Skip to main content

Techno Security & Digital Forensics Conference

2023 Conference Program

conference image

2023 Conference Program

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, June 05, 2023
    • Information Security
    Salon D
    Management wants instant business application gratification in the form of continuous integration (CI) / continuous deployment (CD). To achieve those objectives, more and more organizations have adopt ...
    • Investigations
    Salon E
    Abstract Proposal: A Google Reverse Location Search (Geofence), is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives using geof ...
    • Investigations
    Salon E
    Every organization will be impacted by fraud committed or facilitated through digital technology. Investigations are not complete without the examination of data from all data from all sources. Attend ...
    • Information Security
    Salon D
    The industrial revolution was powered by coal and steam. The next revolution is on the horizon, and it’s an information revolution Artificial intelligence is becoming in integral contributor to how th ...
    • Investigations
    Salon C
    Private browsing? Incognito mode? People use the internet for everything from researching something they don’t know to finding dinner or drinks. Unfortunately, criminals also use the internet to view ...
    • Forensics
    Salon F
    File sharing portals like Google Drive, Dropbox and Axon Citizen provide the ability for the public to easily share video files from cell phones with law enforcement; they also present unique video au ...
    • Magnet Forensics Lab
    Salon A
    Examiners are used to dealing with databases, especially SQLite. However, what if the data is in a completely different format such as LevelDB? This format has become extremely popular in modern brows ...
    • Belkasoft Lab
    Salon B
    Join Belkasoft for the presentation on digital forensics with a focus on Windows forensics, including analysis of file systems, volume shadow copy snapshots, and encrypted data. In this presentation, ...
    • Investigations
    Salon D
    During this session, attendees will learn alternative techniques for identifying individuals and collecting actionable intelligence through forensic investigations. Attendees will gain an understandin ...
    • Investigations
    Salon E
    In an investigation, every piece of information is important. One thing can be that critical piece that can decide the whole case. Some things are physical and some can be visual. Sometimes it is some ...
    • Audit/Risk Management
    Salon F
    Cyber Resiliency proactively deals with the potential outcome of cyber-attacks by increasing organizational awareness of potential impacts and costs; and enables you to take actions that reduce overal ...
    • Forensics
    Salon C
    This session will share how to use open source data to discover historical location information for vehicles that do not store GPS data or vehicles in which physical access to their systems is not an ...
    • Oxygen Forensics Lab
    Salon A
    Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
    • Forensics
    Salon C
    This session will share the chip-off data recovery from the crash-protected flight data recording system. It is used in helicopters and fixed-wing aircraft and is based on solid-state media. The sessi ...
    • eDiscovery
    Salon F
    With nearly all communications leaving some sort of digital footprint, it is inevitable that today’s legal practitioners have a solid foundational understanding of digital forensics and eDiscovery. Th ...
    • Information Security
    Salon D
    There is never enough budget or time to solve every security problem an organization faces. However, there are a lot of free or inexpensive tactics, techniques, and tools that every organization can l ...
    • Magnet Forensics Lab
    Salon A
    Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join us as ...
    • Belkasoft Lab
    Salon B
    Get ready for 2023 with the latest updates on iOS forensics from Belkasoft! As Apple continues to tighten its security measures, including remote wiping, data transfer restrictions, and stronger PIN r ...
    • Investigations
    Salon E
    Since the widespread adoption of computers and mobile devices by civilian populations, law enforcement has relied more and more on the user-created data harbored within these devices to reveal informa ...
    • Investigations
    Salon D
    Today the competence in the digital forensics’ community is high with well-trained and knowledgeable staff and tools that can help us to solve most of our criminal cases. But there is use for our skil ...
    • Investigations
    Salon C
    This session explores the challenges and solution space of accomplishing digital transformation of secure inter-LE agency file sharing and the \court order management processes. The session draws on e ...
    • Information Security
    Salon E
    There are many ways to test software, but Dynamic Application Security Testing (DAST) allows testing in its running state and environment. OWASP ZAP is a penetration testing and vulnerability scanning ...
    • Investigations
    Salon F
    This session will open with a brief discussion on the origin and nature of TikTok, including the types of content that is typically found on the platform. The session will also examine the increasing ...
    • Oxygen Forensics Lab
    Salon B
    So, you have a device extraction that is filled with a treasure trove of images… Now what do you do with those images? Let our Analytic tools do all the work for you! Follow along with us as we demons ...
    • Investigations
    Salon D
    This session will discuss how by leveraging open-source intelligence to investigate and unmask criminals using cryptocurrency to fund illicit activities, law enforcement agencies can build trust in th ...
