Skip to main content

Techno Security & Digital Forensics Conference

2023 Conference Program

conference image

2023 Conference Program

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, June 05, 2023
    • Information Security
    Salon D
    Management wants instant business application gratification in the form of continuous integration (CI) / continuous deployment (CD). To achieve those objectives, more and more organizations have adopt ...
    • Investigations
    Salon E
    Abstract Proposal: A Google Reverse Location Search (Geofence), is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives using geof ...
    • Information Security
    Salon C
    The cyber security industry is fascinating for several reasons. First, everyone is affected since everyone in the industrialized world has/uses computers and mobile devices. Second, no one seems to ge ...
    • Investigations
    Salon E
    Every organization will be impacted by fraud committed or facilitated through digital technology. Investigations are not complete without the examination of data from all data from all sources. Attend ...
    • Information Security
    Salon D
    The industrial revolution was powered by coal and steam. The next revolution is on the horizon, and it’s an information revolution Artificial intelligence is becoming in integral contributor to how th ...
    • Investigations
    Salon C
    Private browsing? Incognito mode? People use the internet for everything from researching something they don’t know to finding dinner or drinks. Unfortunately, criminals also use the internet to view ...
    • Forensics
    Salon F
    File sharing portals like Google Drive, Dropbox and Axon Citizen provide the ability for the public to easily share video files from cell phones with law enforcement; they also present unique video au ...
    • Magnet Forensics Lab
    Salon A
    Unlike its smartphone counterpart, Android’s messaging applications are as fragmented as its operating system distribution. This talk will discuss the key points relating to recovering SMS, MMS, and R ...
    • Belkasoft Lab
    Salon B
    Join Belkasoft for the presentation on digital forensics with a focus on Windows forensics, including analysis of file systems, volume shadow copy snapshots, and encrypted data. In this presentation, ...
    • Investigations
    Salon D
    During this session, attendees will learn alternative techniques for identifying individuals and collecting actionable intelligence through forensic investigations. Attendees will gain an understandin ...
    • Investigations
    Salon E
    In an investigation, every piece of information is important. One thing can be that critical piece that can decide the whole case. Some things are physical and some can be visual. Sometimes it is some ...
    • Audit/Risk Management
    Salon F
    Cyber Resiliency proactively deals with the potential outcome of cyber-attacks by increasing organizational awareness of potential impacts and costs; and enables you to take actions that reduce overal ...
    • Forensics
    Salon C
    This session will share how to use open source data to discover historical location information for vehicles that do not store GPS data or vehicles in which physical access to their systems is not an ...
    • Oxygen Forensics Lab
    Salon A
    Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
    • Cellebrite Lab
    Salon B
    Embark on a thrilling "time travel" journey guided by Cellebrite Labs as we explore the evolution of mobile phone forensics from "then" to "now." In this engaging session, we'll uncover the past, pres ...
    • Forensics
    Salon C
    This session will share the chip-off data recovery from the crash-protected flight data recording system. It is used in helicopters and fixed-wing aircraft and is based on solid-state media. The sessi ...
    • eDiscovery
    Salon F
    With nearly all communications leaving some sort of digital footprint, it is inevitable that today’s legal practitioners have a solid foundational understanding of digital forensics and eDiscovery. Th ...
    • Information Security
    Salon D
    There is never enough budget or time to solve every security problem an organization faces. However, there are a lot of free or inexpensive tactics, techniques, and tools that every organization can l ...
    • Magnet Forensics Lab
    Salon A
    Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join us as ...
    • Belkasoft Lab
    Salon B
    Get ready for 2023 with the latest updates on iOS forensics from Belkasoft! As Apple continues to tighten its security measures, including remote wiping, data transfer restrictions, and stronger PIN r ...
    • Investigations
    Salon E
    Since the widespread adoption of computers and mobile devices by civilian populations, law enforcement has relied more and more on the user-created data harbored within these devices to reveal informa ...
