Skip to main content

Techno Security & Digital Forensics Conference

Monday, June 5, 2023

conference image

Monday, June 5, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
9:30 AM
    • Information Security
    Salon D
    Management wants instant business application gratification in the form of continuous integration (CI) / continuous deployment (CD). To achieve those objectives, more and more organizations have adopt ...
    • Investigations
    Salon E
    Abstract Proposal: A Google Reverse Location Search (Geofence), is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives using geof ...
12:00 PM
    • Investigations
    Salon E
    Every organization will be impacted by fraud committed or facilitated through digital technology. Investigations are not complete without the examination of data from all data from all sources. Attend ...
    • Information Security
    Salon D
    The industrial revolution was powered by coal and steam. The next revolution is on the horizon, and it’s an information revolution Artificial intelligence is becoming in integral contributor to how th ...
    • Investigations
    Salon C
    Private browsing? Incognito mode? People use the internet for everything from researching something they don’t know to finding dinner or drinks. Unfortunately, criminals also use the internet to view ...
    • Forensics
    Salon F
    File sharing portals like Google Drive, Dropbox and Axon Citizen provide the ability for the public to easily share video files from cell phones with law enforcement; they also present unique video au ...
    • Magnet Forensics Lab
    Salon A
    Examiners are used to dealing with databases, especially SQLite. However, what if the data is in a completely different format such as LevelDB? This format has become extremely popular in modern brows ...
    • Belkasoft Lab
    Salon B
    Join Belkasoft for the presentation on digital forensics with a focus on Windows forensics, including analysis of file systems, volume shadow copy snapshots, and encrypted data. In this presentation, ...
1:00 PM
    • Investigations
    Salon D
    During this session, attendees will learn alternative techniques for identifying individuals and collecting actionable intelligence through forensic investigations. Attendees will gain an understandin ...
    • Investigations
    Salon E
    In an investigation, every piece of information is important. One thing can be that critical piece that can decide the whole case. Some things are physical and some can be visual. Sometimes it is some ...
    • Audit/Risk Management
    Salon F
    Cyber Resiliency proactively deals with the potential outcome of cyber-attacks by increasing organizational awareness of potential impacts and costs; and enables you to take actions that reduce overal ...
    • Forensics
    Salon C
    This session will share how to use open source data to discover historical location information for vehicles that do not store GPS data or vehicles in which physical access to their systems is not an ...
    • Oxygen Forensics Lab
    Salon A
    Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
2:00 PM
    • Forensics
    Salon C
    This session will share the chip-off data recovery from the crash-protected flight data recording system. It is used in helicopters and fixed-wing aircraft and is based on solid-state media. The sessi ...
    • eDiscovery
    Salon F
    With nearly all communications leaving some sort of digital footprint, it is inevitable that today’s legal practitioners have a solid foundational understanding of digital forensics and eDiscovery. Th ...
    • Information Security
    Salon D
    There is never enough budget or time to solve every security problem an organization faces. However, there are a lot of free or inexpensive tactics, techniques, and tools that every organization can l ...
    • Magnet Forensics Lab
    Salon A
    Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join us as ...
    • Belkasoft Lab
    Salon B
    Get ready for 2023 with the latest updates on iOS forensics from Belkasoft! As Apple continues to tighten its security measures, including remote wiping, data transfer restrictions, and stronger PIN r ...
    • Investigations
    Salon E
    Since the widespread adoption of computers and mobile devices by civilian populations, law enforcement has relied more and more on the user-created data harbored within these devices to reveal informa ...
3:00 PM
    • Investigations
    Salon D
    Today the competence in the digital forensics’ community is high with well-trained and knowledgeable staff and tools that can help us to solve most of our criminal cases. But there is use for our skil ...
    • Investigations
    Salon C
    This session explores the challenges and solution space of accomplishing digital transformation of secure inter-LE agency file sharing and the \court order management processes. The session draws on e ...
    • Information Security
    Salon E
    There are many ways to test software, but Dynamic Application Security Testing (DAST) allows testing in its running state and environment. OWASP ZAP is a penetration testing and vulnerability scanning ...
    • Investigations
    Salon F
    This session will open with a brief discussion on the origin and nature of TikTok, including the types of content that is typically found on the platform. The session will also examine the increasing ...
    • Oxygen Forensics Lab
    Salon B
    So, you have a device extraction that is filled with a treasure trove of images… Now what do you do with those images? Let our Analytic tools do all the work for you! Follow along with us as we demons ...
4:00 PM
    • Investigations
    Salon D
    This session will discuss how by leveraging open-source intelligence to investigate and unmask criminals using cryptocurrency to fund illicit activities, law enforcement agencies can build trust in th ...
    • Investigations
    Salon F
    Social media providers deliver endless amounts of data and insights—but only if you know what to ask for. This session will iscuss the mass amounts of data available from social media platforms (ie. G ...
    • Forensics
    Salon D
    This session will summarize some of the recent digital forensics activities in the Forensics Tool testing (CFTT) project at NIST. Several reports (NRC 2009 and PCAST 2016) pointed out a need for a bet ...
    • Forensics
    Salon C
    A difficult to fulfill requirement of a digital forensic investigations is listening to the audio of a video recording. Whether it’s a matter of the time required, or the way audio tracks make CSAM co ...
    • Belkasoft Lab
    Salon B
    This is the first of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as pos ...
    • Magnet Forensics Lab
    Salon A
    This session will focus on the newly added features of Magnet AXIOM 7.0. We'll focus on these updates in detail and explore how we can make the most of them to gather more evidence in support of our i ...