Pasadena, CA

September 11-13, 2023

Pasadena Convention Center

Hero Default

hero__default

2022 Conference Program

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, October 10, 2022
    • Forensics
    Grande E
    Pick the scenario … you have to prove or disprove something, and your proof is locked away in a phone. The phone is encrypted and locked when you power it on. What to do? Try an exploit? Brute force t ...
    • Audit/Risk Management
    Scripps II
    Abstract Proposal: Cyber threats continue to evolve in scale and complexity and have led to the loss of intellectual property, customer data, and other sensitive information across industries. Yet, or ...
    • Forensics
    Grande D
    This session will help you improve your workflow in today’s demanding child sexual abuse investigations. Caseloads of indecent images of children keep soaring; hence, investigators often lose sight of ...
    • Forensics
    Scripps I
    Docker is the latest in virtual machine technology and is being implemented worldwide by millions of companies to run various parts of their infrastructure. Docker is an OS-level virtualization platfo ...
    • Sponsor Demo
    Canyon
    This demo will share: - A quick overview of each tab in the Intella Desktop program and a brief description of each item and how it relates to a case or investigation. -Most common tools are demonstra ...
    • Sponsor Demo
    Shore
    This will be a case study of the investigation and apprehension of a prolific internet terrorist, but from the perspective of a small-town law enforcement officer. Hernandez was a very disciplined cyb ...
    • Information Security
    Scripps I
    FedRAMP is a government-wide program that promotes the adoption of secure cloud services across the federal government by providing a standardized approach to security and risk assessment for cloud te ...
    • Information Security
    Grande E
    When Russia attacked Ukraine, it started a series of alerts from government agencies warning of the possibility for devastating cyberattacks. When aimed at critical infrastructure these attacks have t ...
    • Forensics
    Grande D
    Corporations are faced every day by insider and outsider threats and the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. While Zero Trust Netw ...
    • Investigations
    Scripps II
    Digital Transformation and inter-agency sharing have become buzz words in the 20 years since the 9/11 Commission Report and, easier said than done for Law Enforcement adopting new practices and tools ...
    • Sponsor Demo
    Shore
    In this hands-on lab, you will activate a screen lock and secure a boot encryption password on a Samsung Galaxy device with an Exynos chipset. Then, experience the thrill of victory as you not only by ...
    • Sponsor Demo
    Canyon
    Part 1 of 2: Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place ...
    • Forensics
    Grande D
    Digital forensic investigators generally struggle with the extraction of evidence from mobile devices when it comes to encrypted, third-party applications such as Signal, Wickr, and Telegram. These ap ...
    • Information Security
    Scripps I
    Hackers are becoming more sophisticated with how they attack. The speed at which they can compromise an organization and cause significant damage has increased exponentially over the years. Unfortunat ...
    • Information Security
    Grande E
    Threats are accelerating, IOT, Social Engineering, bad actor sophistication, and advanced tooling against targets. We’ll review the top attack vectors, the impact of advanced security approaches, and ...
    • eDiscovery
    Scripps II
    For years, the trend in eDiscovery has been to collect everything first and sort it out later. However, as people produce more and more data, this strategy is increasingly unsustainable. With some leg ...
    • Sponsor Demo
    Shore
    Learn how to acquire evidence directly from Apple and Android wearable devices
    • Sponsor Demo
    Canyon
    Deep Fakes have heightened interest in video authentication. But can a Digital Video Recorder (DVR) be fooled into playing back fake footage? During this session, the presenter will share the attempts ...
    • Forensics
    Scripps II
    As recent cases have shown, video evidence is becoming more prevalent. As such, understanding what is happening, the timing of events, and even the speed of a vehicle have increasingly relied upon vid ...
    • Information Security
    Grande E
    Quantum Computing (QC) is not yet a reality, but advanced preparation is imperative to properly protect sensitive information because the world's Cryptography standards are challenged by QC. While pos ...
    • Forensics
    Grande D
    According to Statista.com in 2020, the global social penetration rate reached 49 percent. Many technology thought leaders believe social networking will displace traditional email as the leading commu ...
    • Information Security
    Scripps I
    Information Security Systems depend on identity and access management (IAM). As remote work becomes the norm, more companies are susceptible to breaches due to employees inadvertently accessing fake w ...
    • Sponsor Demo
    Canyon
    If rescuing more victims, or streamlining CSAM categorisation, is a priority for you, then this session is a must. The session will introduce you to S21 LASERi-X. Together, we will work through a mock ...
    • Sponsor Demo
    Shore
    Get a first-hand experience of Detego’s Unified Digital Forensics Platform and discover why it’s all you’ll need to rapidly carry out computer, mobile and network forensic investigations, anywhere. Se ...
Tuesday, October 11, 2022
    • Keynote
    Grande D/E
    Ever wonder what runs through the mind of a veteran cybersecurity professional after they sign off for the day? Join us for our keynote presentation from Mike Lettman, Cyber Security Advisor (DHS) and ...
    • Investigations
    Grande D
    This session will walk the participants through Business Email Investigations and give them a high-level understanding of how to work this type of investigation.
    • Information Security