    • Exhibits
    • Investigations
    Salon D
    Today the competence in the digital forensics’ community is high with well-trained and knowledgeable staff and tools that can help us to solve most of our criminal cases. But there is use for our skil ...
    • Investigations
    Salon C
    This session explores the challenges and solution space of accomplishing digital transformation of secure inter-LE agency file sharing and the \court order management processes. The session draws on e ...
    • Information Security
    Salon E
    There are many ways to test software, but Dynamic Application Security Testing (DAST) allows testing in its running state and environment. OWASP ZAP is a penetration testing and vulnerability scanning ...
    • Investigations
    Salon F
    This session will open with a brief discussion on the origin and nature of TikTok, including the types of content that is typically found on the platform. The session will also examine the increasing ...
    • Oxygen Forensics Lab
    Salon B
    So, you have a device extraction that is filled with a treasure trove of images… Now what do you do with those images? Let our Analytic tools do all the work for you! Follow along with us as we demons ...
    • Cellebrite Lab
    Salon A
    Step into the cutting-edge world of digital forensics and explore how this powerful technology is revolutionizing crime-solving for law enforcement agencies. In this captivating session, you'll uncove ...
    • Exhibits
    • Investigations
    Salon D
    This session will discuss how by leveraging open-source intelligence to investigate and unmask criminals using cryptocurrency to fund illicit activities, law enforcement agencies can build trust in th ...
    • Investigations
    Salon F
    Social media providers deliver endless amounts of data and insights—but only if you know what to ask for. This session will iscuss the mass amounts of data available from social media platforms (ie. G ...
    • Forensics
    Salon E
    This session will summarize some of the recent digital forensics activities in the Forensics Tool testing (CFTT) project at NIST. Several reports (NRC 2009 and PCAST 2016) pointed out a need for a bet ...
    • Forensics
    Salon C
    A difficult to fulfill requirement of a digital forensic investigations is listening to the audio of a video recording. Whether it’s a matter of the time required, or the way audio tracks make CSAM co ...
    • Belkasoft Lab
    Salon B
    This is the first of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as pos ...
    • Magnet Forensics Lab
    Salon A
    This session will focus on the newly added features of Magnet AXIOM 7.0. We'll focus on these updates in detail and explore how we can make the most of them to gather more evidence in support of our i ...
    • Networking
Tuesday, June 06, 2023
    • Networking
    • Keynote
    Salon D/E
    During this keynote, Joseph "Rich" Baich, CISO at the CIA, will share how the cyber threat landscape continues to evolve; threats are emerging as result of geopolitical issues and technology advanceme ...
    • Networking
    • Information Security
    Salon D
    Trade secrets make up the majority of the value of U.S. public company's' portfolios. Such secrets are high-value theft targets for domestic and foreign competitors. Domestic economic damage attribute ...
    • Forensics
    Salon C
    iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will discuss the lifecycle of iOS versions and devices ...
    • eDiscovery
    Salon F
    Legal practitioners and the eDiscovery industry have often been slow to adopt new technologies. The Metaverse will fundamentally alter the ways in which people interact with each other. Organizations ...
    • Sponsor Demo
    Meeting Room 107
    DekkoSecure provides a military grade, end-to-end encryption (E2EE) platform used by LEAs to replace the use of USBs or less secure electronic methods for sharing sensitive data between agencies. Dekk ...
    • Cellebrite Lab
    Salon A
    Discover the groundbreaking capabilities of Cellebrite's latest innovation in digital forensics, designed specifically for accessing the widest range of mobile devices. This powerful, all-inclusive so ...
    • Sponsor Demo
    Meeting Room 106
    Threat hunting includes insider threats as well as outside intrusion. These vectors can leave behind evidence that will give a bigger picture of malicious activity. Evidence is not limited to IPS, IDS ...
