Pasadena, CA

September 11-13, 2023

Pasadena Convention Center

Hero Default

hero__default

Wednesday, October 12, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Information Security
    Grande E
    Phishing is a common technique that is used by adversaries to gain access to information and cause loss to the organization. Phishing has evolved and new tactics are emerging including replicating web ...
    • eDiscovery
    Scripps II
    Artificial intelligence (AI), however we define it, has arrived in civil and criminal litigation. AI can be used for various purposes, including proof of claims or defenses. AI can also be the subject ...
    • Investigations
    Grande D
    With Apple’s joining of the Bluetooth tracker market with the AirTag, their worldwide device network means that it’s easier than ever to track our items. However, what happens when someone slips an Ai ...
    • Forensics
    Scripps I
    In digital forensics investigations, there is an increasing need to examine memory acquired from servers and other computers. This presentation proposes using an open-source tool for rapid and detaile ...
    • Sponsor Demo
    Shore
    Digital Transformation and inter-agency sharing have become buzz words in the 20 years since the 9/11 Commission Report and, easier said than done for Law Enforcement adopting new practices and tools ...
    • Sponsor Demo
    Canyon
    While CCTV video and images are the most common and sought-after forms of evidence in investigations, their reliability is often called into question. The conversion, interpretation, restoration, enha ...
    • Information Security
    Scripps I
    Modernized applications and their evolving host environments pose several technical challenges to conventional cybersecurity context reconstruction and associated forensics. Distribution/decoupling ac ...
    • Audit/Risk Management
    Scripps II
    There are a number of frameworks available to base your organization’s cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. Attendees will learn: ...
    • Forensics
    Grande D
    Most examiners, no matter how skilled, dread testifying. Nonetheless, it is a necessary evil and the final work product for many cases. This session will cover how to properly prepare for and execute ...
    • Forensics
    Grande E
    A little-known database within iOS products can be a wealth of information and give the Digital Forensic Examiner a good idea of actual device usage to supplement your data sets. Learn from Grayshift ...
    • Sponsor Demo
    Canyon
    xBit Digital Case Management is designed with the user in mind, no need to enter data multiple times or struggle with a complicated workflow. Escape the need to use multiple spreadsheets to support yo ...
    • Sponsor Demo
    Shore
    Our experts are going to show you how radio technology can accelerate your investigations. The workshop will be based on Radio Forensics solutions offered by Vespereye. You can expect real cases, demo ...
    • Information Security
    Grande D
    Our world has entered into a new era where a large army of rogue cyber warriors have turned their skills sets and tools at Russia and its allies. This new era has exposed failures and shortcomings of ...
    • Audit/Risk Management
    Scripps II
    In this session, attendees will be engaged to think about how to access and define your cybersecurity strategy. Reflect on whether you have a framework or controls in place and how to handle audits an ...
    • Investigations
    Scripps I
    Ransomware attacks haven’t subsided despite efforts to shutdown major operational organizations. Defending against them in case an attack gets through your defenses require preparation – both technica ...
    • Investigations
    Grande E
    Collecting data across social media platforms can be complicated and expensive. Well, it doesn't have to be! You will get free ways to pull data from Twitter. Not just random tweets, but refined searc ...
    • Sponsor Demo
    Canyon
    Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
    • Sponsor Demo
    Shore
    As the adoption of digital assets grows, illicit actors are increasingly turning to cryptocurrencies like Bitcoin to facilitate a range of illicit activity in a borderless, rapidly evolving digital ec ...
    • Information Security
    Scripps I
    During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
    • Information Security
    Grande D
    Cyber threats impacting local governments have increased exponentially in the last few years. While no single organization can deter all cyber threats, the resources provided, at no-cost, by the MS-IS ...
    • eDiscovery
    Scripps II
    The exponential growth of cryptocurrency has brought Blockchain data front and center in the minds of eDiscovery professionals, investigators, and litigators. The distributed ledger technology (“DLT”) ...
    • Sponsor Demo
    Canyon
    Spreadsheets, Sharepoint, and Access databases just don’t cut it when you have a growing forensics team and workload – these are one-dimensional solutions to a multi-dimensional problem. If you’re rea ...

2022 Sponsors

QUOTE

  • We have been attending the Techno Security & Digital Forensic Conference since 1999. It is always the most well-run event we attend each year. The event management team is very professional and organized. They make the whole experience delightful.
    Michael Biggs, Director of Sales, Forensic Computers, Inc.
  • Techno Security is an awesome conference where you will mingle & network with amazing people while learning about the latest & greatest technology in your career field.
    Tamara Poelma, Program Manager of High-Tech Crimes & Surveillance Unit, State of California
  • As always, Techno Security continues to deliver high value content and conversations that propel the forensic industry forward and usher in both new forensic tools and ideas.
    Jeremy Kirby, Director of Sales, DATAPILOT
  • Outstanding event in San Diego. Excellent sessions delivered by experts in the field, great opportunity for discussions with participants, presenters and vendors, a beautiful venue along with a superb conference team.
    Chet Hosmer, Assistant Professor of Practice, University of Arizona
  • We had packed houses at our speaking slots and great booth traffic with many very high-quality visitors. The location was nice for the evening networking. Very smooth from move in to move out.
    Tim O’Rourke, VP Sales, Oxygen Forensics Inc.
  • A wonderful conference! I look forward to coming back again next year in San Diego. Having these regional Techno Security events is a great idea and allowed me and others in the West to attend.
    Rob Burton, IS Security Analyst, Forensics and eDiscovery Team, Intermountain Healthcare

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More