    • Investigations
    Salon F
    Social media providers deliver endless amounts of data and insights—but only if you know what to ask for. This session will iscuss the mass amounts of data available from social media platforms (ie. G ...
    • Forensics
    Salon D
    This session will summarize some of the recent digital forensics activities in the Forensics Tool testing (CFTT) project at NIST. Several reports (NRC 2009 and PCAST 2016) pointed out a need for a bet ...
    • Forensics
    Salon C
    A difficult to fulfill requirement of a digital forensic investigations is listening to the audio of a video recording. Whether it’s a matter of the time required, or the way audio tracks make CSAM co ...
    • Belkasoft Lab
    Salon B
    This is the first of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as pos ...
    • Magnet Forensics Lab
    Salon A
    This session will focus on the newly added features of Magnet AXIOM 7.0. We'll focus on these updates in detail and explore how we can make the most of them to gather more evidence in support of our i ...
Tuesday, June 06, 2023
    • Keynote
    Salon D/E
    • Information Security
    Salon D
    Trade secrets make up the majority of the value of U.S. public company's' portfolios. Such secrets are high-value theft targets for domestic and foreign competitors. Domestic economic damage attribute ...
    • Forensics
    Salon C
    iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will discuss the lifecycle of iOS versions and devices ...
    • eDiscovery
    Salon F
    Legal practitioners and the eDiscovery industry have often been slow to adopt new technologies. The Metaverse will fundamentally alter the ways in which people interact with each other. Organizations ...
    • Investigations
    Salon E
    This moderated panel discussion of experts from both government and industry will provide a high-level overview of the cloud, discuss the common challenges and concerns raised by leaders and explain t ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
    • Audit/Risk Management
    Salon E
    Intelligence-driven security in organizations has become essential, particularly over the last decade. However, many times these intelligence teams become siloed to specific areas of an organization, ...
    • Information Security
    Salon D
    A tabletop exercise builds muscle memory to hone your team’s reactions during a crisis. Realistic practice, rather than a template that doesn’t fit your unique capabilities or the way you respond, pro ...
    • Forensics
    Salon C
    User login activity is critical with intrusion investigations because user accounts are often compromised and used for lateral movement. On any given host, you are looking at who came into the host an ...
    • Belkasoft Lab
    Salon A
    This is the second of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as po ...
    • Sponsor Demo
    Meeting Room 107
    In this session, we will delve into the world of RAM decoding and explore the significant advantages it offers in uncovering a potential goldmine of data that would otherwise be missed with a standard ...
    • Investigations
    Salon E
    OSINT collection and exploitation has become increasingly important across investigations of all types. One of the largest risks within OSINT collection is exposing the collector. This session will di ...
    • eDiscovery
    Salon F
    The Federal Rules of Civil Procedure govern all discovery, including e-Discovery, in civil actions in the United States Courts. This session will examine the rules that apply to e-Discovery, including ...
    • Investigations
    Salon E
    This session will use simulations to highlight the different techniques that ransomware threat groups use. Simulations will be objective based and focus on a different number of techniques which are r ...
    • Information Security
    Salon D
    Zero Trust is more than a buzz word, but the marketing hype and tangles of acronyms create confusion. This session will share real-world examples of zero trust journeys, explain and illustrate archite ...
    • Belkasoft Lab
    Salon A
    “How was the network initially compromised?” This is the question that cyber incident responders hear every time they're called to do their job. Nowadays, most cyberattacks—including advanced targeted ...
    • Oxygen Forensics Lab
    Salon B
    The old saying “Get Your Head Outta The Clouds” has no place here. No Device? No problem! Even if you do have a device extraction that yields some data, what can you do then? The answer is look to the ...
    • Information Security
    Salon E
    Azure Active Directory has become a target for attackers, as so many organizations have implemented it, but have little idea on how to protect it! AAD is not well known, although it is used by more th ...
    • Forensics
    Salon C
    The Dark Web is synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the DarkWeb will slip-up and eventually reveal their identity, This se ...
    • Forensics
    Salon D
    From disrupting sporting events and surveilling sensitive facilities to smuggling contraband into prisons and trafficking narcotics across borders, bad actors are getting more creative and savvier wit ...
    • Audit/Risk Management
    Salon F
    Cybercriminals are targeting critical infrastructure more than ever, with each attack having a stronger impact on our national security. The DoD expects full implementation of the Cybersecurity Maturi ...