    • Investigations
    Salon E
    This moderated panel discussion of experts from both government and industry will provide a high-level overview of the cloud, discuss the common challenges and concerns raised by leaders and explain t ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
    • Audit/Risk Management
    Salon F
    Intelligence-driven security in organizations has become essential, particularly over the last decade. However, many times these intelligence teams become siloed to specific areas of an organization, ...
    • Information Security
    Salon D
    A tabletop exercise builds muscle memory to hone your team’s reactions during a crisis. Realistic practice, rather than a template that doesn’t fit your unique capabilities or the way you respond, pro ...
    • Forensics
    Salon C
    User login activity is critical with intrusion investigations because user accounts are often compromised and used for lateral movement. On any given host, you are looking at who came into the host an ...
    • Belkasoft Lab
    Salon A
    This is the second of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as po ...
    • Sponsor Demo
    Meeting Room 107
    In this MSAB workshop, participants will learn how to unlock solutions with speed and simplicity by harnessing the power of software from MSAB. Mobile devices contain a wealth of information, and with ...
    • Sponsor Demo
    Meeting Room 106
    It's time to rewrite the SOP to increase digital evidence collection and lab productivity. Digital forensic labs are among the busiest units and departments in law enforcement and the private sector a ...
    • Exhibits
    • Exhibits
    • Investigations
    Salon C
    OSINT collection and exploitation has become increasingly important across investigations of all types. One of the largest risks within OSINT collection is exposing the collector. This session will di ...
    • eDiscovery
    Salon F
    The Federal Rules of Civil Procedure govern all discovery, including e-Discovery, in civil actions in the United States Courts. This session will examine the rules that apply to e-Discovery, including ...
    • Investigations
    Salon E
    This session will use simulations to highlight the different techniques that ransomware threat groups use. Simulations will be objective based and focus on a different number of techniques which are r ...
    • Information Security
    Salon D
    Zero Trust is more than a buzz word, but the marketing hype and tangles of acronyms create confusion. This session will share real-world examples of zero trust journeys, explain and illustrate archite ...
    • Belkasoft Lab
    Salon A
    “How was the network initially compromised?” This is the question that cyber incident responders hear every time they're called to do their job. Nowadays, most cyberattacks—including advanced targeted ...
    • Oxygen Forensics Lab
    Salon B
    The old saying “Get Your Head Outta The Clouds” has no place here. No Device? No problem! Even if you do have a device extraction that yields some data, what can you do then? The answer is look to the ...
    • Sponsor Demo
    Meeting Room 106
    Find CSAM (or CT) on suspect devices (on scene, or in the lab) in seconds or minutes, replacing processes that take weeks or months which lead to lab backlogs. Joined by law enforcement personnel who ...
    • Sponsor Demo
    Meeting Room 107
    Are you struggling with trying to analyze large data returns from providers like Facebook, Google, Snapchat and Apple iCloud? Wouldn’t it be great to view all of your case data for a mobile device in ...
    • Information Security
    Salon E
    Azure Active Directory has become a target for attackers, as so many organizations have implemented it, but have little idea on how to protect it! AAD is not well known, although it is used by more th ...
    • Forensics
    Salon C
    The Dark Web is synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the DarkWeb will slip-up and eventually reveal their identity, This se ...
    • Forensics
    Salon D
    From disrupting sporting events and surveilling sensitive facilities to smuggling contraband into prisons and trafficking narcotics across borders, bad actors are getting more creative and savvier wit ...
    • Audit/Risk Management
    Salon F
    Cybercriminals are targeting critical infrastructure more than ever, with each attack having a stronger impact on our national security. The DoD expects full implementation of the Cybersecurity Maturi ...
    • Cellebrite Lab
    Salon B
    Cost drivers for eDiscovery cases and investigations are data volume and discovery/investigative review. On average an eDiscovery case has 130 GB of data collected from 10 – 15 custodians. The faster ...
    • Sponsor Demo
    Meeting Room 106
    As case loads continue to grow it is important that investigators, analysts, and reviewers are spending time performing the right tasks. Automating forensic tasks such as user assignment, processing, ...