    Grande E
    Breaches are on the news seemingly weekly, as organizations are struggling to secure their data. Phishing attacks are proliferating & compromising our workforce. Ransomware has taken several victims a ...
    • Audit/Risk Management
    Scripps II
    Every company in the world has been negatively impacted one way or another by a cyber security breach that has occurred within their supply chain. Organizations have started spending more time and res ...
    • Forensics
    Scripps I
    Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
    • Sponsor Demo
    Canyon
    Part 2 of 2: iOS forensics has been a hot topic over the last few years, especially with the release of iOS 15. Apple is constantly strengthening its security measures of their devices. This was desig ...
    • Sponsor Demo
    Shore
    If one thrill of victory wasn't enough, come back to this hands-on lab for more. In this lab, you will enact a checkra1n jailbreak of a live iPhone. This extraction will allow keychain access and the ...
    • Information Security
    Grande E
    Current challenges, volumes of events, staffing shortages, expertise deficiencies, siloed security controls, providing statistics from recent Ponemon Institute reports including the recent Cost of a D ...
    • eDiscovery
    Scripps II
    We are all familiar with emojis. They are present in emails, text messages, social media, and virtually every online modality. According to emojipedia.com, over one in five tweets includes an emoji (2 ...
    • Forensics
    Grande D
    This session will l examine the most common browser artifacts that can be examined to support an investigation. History, Cookies, Cache files and other stored items, such as personal user information ...
    • Information Security
    Scripps I
    During this session the speaker will share how across two million IOT devices he identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. This s ...
    • Sponsor Demo
    Canyon
    Cyacomb Forensics’ simple-to-use tools offer rapid digital triage at every stage of the process, from suspect examination to offender management. They empower law enforcement to make quick decisions, ...
    • Sponsor Demo
    Shore
    LE ONLY Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Staying ahead on the latest appl ...
    • eDiscovery
    Scripps I
    Digital forensic examiners often dive deep into the evidence to find all the details necessary to prove or disprove a theory. They are often asked to support E-Discovery cases but either do not want t ...
    • Forensics
    Grande D
    Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
    • Information Security
    Scripps II
    This session will highlight cybersecurity, intelligence and privacy threats posed by unrestricted hybrid warfare that is being waged by China, Russia, North Korea, Iran and other bad actors. The sessi ...
    • Investigations
    Grande E
    The "dark web" is something that harbors a stigma, especially when it comes to investigations. Often shrouded in mystery and mystique, investigating cases involving the dark web actually are not that ...
    • Sponsor Demo
    Shore
    Learn how to discover artifacts and seize digital assets
    • Sponsor Demo
    Canyon
    With the recent integration capabilities between Magnet and Berla, investigators can now import a proprietary iVe file format into Axiom and analyze it alongside other device data. In this session we ...
    • Forensics
    Grande E
    This session will explore the different Darknets commonly used for criminal activity and how data is transferred across these networks. The presenter will describe how these networks are accessed and ...
    • Investigations
    Scripps II
    Drawing from high-profile examples in the private and public sectors, this session will examine how investigators can streamline social media investigations. It will discuss how they can work with soc ...
    • Information Security
    Scripps I
    Building on the material covered in the keynote Cyber Security Advisor Mike Lettman (DHS) will take a deeper, more technical, dive into different types of attacks and the tools available to help you d ...
    • Forensics
    Grande D
    Despite a valiant effort, the phone is still locked or under attack, but you need information now. Time to escalate. In this session, we’ll go after computer and cloud account data to gather the evide ...
    • Sponsor Demo
    Canyon
    Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
    • Sponsor Demo
    Shore
    In this demo we will dig into the reality we have today with locked and encrypted phones, and how to get that full decrypted extraction we all want. We will investigate exploits that have served us we ...
    • Information Security
    Scripps I
    Attackers don’t think in lists and spreadsheets. Attackers rely at paths, AKA attack paths. “How can I get here to there?” During this session, the speaker will describe how attackers compromise, enum ...
    • Forensics
    Grande D
    Have you ever wondered how vacuum bots work under the hood? How safe is your home’s floor plan that these bots automatically scan? This session will walk you through a step-by-step procedure on how yo ...
    • Investigations
    Grande E
    In a post-pandemic world, more and more organizations are moving to the cloud. Due to this rapid migration, we have also observed an influx of cloud-based breaches that we have been requested to inves ...
    • Forensics
    Scripps II
    Most forensic practitioners in the criminal investigation and private sector DFIR spaces are familiar with the acquisition, parsing, and reporting of text messages from iOS devices. Messages are prese ...
    • Sponsor Demo
    Canyon
    Brief overview of ESET endpoint solutions, demoing endpoint management, endpoint protection, cloud sandbox technology and EDR (endpoint, detection and response)
    • Sponsor Demo
    Shore
    The world of technology is becoming more interconnected, whether it is between mobile phones, cloud servers, or wearable devices. Having all of these devices connected means that investigators now hav ...
Wednesday, October 12, 2022