    • Magnet Forensics Lab
    Salon A
    This session will explore Open-Source Intelligence data by using Cobwebs and Magnet AXIOM. We will walk through where this data may reside on external sources, such as the cloud and social media platf ...
    • Information Security
    Salon D
    Every year there are predictions and forecasts about what the future of cybersecurity will look like. And every year the predictions are very similar, more attacks, more victims, more technology, bigg ...
    • Forensics
    Salon C
    Abstract Proposal: How do you determine if a mobile forensic analysis is complete? How do you know what you don’t know? What if the nefarious actor is using an unsupported app? In this session Jessica ...
    • Investigations
    Salon E
    We are all familiar with emojis. They exist in virtually every online modality. There are over 3,500 emojis in the Unicode standard, with 1000's more in custom datasets. Emojis represent sentiment. Us ...
    • eDiscovery
    Salon F
    This session will deliver three different angles of cloud platforms: Architecture details of AWS, GCP & MS Azure across 4 main categories: security, compliance, identity & audit; Case law and forensic ...
Wednesday, June 07, 2023
    • Investigations
    Salon C
    This panel discussion will share a case study of a cryptocurrency investigation. It will walk through the steps taken start the investigation to the point of recovering assets using both open source a ...
    • Information Security
    Salon D
    There has been a dramatic increase in major cybersecurity incidents affecting large, medium, and small organizations in the public and private sectors over the past few years. From ransomware to data ...
    • Information Security
    Salon E
    An insider is an individual with current or former access to an organization’s data and systems. Insider threat can be malicious or unintentional and it negatively affects the organization, its employ ...
    • Forensics
    Salon C
    YOU are a genius. YOU are the best forensic examiner or attorney, ever. YOU found the smoking gun evidence and are perfectly confident in the truth of what happened based on the facts of the investiga ...
    • Forensics
    Salon D
    As we see new changes in the world with web 3.0 the question of what we can find in forensic artifacts jumps forward. What types of transactions are done in the metaverse and what can we find that can ...
    • eDiscovery
    Salon F
    The session will explore the use of data mining techniques in incident response and risk management. It will highlight the importance of an evidence-based approach and discuss how eDiscovery and other ...
    • Magnet Forensics Lab
    Salon A
    With Nashville Metro Police facing digital evidence processing backlogs ranging from weeks to several months, Detective Chad Gish knew change was needed if his Criminal Investigations Division forensi ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
    • Forensics
    Salon C
    Abstract Proposal: There are a variety of reasons you may need to create data sets - from research to tool validation and everything in between. But how do you do that to ensure validity of the data a ...
    • Forensics
    Salon F
    This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which had a Sync Gen-3 infotainment module. ...
    • Forensics
    Salon D
    In this session attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This sess ...
    • Audit/Risk Management
    Salon E
    From cell phones to cloud storage to satellite connectivity, the ICT supply chain encompasses the entire life cycle of hardware, software, and services and a diverse array of entities—including third- ...
    • Belkasoft Lab
    Looking to dive into the complex world of Android forensics? Look no further than this presentation with Belkasoft X! With the sheer variety of Android devices on the market, digital forensic investig ...
    • Forensics
    Salon F
    rewarding. This session will share the latest techniques and strategies for conducting successful forensic investigations on Mac devices. Whether you're new to Mac forensics or an experienced investig ...
    • Investigations
    Salon C
    Our digital world has become strife with challenges. From funding to legislation, our legislative representatives on the state and local levels have had difficulties in navigating cyber and forensic c ...
    • Information Security
    Salon D
    is your money safe? Are the movies real? Can you dodge lasers, sneak through vents, and dress in disguise to steal millions of dollars? Yes. Yes, you can. During this session, the presenter will share ...
    • Investigations
    Salon D
    Due to advances in technology, criminals are finding new ways to commit old crimes. The use of cryptocurrency and the darknet has allowed illicit activity to flourish under a cloak of anonymity in dig ...
    • Magnet Forensics Lab
    Salon A
    While the biome folder and related 'SEGB' files have been around for several versions of iOS, the latest version greatly expanded the use of these files. This talk will explore several different biome ...
    • Audit/Risk Management
    Salon F
    Credential leakage is a terrifying topic, at least in part, due to the paralysis of not knowing what to do, or where to start the conversation. In mature organizations, security teams might have proto ...
    • Belkasoft Lab
    Salon A
    In this presentation, we'll provide an in-depth review of macOS system artifacts and demonstrate why they are crucial in DFIR investigations. We'll explore how to analyze APFS and various artifacts to ...
    • Investigations
    Salon C
    The reality of modern computing is that much of the user data that investigators rely on is no longer stored on the device. With encryption already creating more challenges for forensic investigators, ...
