The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
NIST, DoD, NSA, DHS CISA, and other organizations have publicly available tools to help all types of organizations harden their systems. This session will explore how these tools can help you do your ...
Containerized systems are becoming widely used throughout the tech industry and is changing how we use virtualized systems. This session will introduce the concept of containerized systems and how the ...
This panel discussion will delve into pressing issues surrounding privacy concerns, as well as the collection and review hurdles confronting eDiscovery professionals across various industries. The con ...
While pattern of life artifacts has become the mainstay of many investigations, not all artifacts are created equal in terms of timestamps. Some will record in seconds, some in milliseconds, some in l ...
This case study shares how a construction superintendent Todd Engles, who produced CSAM with multiple 9–12-year-old girls on multiple social media platforms to include Discord, TikTok and Instagram. T ...
Come sit in the driver’s seat during this event and take Oxygen Forensics’ Mapping tool for a spin. Each attendee will have access to a fully licensed laptop with all tools and datasets needed. Using ...
Ephemeral data presents a real conundrum for everyone who works in the legal business. Lawyers have legal and ethical obligations to preserve, collect, review, and produce relevant electronically stor ...
This session will explore the impact of eSIM technology, how it has exploded in the world of IoT devices and how this has transitioned to be the solution of choice for smartphones and other mobile dev ...
Abstract Proposal: Learn expert testimony from a guy who does it a lot! It can be stressful because everything is on the line. It is through your expert witness testimony that all your work in the cas ...
Discover the groundbreaking capabilities of Cellebrite’s latest innovation in digital forensics, designed specifically for accessing the widest-range of devices. Learn how what Cellebrite Inseyets bri ...
This presentation focuses on the often overlooked but critical aspect of digital forensics: Reporting! We will explore the art of transforming complex findings into clear, organized reports. Using dyn ...
*Pre-registration required (included with your paid registration)This hands-on workshop teaches a methodology for mobile forensic analysis of unsupported applications and artifacts. The workshop will ...
The SEC issued new Cybersecurity requirements that went into effect December 2023. Will your Incident Response program pass muster? This session will take a deep dive into the SEC’s new cybersecurity ...
A panel of industry practitioners will discuss the role of eDiscovery and Forensics within internal investigations. The panel will explore workflows, tools, processes, best practices, and other relate ...
Cloud forensics involves analyzing and collecting digital evidence from various cloud-related sources. This session will discuss how whether data is hosted and offered through the cloud, generated, an ...
Who, What, and When are the basis for many investigative questions. The ‘what’ and ‘when’ questions are covered in many digital investigation courses about artifacts and timelines. But, you need to un ...
Various video investigation cases for CCTV, DVR and Car Dashcam will be presented using MD-VIDEO AI demo. Recovery of deleted video frames, Enhancement and restoration of US car number plate of unclea ...
Updated with more video and resources. This session will walk through a case study that used vehicle data to assist in an investigation. In this case, the subject rented a 2016 Lincoln Navigator which ...
Tom Cruise performing magic tricks on TikTok, foreign leaders declaring acts of war…the prevalence of high-quality synthetic media online has brought a new age of disinformation and distrust to societ ...
Digital forensics professionals are increasingly encountering privacy-focused tools like Linux Tails, which present unique challenges when conducting investigations. This session will guide attendees ...
Law Enforcement and Prosecutors ONLY: This case study walks through an investigation beginning with a substantial cash out of Bitcoin and the investigation leading into the dark web of hackers and the ...
Are you so confident in your open source findings that you would testify in court? In this presentation, participants will learn best practices for capturing and storing open source findings on social ...
Join us as we delve into the intricacies of understanding early data assessment, collection, and analysis of employee devices and commonly used workplace applications, including phones, tablets, lapto ...
Understand how the DekkoSecure solution helps organizations with highly sensitive, and mission critical information to be able to share and collaborate in the cloud, with guaranteed security.
In this session, audience members will learn the truth behind common misconceptions about the eDiscovery process. Myths such as "its complicated,""it’s expensive,"or "manual document review is the gol ...
Despite being overshadowed by social media giants, Reddit is an underrated gem in the realm of OSINT. Reddit stands out for its vast assortment of third-party tools that grant access to previously del ...
The public-private sector relationship can be a veritable minefield of relational issues. Law enforcement examiners can often find themselves at odds with policy, procedure, supervisors and/or prosecu ...
This session focuses on the challenges of finding AI traces in Windows systems from a digital forensics point of view. The presenter will share how AI works with the operating system and the tough job ...
In this year’s State of Enterprise DFIR report, Magnet Forensics surveyed almost 400 DFIR professionals globally, and 42% of corporate DFIR practitioners reported difficulty acquiring from remote on o ...
The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
Join us for "Mastering Mac Imaging with RECON ITR: A Demo for Forensic Professionals,"a focused 50-minute journey into the specialized world of Mac forensic imaging, presented by digital forensics pio ...
Global news sources provide a vast sea of data for investigators. This session explores a new approach that combines Python, Natural Language Processing (NLP), and ChatGPT, to transform the way we har ...
In this lecture, Stephen and Stuart will discuss the increasing presence of end-to-end encrypted messaging. The session describes the most popular E2EE apps. Then lesser-known apps are profiled, inclu ...
This session will focus on a broader spectrum of cyber risk consequences beyond pure financial metrics. We will explore different approaches to assessing, measuring, prioritizing, and quantifying risk ...
Total data sizes present or available for collection during the course of an investigation are not only increasing as technologies evolve but can prove to be overwhelming for examiners. Time is never ...
Join us for this session to explore how Magnet Griffeye is transforming digital media investigations with its powerful set of analytical features and capabilities, uncovering crucial evidence efficien ...
DATAPILOT First-to-market acquisition capabilities for Apple Vision Pro & Meta Quest VR headsets. Be the first to see our new technology capable of pulling multiple types of data from VR headsets. DAT ...
This is a case study of an iPhone 11 that was retrieved from a highway after being run over multiple times. Learn how to recognize, diagnose and repair several strange faults that are common with seve ...