    • Sponsor Demo
    Meeting Room 107
    Digital investigators need to be able to forensically acquire the information contained on a suspect device as a forensic image or clone. This must be an exact, bit-by-bit copy that can be used for ev ...
    • Magnet Forensics Lab
    Salon A
    This session will explore Open-Source Intelligence data by using Cobwebs and Magnet AXIOM. We will walk through where this data may reside on external sources, such as the cloud and social media platf ...
    • Information Security
    Salon D
    Every year there are predictions and forecasts about what the future of cybersecurity will look like. And every year the predictions are very similar, more attacks, more victims, more technology, bigg ...
    • Forensics
    Salon C
    Abstract Proposal: How do you determine if a mobile forensic analysis is complete? How do you know what you don’t know? What if the nefarious actor is using an unsupported app? In this session Jessica ...
    • Investigations
    Salon E
    We are all familiar with emojis. They exist in virtually every online modality. There are over 3,500 emojis in the Unicode standard, with 1000's more in custom datasets. Emojis represent sentiment. Us ...
    • eDiscovery
    Salon F
    This session will deliver three different angles of cloud platforms: Architecture details of AWS, GCP & MS Azure across 4 main categories: security, compliance, identity & audit; Case law and forensic ...
    • Cellebrite Lab
    Salon B
    Unleash the power of the latest and greatest examination solutions that every agency should have, and hear what our customers are already raving about! Want to know how these cutting-edge capabilities ...
Wednesday, June 07, 2023
    • Networking
    • Investigations
    Salon D
    This panel discussion will share a case study of a cryptocurrency investigation. It will walk through the steps taken start the investigation to the point of recovering assets using both open source a ...
    • Information Security
    Salon C
    There has been a dramatic increase in major cybersecurity incidents affecting large, medium, and small organizations in the public and private sectors over the past few years. From ransomware to data ...
    • Information Security
    Salon E
    An insider is an individual with current or former access to an organization’s data and systems. Insider threat can be malicious or unintentional and it negatively affects the organization, its employ ...
    • Forensics
    Salon C
    YOU are a genius. YOU are the best forensic examiner or attorney, ever. YOU found the smoking gun evidence and are perfectly confident in the truth of what happened based on the facts of the investiga ...
    • Forensics
    Salon D
    As we see new changes in the world with web 3.0 the question of what we can find in forensic artifacts jumps forward. What types of transactions are done in the metaverse and what can we find that can ...
    • eDiscovery
    Salon F
    The session will explore the use of data mining techniques in incident response and risk management. It will highlight the importance of an evidence-based approach and discuss how eDiscovery and other ...
    • Magnet Forensics Lab
    Salon A
    With Nashville Metro Police facing digital evidence processing backlogs ranging from weeks to several months, Detective Chad Gish knew change was needed if his Criminal Investigations Division forensi ...
    • Sponsor Demo
    Meeting Room 106
    Join us for a dynamic session where Chris Grettenberger, CFCE and Senior Software Manager for SUMURI, will demonstrate the powerful capabilities of RECON ITR and RECON LAB for Mac forensic acquisition ...
    • Sponsor Demo
    Meeting Room 107
    One of the biggest humanitarian crises currently facing the USA, and spreading to other countries, is the rapidly growing number of Opioid addictions and deaths caused by it. Detection of packaging or ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
    • Forensics
    Salon C
    Abstract Proposal: There are a variety of reasons you may need to create data sets - from research to tool validation and everything in between. But how do you do that to ensure validity of the data a ...
    • Forensics
    Salon F
    This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which had a Sync Gen-3 infotainment module. ...
    • Forensics
    Salon D
    In this session attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This sess ...
    • Audit/Risk Management
    Salon E
    From cell phones to cloud storage to satellite connectivity, the ICT supply chain encompasses the entire life cycle of hardware, software, and services and a diverse array of entities—including third- ...
