Skip to main content

Thursday, June 6, 2024

conference image

Thursday, June 6, 2024

The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Cybersecurity
    Salon F
    This session provides a roadmap for cybersecurity professionals to become "Hacker Minded."Today, cyber career discussions are boxed into certifications and education. The presenter will share the "5 E ...
    • Cybersecurity
    Salon A
    Blockchain technology has the potential to revolutionize cloud security by providing transparency, immutability, and trust in your data and transactions. Its application in creating immutable audit tr ...
    • Forensics
    Salon E
    Important device information can be identified through the monitoring of raw data sent via USB protocol. iOS devices present sensitive information in the back end even when this information is not see ...
    • eDiscovery
    Salon D
    The number of data sources continues to grow. Leading organizations now have Chief Data Officers to lead the governance and set the direction in dealing with the data sets. Reports are dynamically gen ...
    • Investigations
    Salon C
    Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
    • Oxygen Forensics Lab
    Salon B
    This hands-on lab session will walk you through operating the analytic features of Oxygen Forensic® Detective. You will explore the following: Facial Categorization, Face Searching, OCR, Image Categor ...
    • Investigations
    Meeting Room 107
    *Pre-registration required (included with your paid registration) I’m a digital forensics examiner (DFE), and I know that I need some scripting skills, but I don’t want to be a full-time programmer. P ...
    • Cybersecurity
    Salon F
    Many modern businesses rely on a cloud environment (if not multiple) to store and host valuable employees, customers, and proprietary data. But cloud security is constantly evolving, emphasizing the n ...
    • Investigations
    Salon D
    You've been hired to build a team from the ground up, now what? In this session, you will be presented with the scenarios and questions inherent in developing an Enterprise forensics and eDiscovery te ...
    • Cellebrite Lab
    Salon E
    The dramatic increases in the volume, velocity, and veracity of digital evidence, particularly with mobile devices, can paralyze even the most efficient and effective forensic labs, with examiners mak ...
    • Forensics
    Salon A
    In this talk, we will explore the essential aspects of Mac timestamps, focusing on POSIX and Extended Attribute (EA) timestamps. POSIX timestamps, including creation time, modification time, access ti ...
    • Forensics
    Salon B
    This session outlines a process for identifying USB storage device activities on Windows 11. Leveraging Sysinternals Procmon, we monitor registry changes related to USB insertions, removals, and persi ...
    • Investigations
    Salon F
    Almost all serious crimes nowadays contain a digital footprint, and the effective session of this digital evidence to juries is essential for successful prosecutions. In this session attendees will le ...
    • Forensics
    Salon D
    This session provides a practical walkthrough of extracting employee data from Microsoft 365 using an admin account. Attendees will understand how to identify and export data, investigate user logs, a ...
    • Magnet Forensics Lab
    Salon A
    With ever-growing volumes of digital data flooding digital forensics labs—from chat records to geolocational data, photos, videos, and everything in between—time to evidence is crucial. Automation and ...
    • Cybersecurity
    Salon E
    The state of Generative AI today is reminiscent of the inception of the world wide web's interface to the internet. The chatbots today are in the same way bringing the masses to AI, ready or not. The ...
    • Cybersecurity
    Salon C
    Use of remote user access to enterprise networks has exploded dramatically since the start of the recent COVID pandemic...but due to its often-careless management and use, it has become a dangerous ba ...
    • Forensics
    Salon F
    This session will cover the importance of testing response plans and procedures through performing tabletop exercises focusing specifically on insider threats. The presenter will discuss *the proper p ...
    • Cellebrite Lab
    Salon B
    Join us as we delve into the trends shaping our sector. Discover actionable strategies derived from industry trends, empowering your business to thrive in today's dynamic landscape. Don't miss out on ...
    • Magnet Forensics Lab
    Salon A
    • Investigations
    Salon D
    The session demonstrates real use cases in Brazilian investigations solved using operating system artifacts, metadata, and data collection from open sources. This educational session will delve into p ...
    • eDiscovery
    Salon D
    In today’s digital landscape, data is curial to business and legal processes. Managing eDiscovery security risks is vital. This session will enhance your grasp of international standards, introducing ...
    • Cybersecurity
    Salon E
    This session examines the current state of the computer security requirements that have been imposed on defense contractors to protect Controlled Unclassified Information. In the process it examines w ...
    • Forensics
    Salon A
    As digital evidence becomes more prevalent throughout the world this trend also includes the prison system. This case study will follow the Tennessee Department of Correction’s first major digital evi ...
    • Oxygen Forensics Lab
    Salon F
    This session will be informing the purpose, threat, and detection of AI images and videos, addressing the rising concerns surrounding AI-generated visual content and its potential for spreading misinf ...
    • Magnet Forensics Lab
    Salon C
    Surveillance video is utilized in most investigations, but getting the most from the evidence you collect can be difficult. Depending on how it was collected, and what is required, you might be used t ...
    • Cellebrite Lab
    Salon B
    Contrary to the popular digital forensic belief, the investigation does not start, nor end, with the phone. Rather, successful investigations depend on a complex array of efforts conducted by numerous ...
    • Forensics
    Salon F
    This session focuses on the investigation and forensic analysis of a drone which was recovered from prison contraband smuggling incident. Discussion will cover the capabilities of drones, unique foren ...
    • Forensics
    Salon E
    Digital forensic evidence can convict the guilty or exonerate the innocent. Justice requires transparency in pretrial discovery & scrupulous ethics by all investigators. During this session, attendees ...
    • eDiscovery
    Salon A
    This session explores challenges in modern communication methods used by the public and private sectors. It discusses the complexities of integrating contemporary data types into standard practices, f ...
    • Cybersecurity
    Salon C
    The cloud has created opportunities for adoption of emergent technologies, e.g., Artificial Intelligence (AI), that many would have considered out of reach a few years ago. Additionally, data is spann ...
    • Cybersecurity
    Salon B
    This session describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to a ...
    • Cybersecurity
    Salon D
    During this session, we will dive into various aspects of emojis, discuss and demonstrate tools and technologies that can unlock the meaning, intent, and potential digital evidence to enhance investig ...