The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
This session provides a roadmap for cybersecurity professionals to become "Hacker Minded."Today, cyber career discussions are boxed into certifications and education. The presenter will share the "5 E ...
Blockchain technology has the potential to revolutionize cloud security by providing transparency, immutability, and trust in your data and transactions. Its application in creating immutable audit tr ...
Important device information can be identified through the monitoring of raw data sent via USB protocol. iOS devices present sensitive information in the back end even when this information is not see ...
The number of data sources continues to grow. Leading organizations now have Chief Data Officers to lead the governance and set the direction in dealing with the data sets. Reports are dynamically gen ...
Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
This hands-on lab session will walk you through operating the analytic features of Oxygen Forensic® Detective. You will explore the following: Facial Categorization, Face Searching, OCR, Image Categor ...
*Pre-registration required (included with your paid registration) I’m a digital forensics examiner (DFE), and I know that I need some scripting skills, but I don’t want to be a full-time programmer. P ...
Many modern businesses rely on a cloud environment (if not multiple) to store and host valuable employees, customers, and proprietary data. But cloud security is constantly evolving, emphasizing the n ...
You've been hired to build a team from the ground up, now what? In this session, you will be presented with the scenarios and questions inherent in developing an Enterprise forensics and eDiscovery te ...
The dramatic increases in the volume, velocity, and veracity of digital evidence, particularly with mobile devices, can paralyze even the most efficient and effective forensic labs, with examiners mak ...
In this talk, we will explore the essential aspects of Mac timestamps, focusing on POSIX and Extended Attribute (EA) timestamps. POSIX timestamps, including creation time, modification time, access ti ...
This session outlines a process for identifying USB storage device activities on Windows 11. Leveraging Sysinternals Procmon, we monitor registry changes related to USB insertions, removals, and persi ...
Almost all serious crimes nowadays contain a digital footprint, and the effective session of this digital evidence to juries is essential for successful prosecutions. In this session attendees will le ...
This session provides a practical walkthrough of extracting employee data from Microsoft 365 using an admin account. Attendees will understand how to identify and export data, investigate user logs, a ...
With ever-growing volumes of digital data flooding digital forensics labs—from chat records to geolocational data, photos, videos, and everything in between—time to evidence is crucial. Automation and ...
The state of Generative AI today is reminiscent of the inception of the world wide web's interface to the internet. The chatbots today are in the same way bringing the masses to AI, ready or not. The ...
Use of remote user access to enterprise networks has exploded dramatically since the start of the recent COVID pandemic...but due to its often-careless management and use, it has become a dangerous ba ...
This session will cover the importance of testing response plans and procedures through performing tabletop exercises focusing specifically on insider threats. The presenter will discuss *the proper p ...
Join us as we delve into the trends shaping our sector. Discover actionable strategies derived from industry trends, empowering your business to thrive in today's dynamic landscape. Don't miss out on ...
The session demonstrates real use cases in Brazilian investigations solved using operating system artifacts, metadata, and data collection from open sources. This educational session will delve into p ...
In today’s digital landscape, data is curial to business and legal processes. Managing eDiscovery security risks is vital. This session will enhance your grasp of international standards, introducing ...
This session examines the current state of the computer security requirements that have been imposed on defense contractors to protect Controlled Unclassified Information. In the process it examines w ...
As digital evidence becomes more prevalent throughout the world this trend also includes the prison system. This case study will follow the Tennessee Department of Correction’s first major digital evi ...
This session will be informing the purpose, threat, and detection of AI images and videos, addressing the rising concerns surrounding AI-generated visual content and its potential for spreading misinf ...
Surveillance video is utilized in most investigations, but getting the most from the evidence you collect can be difficult. Depending on how it was collected, and what is required, you might be used t ...
Contrary to the popular digital forensic belief, the investigation does not start, nor end, with the phone. Rather, successful investigations depend on a complex array of efforts conducted by numerous ...
This session focuses on the investigation and forensic analysis of a drone which was recovered from prison contraband smuggling incident. Discussion will cover the capabilities of drones, unique foren ...
Digital forensic evidence can convict the guilty or exonerate the innocent. Justice requires transparency in pretrial discovery & scrupulous ethics by all investigators. During this session, attendees ...
This session explores challenges in modern communication methods used by the public and private sectors. It discusses the complexities of integrating contemporary data types into standard practices, f ...
The cloud has created opportunities for adoption of emergent technologies, e.g., Artificial Intelligence (AI), that many would have considered out of reach a few years ago. Additionally, data is spann ...
This session describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to a ...
During this session, we will dive into various aspects of emojis, discuss and demonstrate tools and technologies that can unlock the meaning, intent, and potential digital evidence to enhance investig ...