Skip to main content

Techno Security & Digital Forensics Conference

Tuesday, June 6, 2023

conference image

Tuesday, June 6, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
9:30 AM
    • Information Security
    Salon D
    Trade secrets make up the majority of the value of U.S. public company's' portfolios. Such secrets are high-value theft targets for domestic and foreign competitors. Domestic economic damage attribute ...
    • Forensics
    Salon C
    iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will discuss the lifecycle of iOS versions and devices ...
    • eDiscovery
    Salon F
    Legal practitioners and the eDiscovery industry have often been slow to adopt new technologies. The Metaverse will fundamentally alter the ways in which people interact with each other. Organizations ...
    • Investigations
    Salon E
    This moderated panel discussion of experts from both government and industry will provide a high-level overview of the cloud, discuss the common challenges and concerns raised by leaders and explain t ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
10:30 AM
    • Audit/Risk Management
    Salon E
    Intelligence-driven security in organizations has become essential, particularly over the last decade. However, many times these intelligence teams become siloed to specific areas of an organization, ...
    • Information Security
    Salon D
    A tabletop exercise builds muscle memory to hone your team’s reactions during a crisis. Realistic practice, rather than a template that doesn’t fit your unique capabilities or the way you respond, pro ...
    • Forensics
    Salon C
    User login activity is critical with intrusion investigations because user accounts are often compromised and used for lateral movement. On any given host, you are looking at who came into the host an ...
    • Belkasoft Lab
    Salon A
    This is the second of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as po ...
    • Sponsor Demo
    Meeting Room 107
    In this session, we will delve into the world of RAM decoding and explore the significant advantages it offers in uncovering a potential goldmine of data that would otherwise be missed with a standard ...
1:30 PM
    • Investigations
    Salon E
    OSINT collection and exploitation has become increasingly important across investigations of all types. One of the largest risks within OSINT collection is exposing the collector. This session will di ...
    • eDiscovery
    Salon F
    The Federal Rules of Civil Procedure govern all discovery, including e-Discovery, in civil actions in the United States Courts. This session will examine the rules that apply to e-Discovery, including ...
    • Investigations
    Salon E
    This session will use simulations to highlight the different techniques that ransomware threat groups use. Simulations will be objective based and focus on a different number of techniques which are r ...
    • Information Security
    Salon D
    Zero Trust is more than a buzz word, but the marketing hype and tangles of acronyms create confusion. This session will share real-world examples of zero trust journeys, explain and illustrate archite ...
    • Belkasoft Lab
    Salon A
    “How was the network initially compromised?” This is the question that cyber incident responders hear every time they're called to do their job. Nowadays, most cyberattacks—including advanced targeted ...
    • Oxygen Forensics Lab
    Salon B
    The old saying “Get Your Head Outta The Clouds” has no place here. No Device? No problem! Even if you do have a device extraction that yields some data, what can you do then? The answer is look to the ...
3:30 PM
    • Information Security
    Salon E
    Azure Active Directory has become a target for attackers, as so many organizations have implemented it, but have little idea on how to protect it! AAD is not well known, although it is used by more th ...
    • Forensics
    Salon C
    The Dark Web is synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the DarkWeb will slip-up and eventually reveal their identity, This se ...
    • Forensics
    Salon D
    From disrupting sporting events and surveilling sensitive facilities to smuggling contraband into prisons and trafficking narcotics across borders, bad actors are getting more creative and savvier wit ...
    • Audit/Risk Management
    Salon F
    Cybercriminals are targeting critical infrastructure more than ever, with each attack having a stronger impact on our national security. The DoD expects full implementation of the Cybersecurity Maturi ...
    • Magnet Forensics Lab
    Salon A
    This session will explore Open-Source Intelligence data by using Cobwebs and Magnet AXIOM. We will walk through where this data may reside on external sources, such as the cloud and social media platf ...
4:30 PM
    • Information Security
    Salon D
    Every year there are predictions and forecasts about what the future of cybersecurity will look like. And every year the predictions are very similar, more attacks, more victims, more technology, bigg ...
    • Forensics
    Salon C
    Abstract Proposal: How do you determine if a mobile forensic analysis is complete? How do you know what you don’t know? What if the nefarious actor is using an unsupported app? In this session Jessica ...
    • Investigations
    Salon E
    We are all familiar with emojis. They exist in virtually every online modality. There are over 3,500 emojis in the Unicode standard, with 1000's more in custom datasets. Emojis represent sentiment. Us ...
    • eDiscovery
    Salon F
    This session will deliver three different angles of cloud platforms: Architecture details of AWS, GCP & MS Azure across 4 main categories: security, compliance, identity & audit; Case law and forensic ...