San Diego, CA

October 10-12, 2022

Hilton La Jolla Torrey Pines

Hero Default

hero__default

Tuesday, October 11, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Keynote
    Grande D/E
    In progress
    • Investigations
    Grande D
    This session will walk the participants through Business Email Investigations and give them a high-level understanding of how to work this type of investigation.
    • Information Security
    Grande E
    Breaches are on the news seemingly weekly, as organizations are struggling to secure their data. Phishing attacks are proliferating & compromising our workforce. Ransomware has taken several victims a ...
    • Audit/Risk Management
    Scripps II
    Every company in the world has been negatively impacted one way or another by a cyber security breach that has occurred within their supply chain. Organizations have started spending more time and res ...
    • Forensics
    Scripps I
    Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
    • Sponsor Demo
    Canyon
    Part 2 of 2: iOS forensics has been a hot topic over the last few years, especially with the release of iOS 15. Apple is constantly strengthening its security measures of their devices. This was desig ...
    • Sponsor Demo
    Demo details in progress.
    • Information Security
    Grande E
    Current challenges, volumes of events, staffing shortages, expertise deficiencies, siloed security controls, providing statistics from recent Ponemon Institute reports including the recent Cost of a D ...
    • eDiscovery
    Scripps II
    We are all familiar with emojis. They are present in emails, text messages, social media, and virtually every online modality. According to emojipedia.com, over one in five tweets includes an emoji (2 ...
    • Forensics
    Grande D
    This session will l examine the most common browser artifacts that can be examined to support an investigation. History, Cookies, Cache files and other stored items, such as personal user information ...
    • Forensics
    Scripps I
    A little-known database within iOS products can be a wealth of information and give the Digital Forensic Examiner a good idea of actual device usage to supplement your data sets. Learn from Grayshift ...
    • eDiscovery
    Scripps I
    Digital forensic examiners often dive deep into the evidence to find all the details necessary to prove or disprove a theory. They are often asked to support E-Discovery cases but either do not want t ...
    • Forensics
    Grande D
    Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
    • Information Security
    Grande E
    During this session the speaker will share how across two million IOT devices he identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. This s ...
    • Information Security
    Scripps II
    This session will highlight cybersecurity, intelligence and privacy threats posed by unrestricted hybrid warfare that is being waged by China, Russia, North Korea, Iran and other bad actors. The sessi ...
    • Sponsor Demo
    Demo details in progress
    • Forensics
    Grande E
    This session will explore the different Darknets commonly used for criminal activity and how data is transferred across these networks. The presenter will describe how these networks are accessed and ...
    • Investigations
    Scripps II
    Drawing from high-profile examples in the private and public sectors, this session will examine how investigators can streamline social media investigations. It will discuss how they can work with soc ...
    • Forensics
    Grande D
    Despite a valiant effort, the phone is still locked or under attack, but you need information now. Time to escalate. In this session, we’ll go after computer and cloud account data to gather the evide ...
    • Information Security
    Scripps I
    CISA presentation in development
    • Information Security
    Grande E
    Attackers don’t think in lists and spreadsheets. Attackers rely at paths, AKA attack paths. “How can I get here to there?” During this session, the speaker will describe how attackers compromise, enum ...
    • Forensics
    Grande D
    Have you ever wondered how vacuum bots work under the hood? How safe is your home’s floor plan that these bots automatically scan? This session will walk you through a step-by-step procedure on how yo ...
    • Investigations
    Grande E
    In a post-pandemic world, more and more organizations are moving to the cloud. Due to this rapid migration, we have also observed an influx of cloud-based breaches that we have been requested to inves ...
    • Forensics
    Scripps II
    Most forensic practitioners in the criminal investigation and private sector DFIR spaces are familiar with the acquisition, parsing, and reporting of text messages from iOS devices. Messages are prese ...

2022 Sponsors

QUOTE

  • We have been attending the Techno Security & Digital Forensic Conference since 1999. It is always the most well-run event we attend each year. The event management team is very professional and organized. They make the whole experience delightful.
    Michael Biggs, Director of Sales, Forensic Computers, Inc.
  • Techno Security is an awesome conference where you will mingle & network with amazing people while learning about the latest & greatest technology in your career field.
    Tamara Poelma, Program Manager of High-Tech Crimes & Surveillance Unit, State of California
  • As always, Techno Security continues to deliver high value content and conversations that propel the forensic industry forward and usher in both new forensic tools and ideas.
    Jeremy Kirby, Director of Sales, DATAPILOT
  • Outstanding event in San Diego. Excellent sessions delivered by experts in the field, great opportunity for discussions with participants, presenters and vendors, a beautiful venue along with a superb conference team.
    Chet Hosmer, Assistant Professor of Practice, University of Arizona
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More