Skip to main content

Techno Security & Digital Forensics Conference

Tuesday, June 6, 2023

conference image

Tuesday, June 6, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
8:00 AM
    • Keynote
    Salon D/E
    During this keynote, Joseph "Rich" Baich, CISO at the CIA, will share how the cyber threat landscape continues to evolve; threats are emerging as result of geopolitical issues and technology advanceme ...
9:30 AM
    • Information Security
    Salon D
    Trade secrets make up the majority of the value of U.S. public company's' portfolios. Such secrets are high-value theft targets for domestic and foreign competitors. Domestic economic damage attribute ...
    • Forensics
    Salon C
    iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will discuss the lifecycle of iOS versions and devices ...
    • eDiscovery
    Salon F
    Legal practitioners and the eDiscovery industry have often been slow to adopt new technologies. The Metaverse will fundamentally alter the ways in which people interact with each other. Organizations ...
    • Sponsor Demo
    Meeting Room 107
    DekkoSecure provides a military grade, end-to-end encryption (E2EE) platform used by LEAs to replace the use of USBs or less secure electronic methods for sharing sensitive data between agencies. Dekk ...
    • Cellebrite Lab
    Salon A
    Discover the groundbreaking capabilities of Cellebrite's latest innovation in digital forensics, designed specifically for accessing the widest range of mobile devices. This powerful, all-inclusive so ...
    • Sponsor Demo
    Meeting Room 106
    Threat hunting includes insider threats as well as outside intrusion. These vectors can leave behind evidence that will give a bigger picture of malicious activity. Evidence is not limited to IPS, IDS ...
    • Investigations
    Salon E
    This moderated panel discussion of experts from both government and industry will provide a high-level overview of the cloud, discuss the common challenges and concerns raised by leaders and explain t ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
10:30 AM
    • Audit/Risk Management
    Salon F
    Intelligence-driven security in organizations has become essential, particularly over the last decade. However, many times these intelligence teams become siloed to specific areas of an organization, ...
    • Information Security
    Salon D
    A tabletop exercise builds muscle memory to hone your team’s reactions during a crisis. Realistic practice, rather than a template that doesn’t fit your unique capabilities or the way you respond, pro ...
    • Forensics
    Salon C
    User login activity is critical with intrusion investigations because user accounts are often compromised and used for lateral movement. On any given host, you are looking at who came into the host an ...
    • Belkasoft Lab
    Salon A
    This is the second of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as po ...
    • Sponsor Demo
    Meeting Room 107
    In this MSAB workshop, participants will learn how to unlock solutions with speed and simplicity by harnessing the power of software from MSAB. Mobile devices contain a wealth of information, and with ...
    • Sponsor Demo
    Meeting Room 106
    It's time to rewrite the SOP to increase digital evidence collection and lab productivity. Digital forensic labs are among the busiest units and departments in law enforcement and the private sector a ...
1:30 PM
    • Investigations
    Salon C
    OSINT collection and exploitation has become increasingly important across investigations of all types. One of the largest risks within OSINT collection is exposing the collector. This session will di ...
    • eDiscovery
    Salon F
    The Federal Rules of Civil Procedure govern all discovery, including e-Discovery, in civil actions in the United States Courts. This session will examine the rules that apply to e-Discovery, including ...
    • Investigations
    Salon E
    This session will use simulations to highlight the different techniques that ransomware threat groups use. Simulations will be objective based and focus on a different number of techniques which are r ...
    • Information Security
    Salon D
    Zero Trust is more than a buzz word, but the marketing hype and tangles of acronyms create confusion. This session will share real-world examples of zero trust journeys, explain and illustrate archite ...
    • Belkasoft Lab
    Salon A
    “How was the network initially compromised?” This is the question that cyber incident responders hear every time they're called to do their job. Nowadays, most cyberattacks—including advanced targeted ...
    • Oxygen Forensics Lab
    Salon B
    The old saying “Get Your Head Outta The Clouds” has no place here. No Device? No problem! Even if you do have a device extraction that yields some data, what can you do then? The answer is look to the ...
    • Sponsor Demo
    Meeting Room 106
    Find CSAM (or CT) on suspect devices (on scene, or in the lab) in seconds or minutes, replacing processes that take weeks or months which lead to lab backlogs. Joined by law enforcement personnel who ...
    • Sponsor Demo
    Meeting Room 107
    Are you struggling with trying to analyze large data returns from providers like Facebook, Google, Snapchat and Apple iCloud? Wouldn’t it be great to view all of your case data for a mobile device in ...
3:30 PM
    • Information Security
    Salon E
    Azure Active Directory has become a target for attackers, as so many organizations have implemented it, but have little idea on how to protect it! AAD is not well known, although it is used by more th ...
    • Forensics
    Salon C
    The Dark Web is synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the DarkWeb will slip-up and eventually reveal their identity, This se ...
    • Forensics
    Salon D
    From disrupting sporting events and surveilling sensitive facilities to smuggling contraband into prisons and trafficking narcotics across borders, bad actors are getting more creative and savvier wit ...
    • Audit/Risk Management
    Salon F
    Cybercriminals are targeting critical infrastructure more than ever, with each attack having a stronger impact on our national security. The DoD expects full implementation of the Cybersecurity Maturi ...
    • Cellebrite Lab
    Salon B
    Cost drivers for eDiscovery cases and investigations are data volume and discovery/investigative review. On average an eDiscovery case has 130 GB of data collected from 10 – 15 custodians. The faster ...
    • Sponsor Demo
    Meeting Room 106
    As case loads continue to grow it is important that investigators, analysts, and reviewers are spending time performing the right tasks. Automating forensic tasks such as user assignment, processing, ...
    • Sponsor Demo
    Meeting Room 107
    Digital investigators need to be able to forensically acquire the information contained on a suspect device as a forensic image or clone. This must be an exact, bit-by-bit copy that can be used for ev ...
    • Magnet Forensics Lab
    Salon A
    This session will explore Open-Source Intelligence data by using Cobwebs and Magnet AXIOM. We will walk through where this data may reside on external sources, such as the cloud and social media platf ...
4:30 PM
    • Information Security
    Salon D
    Every year there are predictions and forecasts about what the future of cybersecurity will look like. And every year the predictions are very similar, more attacks, more victims, more technology, bigg ...
    • Forensics
    Salon C
    Abstract Proposal: How do you determine if a mobile forensic analysis is complete? How do you know what you don’t know? What if the nefarious actor is using an unsupported app? In this session Jessica ...
    • Investigations
    Salon E
    We are all familiar with emojis. They exist in virtually every online modality. There are over 3,500 emojis in the Unicode standard, with 1000's more in custom datasets. Emojis represent sentiment. Us ...
    • eDiscovery
    Salon F
    This session will deliver three different angles of cloud platforms: Architecture details of AWS, GCP & MS Azure across 4 main categories: security, compliance, identity & audit; Case law and forensic ...
    • Cellebrite Lab
    Salon B
    Unleash the power of the latest and greatest examination solutions that every agency should have, and hear what our customers are already raving about! Want to know how these cutting-edge capabilities ...