    • Belkasoft Lab
    Salon A
    Looking to dive into the complex world of Android forensics? Look no further than this presentation with Belkasoft X! With the sheer variety of Android devices on the market, digital forensic investig ...
    • Sponsor Demo
    Meeting Room 107
    NIMBUS is a comprehensive yet flexible investigation case and quality management system. Managing multi use cases and cross-disciplines with integrated modules from evidence & task tracking, centraliz ...
    • Sponsor Demo
    Meeting Room 106
    Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently ...
    • Exhibits
    • Exhibits
    • Exhibits
    • Forensics
    Salon F
    This session will share the latest techniques and strategies for conducting successful forensic investigations on Mac devices. Whether you're new to Mac forensics or an experienced investigator, this ...
    • Investigations
    Salon C
    Our digital world has become strife with challenges. From funding to legislation, our legislative representatives on the state and local levels have had difficulties in navigating cyber and forensic c ...
    • Information Security
    Salon E
    is your money safe? Are the movies real? Can you dodge lasers, sneak through vents, and dress in disguise to steal millions of dollars? Yes. Yes, you can. During this session, the presenter will share ...
    • Investigations
    Salon D
    Due to advances in technology, criminals are finding new ways to commit old crimes. The use of cryptocurrency and the darknet has allowed illicit activity to flourish under a cloak of anonymity in dig ...
    • Magnet Forensics Lab
    Salon B
    While the biome folder and related 'SEGB' files have been around for several versions of iOS, the latest version greatly expanded the use of these files. This talk will explore several different biome ...
    • Cellebrite Lab
    Salon A
    Special guest host Robert Pike, Detective and Senior Examiner at the Raleigh Police Department, will be joining Cellebrite's DREAM TEAM of DFIR evangelists to discuss the technical side of digital for ...
    • Sponsor Demo
    Meeting Room 107
    The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
    • Sponsor Demo
    Meeting Room 106
    Come see the latest DATAPILOT platform offerings and partner integrations, increase your personal productivity, physical and mental health, and financial future with our Go-Again and Give Back Program ...
    • Networking
    • Audit/Risk Management
    Salon F
    Credential leakage is a terrifying topic, at least in part, due to the paralysis of not knowing what to do, or where to start the conversation. In mature organizations, security teams might have proto ...
    • Belkasoft Lab
    Salon B
    In this presentation, we'll provide an in-depth review of macOS system artifacts and demonstrate why they are crucial in DFIR investigations. We'll explore how to analyze APFS and various artifacts to ...
    • Investigations
    Salon C
    The reality of modern computing is that much of the user data that investigators rely on is no longer stored on the device. With encryption already creating more challenges for forensic investigators, ...
    • Information Security
    Salon E
    This session will dive into AV, EDR, XDR, MDR, Logs, SIEM, MSSP, Data Lake, SOAR, and MITRE where we remove the buzzwords and look at the man behind the curtain, because there is no wizard in Oz. By t ...
    • Cellebrite Lab
    Salon A
    In recent years, messaging from SMS/MMS, Slack, Teams, WhatsApp and more have become increasingly popular in the workplace. As a result, messaging data has become an important source of discovery in c ...
    • Sponsor Demo
    Meeting Room 106
    With today’s overwhelming volume of digital evidence, investigators are often forced to triage through terabytes of data. This process often results in longer lead times and unnecessary delays in work ...
    • Investigations
    Salon D
    This session has been well received by various fusion centers, InfraGard audiences, and critical infrastructure operators. The session strives to educate the audience on the not-so-distant future thre ...
    • Forensics
    Salon E
    This session will discuss the advances in the digital forensic investigation of smartwatches. It will also discuss how to extract and analyze data from smartwatches, why investigators need to look at ...
    • Forensics
    Salon C
    This session will be focused on forensically examining different messaging apps on Android, iOS, macOS, and Windows, both encrypted and unencrypted. Attendees will learn how to analyze Facebook Messen ...
