Denver, CO

August 2-4, 2021

Hilton Denver City Center

Hero Default

hero__default

2021 Conference Program

The 2021 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, August 02, 2021
    • Information Security
    Colorado C-D
    Attackers are changing their attacks and unfortunately organizations are not prepared. As many organizations are still trying to secure their environment against traditional malware, ransomware, later ...
    • Audit/Risk Management
    Denver 4
    Measuring the effectiveness of an organization's continuous monitoring process can look very different between organizations. This session will provide the participant with an understanding of how the ...
    • Forensics
    Denver 3
    The latest BLE and BLE-Mesh technologies provide a new way for criminals to communicate, stake out, Steal information, and coordinate criminal activities surreptitiously. This lecture and demonstratio ...
    • Forensics
    Colorado A-B
    The need to obtain video evidence from cloud based security video systems like Ring Doorbells, Arlo, and Nest cameras as well as social media sites such as Facebook, YouTube, Instagram, etc. has incre ...
    • Information Security
    Colorado C-D
    Stealing business or military secrets is a thing which attracts a lot of resources from both attackers and defenders. Since Internet traffic is more or less covered by techniques like DLP tools (or by ...
    • Forensics
    Colorado A-B
    Devices are getting more secure every year. To extract digital evidence from mobile devices investigators have to deal with screen locks as well as device encryption. In this session, we will speak ab ...
    • Audit/Risk Management
    Denver 4
    The disciplines of Information Security and IT Audit are different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuring tha ...
    • Information Security
    Denver 3
    The pandemic has lead to an explosion of virtual meetings. At the same time, so-called "ephemeral" or disappearing messaging apps are allowing communications that may not be recorded. This session wil ...
    • Forensics
    Colorado A-B
    Many cases rely on photos taken on an iPhone, and on the dates those photos were taken. A forensic investigation tells you the associated dates, but a comparison of Date Created and Date Modified can ...
    • Information Security
    Colorado C-D
    • Audit/Risk Management
    Denver 4
    Many enterprises spend millions of dollars on security, had SOCs, firewalls, IDFs and anti-virus systems but still become compromised. Had they taken a more proactive approach they may have been able ...
    • Information Security
    Colorado C-D
    Network Behavior Anomaly Detection and User and Entity Behavior Analytics are heralded as machine learning messiahs for finding advanced attacks. The data collection and processing methodologies of th ...
    • Forensics
    Colorado C-D
    Join Jason Roslewicz CFCE, Chief Executive Officer, from SUMURI LLC in a discussion about maximizing efficiency in your Forensic Lab by utilizing existing workstations and hardware to leverage the pro ...
    • Investigations
    Denver 4
    You may have taken part in investigations that used data from Electronic Data Recorders (the "black box" installed in many vehicles) or an infotainment forensic kit... but modern vehicle technologies ...
    • Investigations
    Denver 3
    Loot boxes, premium currencies, and cosmetic items are a multi-million dollar revenue stream today in video games. With some gamers turning to online marketplaces to buy in-game items for real money f ...
Tuesday, August 03, 2021
    • Audit/Risk Management
    Denver 4
    There are a number of frameworks available to base your organizations’ cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. There will be somethi ...
    • Forensics
    Colorado A-B
    The use of UAVs is rapidly growing and expanding into criminal enterprises and terrorist organizations while news feeds are reporting on crimes being successfully prosecuted where UAV forensics has be ...
    • Information Security
    Colorado C-D
    • Forensics
    Denver 3
    Discussion on the changing landscape of the corporate work environment from a centralized office environment to remote/work from home. Discuss and debate the impact this will have on company data and ...
    • Information Security
    Colorado C-D
    Citing real-world scenarios and case studies, this session will highlight some of the most prominent threats to cloud infrastructures. Not only will we delve into some of the more common ways attacker ...
    • Investigations
    Colorado A-B
    With the steady increase in Drone use, law enforcement must be prepared to add this expansive dataset to their case package. How did a Drone intercepted along the border become the first Federal convi ...
    • Forensics
    Colorado C-D
    Audio, acoustic, voice and video evidence are common in civil and criminal cases throughout all state and Federal courts. All parties should at least be generally familiar with what can (and cannot) b ...
    • Audit/Risk Management
    Denver 4
    In this session, we will discuss common security issues associated with business travel and how to help you make yourself and your belongings a bit more secure. We’ll discuss tools and techniques used ...
    • Investigations
    Denver 3
    Open Source Intelligence (OSINT) tools can be used to detect cyber threats and investigate cyber crime, as well as other types of crime. During this presentation, attendees will gain insight on how to ...
    • Audit/Risk Management
    Denver 4
    This session will share best practices for developing a cybersecurity program that employs an agile approach to maintaining compliance. Discover how organizations are utilizing hacker-powered security ...
    • Forensics
    Colorado A-B
    With an estimated 1.4 trillion photos being taken in 2020, and approximately 90% of those being taken with mobile devices, investigators now more than ever need an in-depth understanding of how images ...
    • Information Security
    Denver 3
    In today’s new normal, working from a coffee shop, at one’s kitchen table or even out of the country, businesses are finding new and creative ways to thrive. Enabling employees to work out of the offi ...
    • Information Security
    Denver 3
    When we logon, do we have confidence that our credentials and PII are going to an authorized provider? Attacks: SQL Injection Attack Phishing and Spear Phishing Attacks Malware Botnets Cross-Site Scri ...
    • Forensics
    Colorado A-B
    Checkm8 has completely changed the approach to Apple iOS data acquisition. This exploit allows investigators to safely extract complete file system and keychain from a wide range of Apple iOS devices ...
    • Information Security
    Denver 4
    Extortion ransomware is a growing threat, and the repeated victims are organizations that provide critical infrastructure. Because of this, the impact is often more than just “downgraded service” or a ...
    • Forensics
    Colorado A-B
    We will present methods and technology related to Cell Forensics: phone records' analytics and real cell site coverage surveys, statistical analysis, and 3D mapping. How this field of forensic crimina ...
    • Information Security
    Colorado C-D
    Cybersecurity professionals are all too familiar with the cliché that the weakest link in an organization are the people who work for and with the company. According to the 2019 Verizon Data Breach an ...
    • Investigations
    Denver 3
    Surveillance video evidence plays a role in the overwhelming majority of investigations today. Unfortunately, sometimes investigations run into a snag when the video of interest doesn’t appear to be p ...
Wednesday, August 04, 2021
    • Audit/Risk Management
    Denver 4
    With the increasing prevalence of technology in our daily lives and as a byproduct, Tech’s involvement in criminal investigations, agencies around the world must provide guidance to its members on bes ...
    • Investigations
    Colorado C-D
    This session will explore techniques that can be used to exploit information leaked through the system to expose the person behind the mask when DarkWeb usage has been initiated. Using best techniques ...
    • Information Security
    Denver 3
    This presentation will cover the “people” element of the people, processes and technology triad often utilized within the information security space. Taking into consideration the importance of staff ...
    • Information Security
    Denver 3
    Self-propagating ransomware evolved into attacker-driven ransomware; more recently, data exfiltration and extortion has been combined with the ransomware payload. A breach of third-party vendors holdi ...
    • Investigations
    Denver 3
    Data Breaches and Leaks have long been a source of relevant information. In this session we will explore operational security mitigation and delve into the intelligence gathering techniques and resour ...
    • Forensics
    Colorado C-D
    Discuss cloud storage as a data source, methods of data collection and its investigation value. Essentially, what information can be collected from cloud storage service providers, as it relates to ac ...
    • Forensics
    Colorado A-B
    Would you consider buying a new car that had no keys, invisible locks, and only a written commitment from the dealership that the car is only going to respond to you and can’t be stolen by any random ...
    • Information Security
    Denver 4
    Internet of Thing (IoT) devices have been implemented in almost every business environment throughout the World. Their pervasive usage has led to some great cybersecurity risks. This presentation expl ...
    • Forensics
    Denver 3
    During COVID-19, digital forensic incident responders have found it difficult to acquire their evidence in an efficient yet legally defensible means as well as capturing memory from a live system whil ...
    • Forensics
    Colorado A-B
    This presentation will highlight the similarities and differences between the recently released Chromium browser integrated into Windows 10 and the stand alone Google Chrome product. The primary focus ...
    • Information Security
    Colorado C-D
    Consumer data privacy is a persistently hot topic catching global headlines every day. Data breaches gain significant attention, and with an increased regulatory landscape, company's may be exposed to ...
    • Forensics
    Denver 3
    Sitting for a deposition, pre-trial interview, or trial can be a stressful experience. In this session, we will explore strategies attorneys employ to examine expert witnesses. Attendees will learn no ...
    • Forensics
    Colorado A-B
    The counterintelligence mindset should be applied to the domestic situation, what can be gathered, what sources and methods can be used against a person in their own house and how to detect the threat ...

