & Digital Forensics Conference to maintain a grasp on current trends as well as maintain networked relationships. No other conference makes those two things so readily available to me.
    Douglas A. Orr, Ph.D., Assistant Department Head, University of North Georgia
  • Like the other Techno Security & Digital Forensics Conferences, San Diego proved to be a success, with quality content and exceptional attendees from law enforcement and the private sector. Look forward to next year.
    Bill Teel, Owner, Teel Technologies
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare
  • Techno Security and Digital Forensics Conference has provided our company with a premier one-stop shop to the latest information, innovative technology, and networking we need to continually improve our solutions and services for our customers. It has been invaluable to our business' growth.
    Clayton D. Schilling, President and CEO, Precision Digital Forensics, Inc.

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More