Skip to main content

Techno Security & Digital Forensics Conference

Wednesday, June 7, 2023

conference image

Wednesday, June 7, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
8:30 AM
    • Investigations
    Salon C
    This panel discussion will share a case study of a cryptocurrency investigation. It will walk through the steps taken start the investigation to the point of recovering assets using both open source a ...
    • Information Security
    Salon D
    There has been a dramatic increase in major cybersecurity incidents affecting large, medium, and small organizations in the public and private sectors over the past few years. From ransomware to data ...
9:30 AM
    • Information Security
    Salon E
    An insider is an individual with current or former access to an organization’s data and systems. Insider threat can be malicious or unintentional and it negatively affects the organization, its employ ...
    • Forensics
    Salon C
    YOU are a genius. YOU are the best forensic examiner or attorney, ever. YOU found the smoking gun evidence and are perfectly confident in the truth of what happened based on the facts of the investiga ...
    • Forensics
    Salon D
    As we see new changes in the world with web 3.0 the question of what we can find in forensic artifacts jumps forward. What types of transactions are done in the metaverse and what can we find that can ...
    • eDiscovery
    Salon F
    The session will explore the use of data mining techniques in incident response and risk management. It will highlight the importance of an evidence-based approach and discuss how eDiscovery and other ...
    • Magnet Forensics Lab
    Salon A
    With Nashville Metro Police facing digital evidence processing backlogs ranging from weeks to several months, Detective Chad Gish knew change was needed if his Criminal Investigations Division forensi ...
    • Oxygen Forensics Lab
    Salon B
    Costs are going up and investigations are becoming more complex. Do you have a need for multiple tools but can only afford one item from the buffet line? Cloud Extractor, Device Extractor, CDR Process ...
10:30 AM
    • Forensics
    Salon C
    Abstract Proposal: There are a variety of reasons you may need to create data sets - from research to tool validation and everything in between. But how do you do that to ensure validity of the data a ...
    • Forensics
    Salon F
    This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which had a Sync Gen-3 infotainment module. ...
    • Forensics
    Salon D
    In this session attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This sess ...
    • Audit/Risk Management
    Salon E
    From cell phones to cloud storage to satellite connectivity, the ICT supply chain encompasses the entire life cycle of hardware, software, and services and a diverse array of entities—including third- ...
    • Belkasoft Lab
    Looking to dive into the complex world of Android forensics? Look no further than this presentation with Belkasoft X! With the sheer variety of Android devices on the market, digital forensic investig ...
1:30 PM
    • Forensics
    Salon F
    rewarding. This session will share the latest techniques and strategies for conducting successful forensic investigations on Mac devices. Whether you're new to Mac forensics or an experienced investig ...
    • Investigations
    Salon C
    Our digital world has become strife with challenges. From funding to legislation, our legislative representatives on the state and local levels have had difficulties in navigating cyber and forensic c ...
    • Information Security
    Salon D
    is your money safe? Are the movies real? Can you dodge lasers, sneak through vents, and dress in disguise to steal millions of dollars? Yes. Yes, you can. During this session, the presenter will share ...
    • Investigations
    Salon D
    Due to advances in technology, criminals are finding new ways to commit old crimes. The use of cryptocurrency and the darknet has allowed illicit activity to flourish under a cloak of anonymity in dig ...
    • Magnet Forensics Lab
    Salon A
    While the biome folder and related 'SEGB' files have been around for several versions of iOS, the latest version greatly expanded the use of these files. This talk will explore several different biome ...
3:30 PM
    • Audit/Risk Management
    Salon F
    Credential leakage is a terrifying topic, at least in part, due to the paralysis of not knowing what to do, or where to start the conversation. In mature organizations, security teams might have proto ...
    • Belkasoft Lab
    Salon A
    In this presentation, we'll provide an in-depth review of macOS system artifacts and demonstrate why they are crucial in DFIR investigations. We'll explore how to analyze APFS and various artifacts to ...
    • Investigations
    Salon C
    The reality of modern computing is that much of the user data that investigators rely on is no longer stored on the device. With encryption already creating more challenges for forensic investigators, ...
    • Information Security
    Salon D
    This session will dive into AV, EDR, XDR, MDR, Logs, SIEM, MSSP, Data Lake, SOAR, and MITRE where we remove the buzzwords and look at the man behind the curtain, because there is no wizard in Oz. By t ...
    • Investigations
    Salon D
    This session has been well received by various fusion centers, InfraGard audiences, and critical infrastructure operators. The session strives to educate the audience on the not-so-distant future thre ...
4:30 PM
    • Forensics
    Salon E
    This session will discuss the advances in the digital forensic investigation of smartwatches. It will also discuss how to extract and analyze data from smartwatches, why investigators need to look at ...
    • Forensics
    Salon C
    This session will be focused on forensically examining different messaging apps on Android, iOS, macOS, and Windows, both encrypted and unencrypted. Attendees will learn how to analyze Facebook Messen ...
    • Information Security
    Salon F
    Healthcare presents softer targets, high-value data, and increased urgency to pay when patient records cannot be accessed, and biomedical devices are taken offline!This session will discuss the result ...
    • Belkasoft Lab
    Salon B
    Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save preci ...
    • Magnet Forensics Lab
    Salon B
    The cloud storage-backed surveillance marketplace is rapidly expanding and providing additional sources of evidence to investigators. We will examine the features, capabilities, and metadata available ...