The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
As we immerse ourselves into the revolutionizing era of AI, the world of cybersecurity and digital forensics is confronted with unprecedented challenges as well as opportunities. During this powerful ...
Artificial intelligence has garnered significant interest in the United States Congress, impacting investigators and potential victims. This session will address what is coming from an A.I. legislativ ...
Trade secrets make up majority of value of U.S. public companies' portfolios. Not surprisingly, such secrets are high value targets for domestic and foreign theft. Domestic economic damage attributed ...
Whether working a HIPPA case, client-attorney privilege, or just a system with mixed file and data ownership can raise privacy concerns and without a proper methodology hinder the investigation. This ...
Many companies and organizations have rolled out Microsoft/Office 365 in their computing environments, but few have taken advantage of the search and investigatory tools built into Microsoft Purview. ...
AI images and videos are taking over the internet. Your selfies make you glow and have perfect skin and are presented to the world as real. Celebrities are regularly having AI generated explicit image ...
This demo session will take a new look into forensic artifacts, highlighting how EnCase enhances the preservation and examination of artifacts within digital investigations. You’ll see how EnCase can ...
CISA Cybersecurity Advisor Klint Walker will discuss the current threat landscape and nation state activities. This session will show how cyberspace is a political battleground and illustrate how thre ...
Video and image evidence is vital to all aspects of investigations as well as security. Trusting evidence that is submitted has increasingly been challenged, particularly related to "deepfake"video. A ...
As an investigator, you’re constantly searching for ways to close cases faster. One of the most effective ways to do so is by implementing social media data from multiple sources, but how? This sessio ...
Filesystem or full disk encryption on Android and iOS devices is an accepted and well understood norm nowadays. However, there are almost invariably additional layers of security on these devices now, ...
With the development of the internet came a new tool for criminals to conduct illegal activity. With the emergence of the dark web and cryptocurrency, criminals gained anonymity for their illicit tran ...
Mobile devices have become engrained in our daily lives, so smartphone data plays a critical part in almost every criminal investigation. Magnet Forensics offers a range of solutions at every stage of ...
Digital Forensics & Incident Response teams are facing unprecedented pressure to expedite caseloads and respond to incidents immediately. Learn how to harness the power of large-scale processing engin ...
Join MSAB as they show how to use their flagship analytical software XAMN, they will demonstrate how to use XAMN to deep dive into the data for a better understanding of what the tool does. They will ...
In this enlightened session we will weave together the expertise of seasoned cybersecurity professionals, hailing from diverse roles such as SOC Analysts, Threat Hunters, Detection Engineers, and Inci ...
The session will focus on on-scene investigations and use screenshots/screen recordings when talking with victims and witnesses. The session will delve into the unique challenges and opportunities tha ...
When the event has been resolved & the threat has been mitigated the client, CISO, CEO & BoD will want to know root cause, a resource consuming and costly project. Investigation into sufficient or lik ...
Are you thinking about moving from the public sector into the private sector? Join this panel of industry-leading experts from Cellebrite and VeriFi who have successfully made the move. Learn from the ...
Are you looking for a way to extract facial data from videos in order to compare to known datasets? Need to know how to quickly search text located in screenshots? How about simply pushing a button to ...
Join Exodus Road founder Matt Parker, Cellebrite’s Chief Marketing Officer Lisa Cole, and Cellebrite CEO Yossi Carmil for an engaging fireside chat and learn how Cellebite is on a mission to eliminate ...
The Cloud has been thought of as a frontier which only the bold few Law Enforcement agencies have entered. Cloud services have arrived and understanding their implementation within your digital invest ...
Threat simulations involving malware and C2 frameworks are crucial in Cybersecurity training and readiness. They provide a realistic environment for Cybersecurity professionals to understand and count ...
This interactive session will present three distinct views from cyber security veterans including real-life scenarios each of us has experienced talking about cyber risk with senior leaders. In 2024 w ...
This session is designed to shed light on the critical yet often overlooked aspects of macOS forensic analysis. The session will explore a variety of advanced artifacts, including File System Events ( ...
This session will discuss the vital topic of backlog reduction and how digital forensic triage can improve ICAC/CSAM investigations. Attendees will learn: How to reduce the seizure of unnecessary devi ...
As examiners, we learn to listen to the who, what, where, when, and must understand the why. What happens when the evidence is silent? What happens when the storyline doesn’t make sense? What if the a ...
xBit Case Management for Digital Forensics. This workshop will demonstrate the xBit Case Management solution for digital forensic labs. Attendees will experience how the user-customizable xBit assists ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Our nation’s critical infrastructure is in the crosshairs of adversaries, and new threat tactics use stealthy LotL (living-off-the-land) techniques, targeting the network edge. Although we can't preve ...
Join Cellebrite’s expert team for a live interactive panel. Bring your questions about Cellebrite solutions, case-specific help, or anything else. And have a drink on us while you’re at it!
PenLink introduces CoAnalyst, a cutting-edge generative AI (Artificial Intelligence) platform tailored for the specialized need of law enforcement, national security, defense, and security. It combine ...
Generative artificial intelligence is a new technology that has seen phenomenal growth since late 2022. GAI platforms have proliferated even as uses have multiplied in private and public sectors. Deve ...
The range of sources and volume of data in criminal investigations continues to grow at an alarming rate, leaving forensics examiners with the persistent challenge of cutting through the noise to get ...
This session examines real-world applications of AI to expedite digital investigations. It explores machine learning, natural language processing and computer vision techniques that enable investigato ...
From developing standard operating procedures to evaluating legal admissibility, digital forensic standards provide important reference material for examiners and can serve as a yardstick to measure t ...
This session will teach attendees about sanitizing/wiping data storage devices, the standards that govern data sanitization, and tools that can be used to wipe data storage devices. The discussion wil ...
This session explores the evolving realm of digital forensics, specifically addressing challenges arising from the widespread adoption of cloud-based data storage in Microsoft systems and OneDrive env ...