The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
As we immerse ourselves into the revolutionizing era of AI, the world of cybersecurity and digital forensics is confronted with unprecedented challenges as well as opportunities. During this powerful ...
Artificial intelligence has garnered significant interest in the United States Congress, impacting investigators and potential victims. This session will address what is coming from an A.I. legislativ ...
Trade secrets make up majority of value of U.S. public companies' portfolios. Not surprisingly, such secrets are high value targets for domestic and foreign theft. Domestic economic damage attributed ...
Whether working a HIPPA case, client-attorney privilege, or just a system with mixed file and data ownership can raise privacy concerns and without a proper methodology hinder the investigation. This ...
Many companies and organizations have rolled out Microsoft/Office 365 in their computing environments, but few have taken advantage of the search and investigatory tools built into Microsoft Purview. ...
AI images and videos are taking over the internet. Your selfies make you glow and have perfect skin and are presented to the world as real. Celebrities are regularly having AI generated explicit image ...
This demo session will take a new look into forensic artifacts, highlighting how EnCase enhances the preservation and examination of artifacts within digital investigations. You’ll see how EnCase can ...
CISA Cybersecurity Advisor Klint Walker will discuss the current threat landscape and nation state activities. This session will show how cyberspace is a political battleground and illustrate how thre ...
Video and image evidence is vital to all aspects of investigations as well as security. Trusting evidence that is submitted has increasingly been challenged, particularly related to "deepfake"video. A ...
As an investigator, you’re constantly searching for ways to close cases faster. One of the most effective ways to do so is by implementing social media data from multiple sources, but how? This sessio ...
Filesystem or full disk encryption on Android and iOS devices is an accepted and well understood norm nowadays. However, there are almost invariably additional layers of security on these devices now, ...
With the development of the internet came a new tool for criminals to conduct illegal activity. With the emergence of the dark web and cryptocurrency, criminals gained anonymity for their illicit tran ...
Mobile devices have become engrained in our daily lives, so smartphone data plays a critical part in almost every criminal investigation. Magnet Forensics offers a range of solutions at every stage of ...
Digital Forensics & Incident Response teams are facing unprecedented pressure to expedite caseloads and respond to incidents immediately. Learn how to harness the power of large-scale processing engin ...
Join MSAB as they show how to use their flagship analytical software XAMN, they will demonstrate how to use XAMN to deep dive into the data for a better understanding of what the tool does. They will ...
In this enlightened session we will weave together the expertise of seasoned cybersecurity professionals, hailing from diverse roles such as SOC Analysts, Threat Hunters, Detection Engineers, and Inci ...
The session will focus on on-scene investigations and use screenshots/screen recordings when talking with victims and witnesses. The session will delve into the unique challenges and opportunities tha ...
When the event has been resolved & the threat has been mitigated the client, CISO, CEO & BoD will want to know root cause, a resource consuming and costly project. Investigation into sufficient or lik ...
Are you thinking about moving from the public sector into the private sector? Join this panel of industry-leading experts from Cellebrite and VeriFi who have successfully made the move. Learn from the ...
Are you looking for a way to extract facial data from videos in order to compare to known datasets? Need to know how to quickly search text located in screenshots? How about simply pushing a button to ...
Join Exodus Road founder Matt Parker, Cellebrite’s Chief Marketing Officer Lisa Cole, and Cellebrite CEO Yossi Carmil for an engaging fireside chat and learn how Cellebite is on a mission to eliminate ...
The Cloud has been thought of as a frontier which only the bold few Law Enforcement agencies have entered. Cloud services have arrived and understanding their implementation within your digital invest ...
Threat simulations involving malware and C2 frameworks are crucial in Cybersecurity training and readiness. They provide a realistic environment for Cybersecurity professionals to understand and count ...
This interactive session will present three distinct views from cyber security veterans including real-life scenarios each of us has experienced talking about cyber risk with senior leaders. In 2024 w ...
This session is designed to shed light on the critical yet often overlooked aspects of macOS forensic analysis. The session will explore a variety of advanced artifacts, including File System Events ( ...
This session will discuss the vital topic of backlog reduction and how digital forensic triage can improve ICAC/CSAM investigations. Attendees will learn: How to reduce the seizure of unnecessary devi ...
As examiners, we learn to listen to the who, what, where, when, and must understand the why. What happens when the evidence is silent? What happens when the storyline doesn’t make sense? What if the a ...
xBit Case Management for Digital Forensics. This workshop will demonstrate the xBit Case Management solution for digital forensic labs. Attendees will experience how the user-customizable xBit assists ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Our nation’s critical infrastructure is in the crosshairs of adversaries, and new threat tactics use stealthy LotL (living-off-the-land) techniques, targeting the network edge. Although we can't preve ...
Join Cellebrite’s expert team for a live interactive panel. Bring your questions about Cellebrite solutions, case-specific help, or anything else. And have a drink on us while you’re at it!
PenLink introduces CoAnalyst, a cutting-edge generative AI (Artificial Intelligence) platform tailored for the specialized need of law enforcement, national security, defense, and security. It combine ...
Generative artificial intelligence is a new technology that has seen phenomenal growth since late 2022. GAI platforms have proliferated even as uses have multiplied in private and public sectors. Deve ...
The range of sources and volume of data in criminal investigations continues to grow at an alarming rate, leaving forensics examiners with the persistent challenge of cutting through the noise to get ...
This session examines real-world applications of AI to expedite digital investigations. It explores machine learning, natural language processing and computer vision techniques that enable investigato ...
From developing standard operating procedures to evaluating legal admissibility, digital forensic standards provide important reference material for examiners and can serve as a yardstick to measure t ...
This session will teach attendees about sanitizing/wiping data storage devices, the standards that govern data sanitization, and tools that can be used to wipe data storage devices. The discussion wil ...
This session explores the evolving realm of digital forensics, specifically addressing challenges arising from the widespread adoption of cloud-based data storage in Microsoft systems and OneDrive env ...
NIST, DoD, NSA, DHS CISA, and other organizations have publicly available tools to help all types of organizations harden their systems. This session will explore how these tools can help you do your ...
Containerized systems are becoming widely used throughout the tech industry and is changing how we use virtualized systems. This session will introduce the concept of containerized systems and how the ...
This panel discussion will delve into pressing issues surrounding privacy concerns, as well as the collection and review hurdles confronting eDiscovery professionals across various industries. The con ...
While pattern of life artifacts has become the mainstay of many investigations, not all artifacts are created equal in terms of timestamps. Some will record in seconds, some in milliseconds, some in l ...
This case study shares how a construction superintendent Todd Engles, who produced CSAM with multiple 9–12-year-old girls on multiple social media platforms to include Discord, TikTok and Instagram. T ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Ephemeral data presents a real conundrum for everyone who works in the legal business. Lawyers have legal and ethical obligations to preserve, collect, review, and produce relevant electronically stor ...
This session will explore the impact of eSIM technology, how it has exploded in the world of IoT devices and how this has transitioned to be the solution of choice for smartphones and other mobile dev ...
Abstract Proposal: Learn expert testimony from a guy who does it a lot! It can be stressful because everything is on the line. It is through your expert witness testimony that all your work in the cas ...
Discover the groundbreaking capabilities of Cellebrite’s latest innovation in digital forensics, designed specifically for accessing the widest-range of devices. Learn how what Cellebrite Inseyets bri ...
This presentation focuses on the often overlooked but critical aspect of digital forensics: Reporting! We will explore the art of transforming complex findings into clear, organized reports. Using dyn ...
*Pre-registration required (included with your paid registration)This hands-on workshop teaches a methodology for mobile forensic analysis of unsupported applications and artifacts. The workshop will ...
The SEC issued new Cybersecurity requirements that went into effect December 2023. Will your Incident Response program pass muster? This session will take a deep dive into the SEC’s new cybersecurity ...
A panel of industry practitioners will discuss the role of eDiscovery and Forensics within internal investigations. The panel will explore workflows, tools, processes, best practices, and other relate ...
Cloud forensics involves analyzing and collecting digital evidence from various cloud-related sources. This session will discuss how whether data is hosted and offered through the cloud, generated, an ...
Who, What, and When are the basis for many investigative questions. The ‘what’ and ‘when’ questions are covered in many digital investigation courses about artifacts and timelines. But, you need to un ...
Various video investigation cases for CCTV, DVR and Car Dashcam will be presented using MD-VIDEO AI demo. Recovery of deleted video frames, Enhancement and restoration of US car number plate of unclea ...
Updated with more video and resources. This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which ...
Tom Cruise performing magic tricks on TikTok, foreign leaders declaring acts of war…the prevalence of high-quality synthetic media online has brought a new age of disinformation and distrust to societ ...
Digital forensics professionals are increasingly encountering privacy-focused tools like Linux Tails, which present unique challenges when conducting investigations. This session will guide attendees ...
Law Enforcement and Prosecutors ONLY: This case study walks through an investigation beginning with a substantial cash out of Bitcoin and the investigation leading into the dark web of hackers and the ...
Are you so confident in your open source findings that you would testify in court? In this presentation, participants will learn best practices for capturing and storing open source findings on social ...
Join us as we delve into the intricacies of understanding early data assessment, collection, and analysis of employee devices and commonly used workplace applications, including phones, tablets, lapto ...
Understand how the DekkoSecure solution helps organizations with highly sensitive, and mission critical information to be able to share and collaborate in the cloud, with guaranteed security.
In this session, audience members will learn the truth behind common misconceptions about the eDiscovery process. Myths such as "its complicated,""it’s expensive,"or "manual document review is the gol ...
Despite being overshadowed by social media giants, Reddit is an underrated gem in the realm of OSINT. Reddit stands out for its vast assortment of third-party tools that grant access to previously del ...
The public-private sector relationship can be a veritable minefield of relational issues. Law enforcement examiners can often find themselves at odds with policy, procedure, supervisors and/or prosecu ...
This session focuses on the challenges of finding AI traces in Windows systems from a digital forensics point of view. The presenter will share how AI works with the operating system and the tough job ...
In this year’s State of Enterprise DFIR report, Magnet Forensics surveyed almost 400 DFIR professionals globally, and 42% of corporate DFIR practitioners reported difficulty acquiring from remote on o ...
The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
Join us for "Mastering Mac Imaging with RECON ITR: A Demo for Forensic Professionals,"a focused 50-minute journey into the specialized world of Mac forensic imaging, presented by digital forensics pio ...
Global news sources provide a vast sea of data for investigators. This session explores a new approach that combines Python, Natural Language Processing (NLP), and ChatGPT, to transform the way we har ...
In this lecture, Stephen and Stuart will discuss the increasing presence of end-to-end encrypted messaging. The session describes the most popular E2EE apps. Then lesser-known apps are profiled, inclu ...
This session will focus on a broader spectrum of cyber risk consequences beyond pure financial metrics. We will explore different approaches to assessing, measuring, prioritizing, and quantifying risk ...
Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
Join us for this session to explore how Magnet Griffeye is transforming digital media investigations with its powerful set of analytical features and capabilities, uncovering crucial evidence efficien ...
DATAPILOT First-to-market acquisition capabilities for Apple Vision Pro & Meta Quest VR headsets. Be the first to see our new technology capable of pulling multiple types of data from VR headsets. DAT ...
This is a case study of an iPhone 11 that was retrieved from a highway after being run over multiple times. Learn how to recognize, diagnose and repair several strange faults that are common with seve ...
This session provides a roadmap for cybersecurity professionals to become "Hacker Minded."Today, cyber career discussions are boxed into certifications and education. The presenter will share the "5 E ...
Blockchain technology has the potential to revolutionize cloud security by providing transparency, immutability, and trust in your data and transactions. Its application in creating immutable audit tr ...
Important device information can be identified through the monitoring of raw data sent via USB protocol. iOS devices present sensitive information in the back end even when this information is not see ...
The number of data sources continues to grow. Leading organizations now have Chief Data Officers to lead the governance and set the direction in dealing with the data sets. Reports are dynamically gen ...
Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
This hands-on lab session will walk you through operating the analytic features of Oxygen Forensic® Detective. You will explore the following: Facial Categorization, Face Searching, OCR, Image Categor ...
*Pre-registration required (included with your paid registration) I’m a digital forensics examiner (DFE), and I know that I need some scripting skills, but I don’t want to be a full-time programmer. P ...
Many modern businesses rely on a cloud environment (if not multiple) to store and host valuable employees, customers, and proprietary data. But cloud security is constantly evolving, emphasizing the n ...
You've been hired to build a team from the ground up, now what? In this session, you will be presented with the scenarios and questions inherent in developing an Enterprise forensics and eDiscovery te ...
The dramatic increases in the volume, velocity, and veracity of digital evidence, particularly with mobile devices, can paralyze even the most efficient and effective forensic labs, with examiners mak ...
In this talk, we will explore the essential aspects of Mac timestamps, focusing on POSIX and Extended Attribute (EA) timestamps. POSIX timestamps, including creation time, modification time, access ti ...
This session outlines a process for identifying USB storage device activities on Windows 11. Leveraging Sysinternals Procmon, we monitor registry changes related to USB insertions, removals, and persi ...
Almost all serious crimes nowadays contain a digital footprint, and the effective session of this digital evidence to juries is essential for successful prosecutions. In this session attendees will le ...
This session provides a practical walkthrough of extracting employee data from Microsoft 365 using an admin account. Attendees will understand how to identify and export data, investigate user logs, a ...
With ever-growing volumes of digital data flooding digital forensics labs—from chat records to geolocational data, photos, videos, and everything in between—time to evidence is crucial. Automation and ...
The state of Generative AI today is reminiscent of the inception of the world wide web's interface to the internet. The chatbots today are in the same way bringing the masses to AI, ready or not. The ...
Use of remote user access to enterprise networks has exploded dramatically since the start of the recent COVID pandemic...but due to its often-careless management and use, it has become a dangerous ba ...
This session will cover the importance of testing response plans and procedures through performing tabletop exercises focusing specifically on insider threats. The presenter will discuss *the proper p ...
Join us as we delve into the trends shaping our sector. Discover actionable strategies derived from industry trends, empowering your business to thrive in today's dynamic landscape. Don't miss out on ...
The session demonstrates real use cases in Brazilian investigations solved using operating system artifacts, metadata, and data collection from open sources. This educational session will delve into p ...
In today’s digital landscape, data is curial to business and legal processes. Managing eDiscovery security risks is vital. This session will enhance your grasp of international standards, introducing ...
This session examines the current state of the computer security requirements that have been imposed on defense contractors to protect Controlled Unclassified Information. In the process it examines w ...
As digital evidence becomes more prevalent throughout the world this trend also includes the prison system. This case study will follow the Tennessee Department of Correction’s first major digital evi ...
This session will be informing the purpose, threat, and detection of AI images and videos, addressing the rising concerns surrounding AI-generated visual content and its potential for spreading misinf ...
Surveillance video is utilized in most investigations, but getting the most from the evidence you collect can be difficult. Depending on how it was collected, and what is required, you might be used t ...
Contrary to the popular digital forensic belief, the investigation does not start, nor end, with the phone. Rather, successful investigations depend on a complex array of efforts conducted by numerous ...
This session focuses on the investigation and forensic analysis of a drone which was recovered from prison contraband smuggling incident. Discussion will cover the capabilities of drones, unique foren ...
Digital forensic evidence can convict the guilty or exonerate the innocent. Justice requires transparency in pretrial discovery & scrupulous ethics by all investigators. During this session, attendees ...
This session explores challenges in modern communication methods used by the public and private sectors. It discusses the complexities of integrating contemporary data types into standard practices, f ...
The cloud has created opportunities for adoption of emergent technologies, e.g., Artificial Intelligence (AI), that many would have considered out of reach a few years ago. Additionally, data is spann ...
This session describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to a ...
During this session, we will dive into various aspects of emojis, discuss and demonstrate tools and technologies that can unlock the meaning, intent, and potential digital evidence to enhance investig ...