2021 Sponsors

QUOTE

  • The Techno Security & Digital Forensics Conference provided me with an opportunity to connect with other Digital Forensics Analyst in law enforcement and other industries. It is also a good place to hear, in sessions, about how other organizations are overcoming obstacles that we are also trying to solve and/or brainstorm ideas.
    Priscilla Ramos, Digital Forensics Examiner, Corpus Christi Police Department
  • As usual at a Techno Security & Digital Forensics Conference, we spoke with a great mix of serious prospects and current customers, thank you!
    John Graham, Director of Sales and Business Development, Atola Technology
  • I met the most fantastic people from all over the world... from public and private arenas. I truly believe knowledge and knowledge sharing will be the key to our survival in this age of technology.
    Vicki Latham, Director of Communications and Development, 4theONE Foundation
  • There was a wealth of information in the short 1-hour segments which allowed you to set your own path and avoid the sessions that were not relevant to you.
    Chris Klimosko, Digital Forensic Examiner, Edmonton Police Service
  • The level of networking and the level of attendees is superb.
    Harvey Nusz, CIPM, CISSP, CRISC, CGEIT, CISA, Manager, GDPR, Capgemini
  • The attendees were quality and had a high level of engagement with sponsors. I was also pleasantly surprised at the number of international attendees. There were lots of folks from Sweden, Denmark, and Germany, all of whom stopped by the booth and were interested in our products (always nice!).
    Jack Raubach, Marketing Director, Forensic Computers

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE