San Diego, CA

October 10-12, 2022

Hilton La Jolla Torrey Pines

Hero Default

hero__default

Monday, October 10, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Forensics
    Grande E
    Pick the scenario … you have to prove or disprove something, and your proof is locked away in a phone. The phone is encrypted and locked when you power it on. What to do? Try an exploit? Brute force t ...
    • Audit/Risk Management
    Scripps II
    Abstract Proposal: Cyber threats continue to evolve in scale and complexity and have led to the loss of intellectual property, customer data, and other sensitive information across industries. Yet, or ...
    • Forensics
    Grande D
    This session will help you improve your workflow in today’s demanding child sexual abuse investigations. Caseloads of indecent images of children keep soaring; hence, investigators often lose sight of ...
    • Investigations
    Scripps I
    Collecting data across social media platforms can be complicated and expensive. Well, it doesn't have to be! You will get free ways to pull data from Twitter. Not just random tweets, but refined searc ...
    • Information Security
    Grande E
    When Russia attacked Ukraine, it started a series of alerts from government agencies warning of the possibility for devastating cyberattacks. When aimed at critical infrastructure these attacks have t ...
    • Investigations
    Scripps II
    Ransomware attacks haven’t subsided despite efforts to shutdown major operational organizations. Defending against them in case an attack gets through your defenses require preparation – both technica ...
    • Forensics
    Grande D
    Corporations are faced every day by insider and outsider threats and the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. While Zero Trust Netw ...
    • Investigations
    Scripps I
    • Sponsor Demo
    Canyon
    Part 1 of 2: Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place ...
    • Forensics
    Grande D
    Digital forensic investigators generally struggle with the extraction of evidence from mobile devices when it comes to encrypted, third-party applications such as Signal, Wickr, and Telegram. These ap ...
    • Information Security
    Scripps I
    Hackers are becoming more sophisticated with how they attack. The speed at which they can compromise an organization and cause significant damage has increased exponentially over the years. Unfortunat ...
    • Information Security
    Grande E
    Threats are accelerating, IOT, Social Engineering, bad actor sophistication, and advanced tooling against targets. We’ll review the top attack vectors, the impact of advanced security approaches, and ...
    • eDiscovery
    For years, the trend in eDiscovery has been to collect everything first and sort it out later. However, as people produce more and more data, this strategy is increasingly unsustainable. With some leg ...
    • Sponsor Demo
    Demo details in progress
    • Forensics
    Scripps II
    As recent cases have shown, video evidence is becoming more prevalent. As such, understanding what is happening, the timing of events, and even the speed of a vehicle have increasingly relied upon vid ...
    • Information Security
    Grande E
    Quantum Computing (QC) is not yet a reality, but advanced preparation is imperative to properly protect sensitive information because the world's Cryptography standards are challenged by QC. While pos ...
    • Forensics
    Grande D
    According to Statista.com in 2020, the global social penetration rate reached 49 percent. Many technology thought leaders believe social networking will displace traditional email as the leading commu ...
    • Information Security
    Scripps I
    Information Security Systems depend on identity and access management (IAM). As remote work becomes the norm, more companies are susceptible to breaches due to employees inadvertently accessing fake w ...

2022 Sponsors

QUOTE

  • We have been attending the Techno Security & Digital Forensic Conference since 1999. It is always the most well-run event we attend each year. The event management team is very professional and organized. They make the whole experience delightful.
    Michael Biggs, Director of Sales, Forensic Computers, Inc.
  • Techno Security is an awesome conference where you will mingle & network with amazing people while learning about the latest & greatest technology in your career field.
    Tamara Poelma, Program Manager of High-Tech Crimes & Surveillance Unit, State of California
  • As always, Techno Security continues to deliver high value content and conversations that propel the forensic industry forward and usher in both new forensic tools and ideas.
    Jeremy Kirby, Director of Sales, DATAPILOT
  • Outstanding event in San Diego. Excellent sessions delivered by experts in the field, great opportunity for discussions with participants, presenters and vendors, a beautiful venue along with a superb conference team.
    Chet Hosmer, Assistant Professor of Practice, University of Arizona
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More