    • Information Security
    Salon F
    Healthcare presents softer targets, high-value data, and increased urgency to pay when patient records cannot be accessed, and biomedical devices are taken offline!This session will discuss the result ...
    • Belkasoft Lab
    Salon B
    Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save preci ...
    • Magnet Forensics Lab
    Salon A
    The cloud storage-backed surveillance marketplace is rapidly expanding and providing additional sources of evidence to investigators. We will examine the features, capabilities, and metadata available ...
Thursday, June 08, 2023
    • Networking
    • Forensics
    Salon C
    How do you know how a file landed in the Files app? Did the user put it there, or was it a system function? Since the iOS Files application’s induction to the operating system, it has often been the o ...
    • Forensics
    Salon D
    SQLite databases are the most widely used and established databases for mobile devices due to their lightweight structure, no requirements for dependencies, and full control by developers. This sessio ...
    • eDiscovery
    Salon F
    DFIR investigators have traditionally used forensic and incident response software in their analysis. There are other tools that are available that are designed for large volumes of data; eDiscovery a ...
    • Oxygen Forensics Lab
    Salon B
    Online dating allows people to easily connect with those around them also looking for relationships. With more and more people turning to dating apps as a source of communication, socialization, and e ...
    • Cellebrite Lab
    Salon A
    Digital evidence provides us with both incredible benefits and significant challenges – helping to resolve cases yet creating overwhelming amounts of data and backlogs. But while accepted standards ex ...
    • Forensics
    Salon E
    • Forensics
    Salon E
    This session will discuss the topic of LE to private sector transition. The presenter will cover the options available to the LE professional, steps to take when creating business (not legal advice), ...
    • Audit/Risk Management
    Salon F
    Once, a finalizing handshake was the rule for trust on a business transaction. Just as trust had to exist in person, the same is true digitally. In today’s connected world, business success requires d ...
    • Information Security
    Salon D
    In May 2014, the open-source encryption tool, TrueCrypt, was suddenly taken offline. Further theories pointed the finger at the FBI as unable to break volumes and files encrypted with TrueCrypt, and t ...
    • Magnet Forensics Lab
    Salon B
    Magnet Forensics is excited to share a new free tool, Magnet RESPONSE, with the DFIR community to help incident responders collect evidence and preserve the state of a system under investigation. It’s ...
    • Belkasoft Lab
    Salon A
    In today's threat landscape, bad actors are not just content with gaining initial access to a target network, but rather they aim to establish a persistent presence and move laterally to compromise la ...
    • Forensics
    Salon C
    Do you work cases containing large volumes of data? And do you want to benefit from good software and international knowledge how to handle this data? Learn more about Hansken: a platform that is spec ...
    • Forensics
    Salon C
    Digital Forensics teams globally have expanded massively to meet the huge demand. This has often been done form the 'ground up' i.e. employ as many practitioners as possible. But what is often overloo ...
    • eDiscovery
    Salon D
    Einstein allegedly said, "Not everything that counts can be counted, and not everything that can be counted counts." To that point, should data be driving our decision-making in forensics? How can inc ...
    • Investigations
    Salon F
    Broad cross-sector collaboration is key for successful law enforcement investigations, as well as for companies‘ Trust & Safety teams‘ work, especially in the field of CSAM. Another crucial element in ...
    • Forensics
    Salon E
    This session will cover the legal voting machine sourcing and the use of OSINT in the examination process, and chip-off extractions. It will provide an overview of machines in use/forensic examination ...
    • Oxygen Forensics Lab
    Salon B
    As a Forensic Investigator, we know that every case is different. Sometimes must sort through a lot of information and have to cull the data to find the needle in the haystack. Other times, the inform ...
    • Cellebrite Lab
    Salon A
    Come and learn how investigation units around the world tackle the complexities of modern digital investigations, overcoming the surge in data volumes and leveraging it to their benefit, removing the ...