    • Information Security
    Grande E
    Phishing is a common technique that is used by adversaries to gain access to information and cause loss to the organization. Phishing has evolved and new tactics are emerging including replicating web ...
    • eDiscovery
    Scripps II
    Artificial intelligence (AI), however we define it, has arrived in civil and criminal litigation. AI can be used for various purposes, including proof of claims or defenses. AI can also be the subject ...
    • Investigations
    Grande D
    With Apple’s joining of the Bluetooth tracker market with the AirTag, their worldwide device network means that it’s easier than ever to track our items. However, what happens when someone slips an Ai ...
    • Forensics
    Scripps I
    In digital forensics investigations, there is an increasing need to examine memory acquired from servers and other computers. This presentation proposes using an open-source tool for rapid and detaile ...
    • Sponsor Demo
    Shore
    Digital Transformation and inter-agency sharing have become buzz words in the 20 years since the 9/11 Commission Report and, easier said than done for Law Enforcement adopting new practices and tools ...
    • Sponsor Demo
    Canyon
    While CCTV video and images are the most common and sought-after forms of evidence in investigations, their reliability is often called into question. The conversion, interpretation, restoration, enha ...
    • Information Security
    Scripps I
    Modernized applications and their evolving host environments pose several technical challenges to conventional cybersecurity context reconstruction and associated forensics. Distribution/decoupling ac ...
    • Audit/Risk Management
    Scripps II
    There are a number of frameworks available to base your organization’s cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. Attendees will learn: ...
    • Forensics
    Grande D
    Most examiners, no matter how skilled, dread testifying. Nonetheless, it is a necessary evil and the final work product for many cases. This session will cover how to properly prepare for and execute ...
    • Forensics
    Grande E
    A little-known database within iOS products can be a wealth of information and give the Digital Forensic Examiner a good idea of actual device usage to supplement your data sets. Learn from Grayshift ...
    • Sponsor Demo
    Canyon
    xBit Digital Case Management is designed with the user in mind, no need to enter data multiple times or struggle with a complicated workflow. Escape the need to use multiple spreadsheets to support yo ...
    • Sponsor Demo
    Shore
    Our experts are going to show you how radio technology can accelerate your investigations. The workshop will be based on Radio Forensics solutions offered by Vespereye. You can expect real cases, demo ...
    • Information Security
    Grande D
    Our world has entered into a new era where a large army of rogue cyber warriors have turned their skills sets and tools at Russia and its allies. This new era has exposed failures and shortcomings of ...
    • Audit/Risk Management
    Scripps II
    In this session, attendees will be engaged to think about how to access and define your cybersecurity strategy. Reflect on whether you have a framework or controls in place and how to handle audits an ...
    • Investigations
    Scripps I
    Ransomware attacks haven’t subsided despite efforts to shutdown major operational organizations. Defending against them in case an attack gets through your defenses require preparation – both technica ...
    • Investigations
    Grande E
    Collecting data across social media platforms can be complicated and expensive. Well, it doesn't have to be! You will get free ways to pull data from Twitter. Not just random tweets, but refined searc ...
    • Sponsor Demo
    Canyon
    Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
    • Sponsor Demo
    Shore
    As the adoption of digital assets grows, illicit actors are increasingly turning to cryptocurrencies like Bitcoin to facilitate a range of illicit activity in a borderless, rapidly evolving digital ec ...
    • Information Security
    Scripps I
    During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
    • Information Security
    Grande D
    Cyber threats impacting local governments have increased exponentially in the last few years. While no single organization can deter all cyber threats, the resources provided, at no-cost, by the MS-IS ...
    • eDiscovery
    Scripps II
    The exponential growth of cryptocurrency has brought Blockchain data front and center in the minds of eDiscovery professionals, investigators, and litigators. The distributed ledger technology (“DLT”) ...
    • Sponsor Demo
    Canyon
    Spreadsheets, Sharepoint, and Access databases just don’t cut it when you have a growing forensics team and workload – these are one-dimensional solutions to a multi-dimensional problem. If you’re rea ...

2022 Sponsors

QUOTE

  • We have been attending the Techno Security & Digital Forensic Conference since 1999. It is always the most well-run event we attend each year. The event management team is very professional and organized. They make the whole experience delightful.
    Michael Biggs, Director of Sales, Forensic Computers, Inc.
  • Techno Security is an awesome conference where you will mingle & network with amazing people while learning about the latest & greatest technology in your career field.
    Tamara Poelma, Program Manager of High-Tech Crimes & Surveillance Unit, State of California
  • As always, Techno Security continues to deliver high value content and conversations that propel the forensic industry forward and usher in both new forensic tools and ideas.
    Jeremy Kirby, Director of Sales, DATAPILOT
  • Outstanding event in San Diego. Excellent sessions delivered by experts in the field, great opportunity for discussions with participants, presenters and vendors, a beautiful venue along with a superb conference team.
    Chet Hosmer, Assistant Professor of Practice, University of Arizona
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More