    • Information Security
    Salon D
    This session will dive into AV, EDR, XDR, MDR, Logs, SIEM, MSSP, Data Lake, SOAR, and MITRE where we remove the buzzwords and look at the man behind the curtain, because there is no wizard in Oz. By t ...
    • Investigations
    Salon D
    This session has been well received by various fusion centers, InfraGard audiences, and critical infrastructure operators. The session strives to educate the audience on the not-so-distant future thre ...
    • Forensics
    Salon E
    This session will discuss the advances in the digital forensic investigation of smartwatches. It will also discuss how to extract and analyze data from smartwatches, why investigators need to look at ...
    • Forensics
    Salon C
    This session will be focused on forensically examining different messaging apps on Android, iOS, macOS, and Windows, both encrypted and unencrypted. Attendees will learn how to analyze Facebook Messen ...
    • Information Security
    Salon F
    Healthcare presents softer targets, high-value data, and increased urgency to pay when patient records cannot be accessed, and biomedical devices are taken offline!This session will discuss the result ...
    • Belkasoft Lab
    Salon B
    Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save preci ...
    • Magnet Forensics Lab
    Salon B
    The cloud storage-backed surveillance marketplace is rapidly expanding and providing additional sources of evidence to investigators. We will examine the features, capabilities, and metadata available ...
Thursday, June 08, 2023
    • Forensics
    Salon C
    How do you know how a file landed in the Files app? Did the user put it there, or was it a system function? Since the iOS Files application’s induction to the operating system, it has often been the o ...
    • Forensics
    Salon D
    SQLite databases are the most widely used and established databases for mobile devices due to their lightweight structure, no requirements for dependencies, and full control by developers. This sessio ...
    • Investigations
    Salon E
    Open-source intelligence (OSINT) is the practice of collecting information from publicly available sources. Due to the internet, large amounts of information is publicly available, and OSINT has becom ...
    • eDiscovery
    Salon F
    DFIR investigators have traditionally used forensic and incident response software in their analysis. There are other tools that are available that are designed for large volumes of data; eDiscovery a ...
    • Oxygen Forensics Lab
    Salon B
    Online dating allows people to easily connect with those around them also looking for relationships. With more and more people turning to dating apps as a source of communication, socialization, and e ...
    • Forensics
    Salon E
    This session will discuss the topic of LE to private sector transition. The presenter will cover the options available to the LE professional, steps to take when creating business (not legal advice), ...
    • Audit/Risk Management
    Salon F
    Once, a finalizing handshake was the rule for trust on a business transaction. Just as trust had to exist in person, the same is true digitally. In today’s connected world, business success requires d ...
    • Investigations
    Salon C
    The "dark web" is something that harbors a stigma, especially when it comes to investigations. Often shrouded in mystery and mystique, investigating cases involving the dark web actually are not that ...
    • Information Security
    Salon D
    In May 2014, the open-source encryption tool, TrueCrypt, was suddenly taken offline. Further theories pointed the finger at the FBI as unable to break volumes and files encrypted with TrueCrypt, and t ...
    • Magnet Forensics Lab
    Salon A
    Magnet Forensics is excited to share a new free tool, Magnet RESPONSE, with the DFIR community to help incident responders collect evidence and preserve the state of a system under investigation. It’s ...
    • Belkasoft Lab
    Salon A
    In today's threat landscape, bad actors are not just content with gaining initial access to a target network, but rather they aim to establish a persistent presence and move laterally to compromise la ...
    • Forensics
    Salon C
    Digital Forensics teams globally have expanded massively to meet the huge demand. This has often been done form the 'ground up' i.e. employ as many practitioners as possible. But what is often overloo ...
    • eDiscovery
    Salon F
    Einstein allegedly said, "Not everything that counts can be counted, and not everything that can be counted counts." To that point, should data be driving our decision-making in forensics? How can inc ...
    • Investigations
    Salon F
    Broad cross-sector collaboration is key for successful law enforcement investigations, as well as for companies‘ Trust & Safety teams‘ work, especially in the field of CSAM. Another crucial element in ...
    • Forensics
    Salon E
    Abstract Proposal: This talk will cover two topics of forensics processing for Voting Devices: The evolution of the digital forensic handling process at DefCon's Voting Village, voting machine flaws i ...
    • Oxygen Forensics Lab
    Salon B
    As a Forensic Investigator, we know that every case is different. Sometimes must sort through a lot of information and have to cull the data to find the needle in the haystack. Other times, the inform ...